Richard, This regression is fixed by https://lists.openembedded.org/g/openembedded-core/message/209573
Peter > -----Original Message----- > From: openembedded-core@lists.openembedded.org <openembedded- > c...@lists.openembedded.org> On Behalf Of Richard Purdie via > lists.openembedded.org > Sent: Sunday, January 12, 2025 13:18 > To: colinmca...@gmail.com; openembedded-core@lists.openembedded.org > Subject: Re: [OE-core] [PATCH v2 1/1] cve-check: Rework patch parsing > > On Mon, 2024-12-30 at 19:22 +0000, Colin McAllister via lists.openembedded.org > wrote: > > The cve_check functionality to parse CVE IDs from the patch filename and > > patch contents have been reworked to improve parsing and also utilize > > tests. This ensures that the parsing works as intended. > > > > Additionally, the new patched_cves dict has a few issues I tried to fix > > as well. If multiple patch files exist for a single CVE ID, only the > > last one will show up with the "resource" key. The value for the > > "resource" key has been updated to hold a list and return all patch > > files associated with a given CVE ID. Also, at the end of > > get_patch_cves, CVE_STATUS can overwrite an existing entry in the dict. > > This could cause an issue, for example, if a CVE has been addressed via > > a patch, but a CVE_STATUS line also exists that ignores the given CVE > > ID. A warning has been added if this ever happens. > > > > Signed-off-by: Colin McAllister <colinmca...@gmail.com> > > --- > > > > I noticed that there are some patches, especially in older verisons of > > Yocto, where the "CVE: " tag was used with multiple CVE IDs in different > > formats, like "CVE-YYYY-XXXX & CVE-YYYY-XXXX" or > > "CVE-YYYY-XXXX, CVE-YYYY-XXXX". Currently, only space-delimited CVE > > IDs will be parsed, but documentation doesn't indicate that is the only > > supported format. I figured it'd be nice to update the code to be able > > to support multiple formats, that way this patch could be backported to > > fix those patches. I also wanted to add unit tests to ensure the patch > > parsing behavior is preserved. > > > > I'd also like to update the patch filename parsing to parse multiple CVE > > IDs from the filename, but based on the comments, it seems like there > > was a reason why only the last CVE ID is extracted from the filename. > > I'd be happy to submit a V2 patch or an additional patch to update the > > function if that sounds good for the maintainers. > > I think this resulted in a few issues. The weekly CVE report gained 32 > new entries this week and many of them are clearly patched. > > New this week: 32 CVEs > CVE-2014-8139 (CVSS3: 7.8 HIGH): unzip:unzip-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8139 * > CVE-2014-8140 (CVSS3: 7.8 HIGH): unzip:unzip-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8140 * > CVE-2014-8141 (CVSS3: 7.8 HIGH): unzip:unzip-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-8141 * > CVE-2014-9636 (CVSS3: N/A): unzip:unzip-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9636 * > CVE-2014-9913 (CVSS3: 4.0 MEDIUM): unzip:unzip-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-9913 * > CVE-2015-7696 (CVSS3: N/A): unzip:unzip-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7696 * > CVE-2015-7697 (CVSS3: N/A): unzip:unzip-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2015-7697 * > CVE-2016-9844 (CVSS3: 4.0 MEDIUM): unzip:unzip-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-9844 * > CVE-2018-1000035 (CVSS3: 7.8 HIGH): unzip:unzip-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000035 * > CVE-2018-1000156 (CVSS3: 7.8 HIGH): patch:patch-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-1000156 * > CVE-2018-10195 (CVSS3: 7.1 HIGH): lrzsz > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-10195 * > CVE-2018-18384 (CVSS3: 5.5 MEDIUM): unzip:unzip-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-18384 * > CVE-2018-20969 (CVSS3: 7.8 HIGH): patch:patch-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-20969 * > CVE-2018-6951 (CVSS3: 7.5 HIGH): patch:patch-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6951 * > CVE-2018-6952 (CVSS3: 7.5 HIGH): patch:patch-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2018-6952 * > CVE-2019-13232 (CVSS3: 3.3 LOW): unzip:unzip-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13232 * > CVE-2019-13636 (CVSS3: 5.9 MEDIUM): patch:patch-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13636 * > CVE-2019-13638 (CVSS3: 7.8 HIGH): patch:patch-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-13638 * > CVE-2019-20633 (CVSS3: 5.5 MEDIUM): patch:patch-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-20633 * > CVE-2020-27748 (CVSS3: 6.5 MEDIUM): xdg-utils > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27748 * > CVE-2021-3468 (CVSS3: 5.5 MEDIUM): avahi > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3468 * > CVE-2021-4217 (CVSS3: 3.3 LOW): unzip:unzip-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-4217 * > CVE-2022-0529 (CVSS3: 5.5 MEDIUM): unzip:unzip-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0529 * > CVE-2022-0530 (CVSS3: 5.5 MEDIUM): unzip:unzip-native > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-0530 * > CVE-2022-33065 (CVSS3: 7.8 HIGH): libsndfile1 > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-33065 * > CVE-2022-4055 (CVSS3: 7.4 HIGH): xdg-utils > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-4055 * > CVE-2023-38469 (CVSS3: 5.5 MEDIUM): avahi > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38469 * > CVE-2023-38470 (CVSS3: 5.5 MEDIUM): avahi > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38470 * > CVE-2023-38471 (CVSS3: 5.5 MEDIUM): avahi > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38471 * > CVE-2023-38472 (CVSS3: 5.5 MEDIUM): avahi > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38472 * > CVE-2023-38473 (CVSS3: 5.5 MEDIUM): avahi > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2023-38473 * > CVE-2024-50612 (CVSS3: 5.5 MEDIUM): libsndfile1 > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2024-50612 * > > meta/recipes-extended/unzip/unzip has: > > 0001-unzip-fix-CVE-2018-1000035.patch > 09-cve-2014-8139-crc-overflow.patch > 10-cve-2014-8140-test-compr-eb.patch > 11-cve-2014-8141-getzip64data.patch > 18-cve-2014-9913-unzip-buffer-overflow.patch > 19-cve-2016-9844-zipinfo-buffer-overflow.patch > cve-2014-9636.patch > CVE-2015-7696.patch > CVE-2015-7697.patch > CVE-2018-18384.patch > CVE-2019-13232_p1.patch > CVE-2019-13232_p2.patch > CVE-2019-13232_p3.patch > CVE-2021-4217.patch > CVE-2022-0529.patch > CVE-2022-0530.patch > > which cover some of the above. > > Cheers, > > Richard
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#209680): https://lists.openembedded.org/g/openembedded-core/message/209680 Mute This Topic: https://lists.openembedded.org/mt/110347357/21656 Group Owner: openembedded-core+ow...@lists.openembedded.org Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-