>-----Original Message----- >From: Richard Purdie <richard.pur...@linuxfoundation.org> >Sent: Thursday, July 25, 2024 3:44 AM >To: Marta Rybczynska <rybczyn...@gmail.com> >Cc: Dhairya Nagodra -X (dnagodra - E-INFO CHIPS INC at Cisco) ><dnago...@cisco.com>; Marko, Peter <peter.ma...@siemens.com>; >openembedded-core@lists.openembedded.org; xe-linux-external(mailer list) ><xe-linux-exter...@cisco.com> >Subject: Re: [OE-core] [PATCH] cve-check-map: Move 'upstream-wontfix' to >"Unpatched" status > >On Wed, 2024-07-24 at 18:10 +0200, Marta Rybczynska wrote: >> On Wed, Jul 24, 2024 at 10:46 AM Richard Purdie via lists.openembedded.org ><richard.purdie=linuxfoundation....@lists.openembedded.org> wrote: >> > >> > This is far from straightforward unfortunately. >> > >> >> >> I agree and also agree with Dhairya. We are facing the same issue within the >VEX work. >> And this is going to come back in the context of the CRA. >> >> > >> > Some people are using these lists as "are there any issues we need >> > to worry about?". >> > >> > In that context, if an upstream has assessed a CVE and decided >> > nothing need be done about it, our decision to "ignore" it is >> > correct as there is nothing to be done. >> > >> >> >> The project might have decided not to fix for multiple reasons. Some >> of them may be good, some not. >> >> I do not completely agree that there is nothing to be done. We might >> decide to use a configuration option that disables the vulnerable >> feature. In this case there is an appropriate status to put. We can do >> an in-depth analysis and figure out if the vulnerable code can be >> reached in our configuration. If not, there is an appropriate status to put. > >I'm working on the assumption that if either of those two things were the case, >we'd have done them in preference to the wontfix status. The wontfix status is >the last resort where upstream disagrees there is an issue or that the issue is >an actual problem.
As per my understanding, we have 'disputed' status for the above mentioned scenarios. (Where upstream disagrees, or they don't consider issue a problem) Below is the snippet from the current cve-check-map.conf # use when upstream does not accept the report as a vulnerability (e.g. works as designed) CVE_CHECK_STATUSMAP[disputed] = "Ignored" # use when upstream *acknowledged* the vulnerability but does not plan to fix it CVE_CHECK_STATUSMAP[upstream-wontfix] = "Ignored" > >In those situations, there isn't much we can do. The status is spelt out >separately so anyone wanting to find this "class" of problems can. >How they want to map and export that into lossy formats is up to the user and >configurable. > >The only "decision" we're making is that we won't show that status as "open" >on our standard lists as someone has looked at it and decided there isn't >anything to be done (or can be done). > >> > On the other hand, the CVE is open and unpatched, so listing it as >> > unmitigated is also correct in some senses. The problem is that >> > there is no planned way of moving forward with the CVE, so it will >> > sit in a list of other "unpatched" CVEs and this dilutes the value >> > of the list as you can't tell which ones are being rejected by >> > upstream as wontfix and which ones are real and need attention. >> > >> > We knew that people would have different views and needs on how to >> > handle this, which is precisely why the mapping variables exist. You >> > can certainly configure this according to your needs and this may be >> > a case where you'd need to do that as there isn't going to be a 100% >> > right answer we can have. >> > >> >> >> I think the problem here is that we had used the "Ignored" status for >> multiple reasons in the past, also to avoid having a look multiple >> times at the same issue. >> >> Again, the CRA is formal here, and downstreams will need to re-analyse >> all those issues (or disable affected recipes). Either downstreams, or >> we will do it all together.... (which is a better option IMO). >> >> There's the same issue with some other statuses like 'disputed'. > >Your argument appears to be that we aren't in a position to make any decision >on the status of any CVE and we can't share this work, it has to be pushed to >the end user to do on their own and the CRM mandates that? > >I don't believe that to be true but that does appear to be the case you're >making :(. > >Cheers, > >Richard
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#202493): https://lists.openembedded.org/g/openembedded-core/message/202493 Mute This Topic: https://lists.openembedded.org/mt/107518628/21656 Group Owner: openembedded-core+ow...@lists.openembedded.org Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-