>-----Original Message----- >From: Marko, Peter <peter.ma...@siemens.com> >Sent: Wednesday, August 7, 2024 4:04 PM >To: Dhairya Nagodra -X (dnagodra - E INFOCHIPS LIMITED at Cisco) ><dnago...@cisco.com>; Richard Purdie <richard.pur...@linuxfoundation.org>; >Marta Rybczynska <rybczyn...@gmail.com>; openembedded- >c...@lists.openembedded.org >Cc: xe-linux-external(mailer list) <xe-linux-exter...@cisco.com> >Subject: RE: [OE-core] [PATCH] cve-check-map: Move 'upstream-wontfix' to >"Unpatched" status > > > >> -----Original Message----- >> From: Dhairya Nagodra -X (dnagodra - E INFOCHIPS LIMITED at Cisco) >> <dnago...@cisco.com> >> Sent: Wednesday, August 7, 2024 12:17 >> To: Marko, Peter (ADV D EU SK BFS1) <peter.ma...@siemens.com>; Richard >> Purdie <richard.pur...@linuxfoundation.org>; Marta Rybczynska >> <rybczyn...@gmail.com>; openembedded-core@lists.openembedded.org >> Cc: xe-linux-external(mailer list) <xe-linux-exter...@cisco.com> >> Subject: RE: [OE-core] [PATCH] cve-check-map: Move 'upstream-wontfix' >> to "Unpatched" status >> >> >> >> >-----Original Message----- >> >From: Marko, Peter <peter.ma...@siemens.com> >> >Sent: Wednesday, July 24, 2024 12:04 PM >> >To: Dhairya Nagodra -X (dnagodra - E-INFO CHIPS INC at Cisco) >> ><dnago...@cisco.com>; openembedded-core@lists.openembedded.org >> >Cc: xe-linux-external(mailer list) <xe-linux-exter...@cisco.com> >> >Subject: RE: [OE-core] [PATCH] cve-check-map: Move 'upstream-wontfix' >> >to "Unpatched" status >> > >> >-----Original Message----- >> >From: openembedded-core@lists.openembedded.org <openembedded- >> >c...@lists.openembedded.org> On Behalf Of Dhairya Nagodra via >> >lists.openembedded.org >> >Sent: Wednesday, July 24, 2024 6:45 >> >To: openembedded-core@lists.openembedded.org >> >Cc: xe-linux-exter...@cisco.com; Dhairya Nagodra <dnago...@cisco.com> >> >Subject: [OE-core] [PATCH] cve-check-map: Move 'upstream-wontfix' to >> >"Unpatched" status >> > >> >> - The 'upstream-wontfix' is to be used when the CVE is accepted by the >> >> upstream, but they are not planning to fix it. >> >> - If the version used in Yocto is vulnerable, it should not have >> >> "Ignored" status. The package is still exploitable by the CVE. >> >> - Also, when the status is exported out of the SDK, it would be >> >> incorrect to put it under Ignored catgory. >> > >> >The purpose of this entry is to remove meaningless CVEs from reports >> >so that users don't spend countless hours over and over again on analyzing >"open" >> >CVEs if they were already closed upstream. >> >If you look at comments of entries using this category (7 in oe-core >> scarthgap) >> >these CVEs are more or less irrelevant. >> > >> >So this patch is from my point of view step in the wrong direction. >> >If you really need to show these due to your CVE handling process, >> >you can easily override this variable assignment in your own layer. >> > >> >> >> I tried this in my layer, created a .conf and included in my distro.conf >> file. >> The issue is, it gets overwritten by cve-check-map.conf (as it is included >later). > >If you create meta-<your-layer>/conf/cve-check-map.conf it will be included >instead of the one from oe-core/poky. >
I tried this approach, it included both of the files, and my config was over written. # <path>/distro/openembedded-core/../my-layer/conf/distro/my-cve-check-map.conf # <path>/distro/openembedded-core/../openembedded-core/meta/conf/distro/defaultsetup.conf includes: # <path>/distro/openembedded-core/../openembedded-core/meta/conf/distro/include/default-providers.inc # <path>/distro/openembedded-core/../openembedded-core/meta/conf/distro/include/default-versions.inc # <path>/distro/openembedded-core/../openembedded-core/meta/conf/distro/include/default-distrovars.inc # <path>/distro/openembedded-core/../openembedded-core/meta/conf/distro/include/maintainers.inc # <path>/distro/openembedded-core/../openembedded-core/meta/conf/distro/include/tcmode-default.inc # <path>/distro/openembedded-core/../openembedded-core/meta/conf/distro/include/tclibc-glibc.inc # <path>/distro/openembedded-core/../openembedded-core/meta/conf/distro/include/uninative-flags.inc # <path>/distro/openembedded-core/../openembedded-core/meta/conf/distro/include/init-manager-none.inc # <path>/distro/openembedded-core/../openembedded-core/meta/conf/documentation.conf # <path>/distro/openembedded-core/../openembedded-core/meta/conf/licenses.conf # <path>/distro/openembedded-core/../openembedded-core/meta/conf/sanity.conf # <path>/distro/openembedded-core/../openembedded-core/meta/conf/cve-check-map.conf >> >> Would it be okay to make assignments soft in the cve-check-map.conf file? >> This would be similar to CVE_PRODUCT and CVE_VERSION. This seems to be the only way, I'll share the patch soon. >> If everyone agrees, I can share the patch for it. >> Is there a better way to do this? > >This is also an option; I'm not opinionated on this one... > >> >> Best Regards, >> Dhairya >> >> >> >> >> >> Signed-off-by: Dhairya Nagodra <dnago...@cisco.com> >> >> --- >> >> meta/conf/cve-check-map.conf | 4 ++-- >> >> 1 file changed, 2 insertions(+), 2 deletions(-) >> >> >> >> diff --git a/meta/conf/cve-check-map.conf >> >> b/meta/conf/cve-check-map.conf index b9df41a6f3..7ff53f5601 100644 >> >> --- a/meta/conf/cve-check-map.conf >> >> +++ b/meta/conf/cve-check-map.conf >> >> @@ -15,6 +15,8 @@ CVE_CHECK_STATUSMAP[unpatched] = >"Unpatched" >> >> CVE_CHECK_STATUSMAP[vulnerable-investigating] = "Unpatched" >> >> # use when CVE fix is not compatible to the current version and >> >> cannot be >> >backported. >> >> CVE_CHECK_STATUSMAP[cannot-backport] = "Unpatched" >> >> +# use when upstream acknowledged the vulnerability but does not >> >> +plan to fix it CVE_CHECK_STATUSMAP[upstream-wontfix] = "Unpatched" >> >> >> >> # used for migration from old concept, do not use for new >> >> vulnerabilities CVE_CHECK_STATUSMAP[ignored] = "Ignored" >> >> @@ -26,5 +28,3 @@ CVE_CHECK_STATUSMAP[disputed] = "Ignored" >> >> CVE_CHECK_STATUSMAP[not-applicable-config] = "Ignored" >> >> # use when vulnerability affects other platform (e.g. Windows or >> >> Debian) CVE_CHECK_STATUSMAP[not-applicable-platform] = "Ignored" >> >> -# use when upstream acknowledged the vulnerability but does not >> >> plan to fix it -CVE_CHECK_STATUSMAP[upstream-wontfix] = "Ignored"
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#203215): https://lists.openembedded.org/g/openembedded-core/message/203215 Mute This Topic: https://lists.openembedded.org/mt/107518628/21656 Group Owner: openembedded-core+ow...@lists.openembedded.org Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-