>-----Original Message----- >From: Marko, Peter <peter.ma...@siemens.com> >Sent: Wednesday, July 24, 2024 12:04 PM >To: Dhairya Nagodra -X (dnagodra - E-INFO CHIPS INC at Cisco) ><dnago...@cisco.com>; openembedded-core@lists.openembedded.org >Cc: xe-linux-external(mailer list) <xe-linux-exter...@cisco.com> >Subject: RE: [OE-core] [PATCH] cve-check-map: Move 'upstream-wontfix' to >"Unpatched" status > >-----Original Message----- >From: openembedded-core@lists.openembedded.org <openembedded- >c...@lists.openembedded.org> On Behalf Of Dhairya Nagodra via >lists.openembedded.org >Sent: Wednesday, July 24, 2024 6:45 >To: openembedded-core@lists.openembedded.org >Cc: xe-linux-exter...@cisco.com; Dhairya Nagodra <dnago...@cisco.com> >Subject: [OE-core] [PATCH] cve-check-map: Move 'upstream-wontfix' to >"Unpatched" status > >> - The 'upstream-wontfix' is to be used when the CVE is accepted by the >> upstream, but they are not planning to fix it. >> - If the version used in Yocto is vulnerable, it should not have >> "Ignored" status. The package is still exploitable by the CVE. >> - Also, when the status is exported out of the SDK, it would be >> incorrect to put it under Ignored catgory. > >The purpose of this entry is to remove meaningless CVEs from reports so that >users don't spend countless hours over and over again on analyzing "open" >CVEs if they were already closed upstream.
I understand the need to remove the meaningless CVEs from the report and prevention of re-analysing the CVEs. And for that exact reason we have the CVE_STATUS, the CVEs would be reported as vulnerable or "open" yes, but the previous analysis would also be present in CVE_STATUS. This should give the context to the person and not requiring them to re-analyse the CVE. Also, I would re-iterate the point that when the status of CVEs is exported out of the SDK, they would be falsely reported under 'Ignored' category. >If you look at comments of entries using this category (7 in oe-core scarthgap) >these CVEs are more or less irrelevant. > >So this patch is from my point of view step in the wrong direction. >If you really need to show these due to your CVE handling process, you can >easily override this variable assignment in your own layer. > >> >> Signed-off-by: Dhairya Nagodra <dnago...@cisco.com> >> --- >> meta/conf/cve-check-map.conf | 4 ++-- >> 1 file changed, 2 insertions(+), 2 deletions(-) >> >> diff --git a/meta/conf/cve-check-map.conf >> b/meta/conf/cve-check-map.conf index b9df41a6f3..7ff53f5601 100644 >> --- a/meta/conf/cve-check-map.conf >> +++ b/meta/conf/cve-check-map.conf >> @@ -15,6 +15,8 @@ CVE_CHECK_STATUSMAP[unpatched] = "Unpatched" >> CVE_CHECK_STATUSMAP[vulnerable-investigating] = "Unpatched" >> # use when CVE fix is not compatible to the current version and cannot be >backported. >> CVE_CHECK_STATUSMAP[cannot-backport] = "Unpatched" >> +# use when upstream acknowledged the vulnerability but does not plan >> +to fix it CVE_CHECK_STATUSMAP[upstream-wontfix] = "Unpatched" >> >> # used for migration from old concept, do not use for new >> vulnerabilities CVE_CHECK_STATUSMAP[ignored] = "Ignored" >> @@ -26,5 +28,3 @@ CVE_CHECK_STATUSMAP[disputed] = "Ignored" >> CVE_CHECK_STATUSMAP[not-applicable-config] = "Ignored" >> # use when vulnerability affects other platform (e.g. Windows or >> Debian) CVE_CHECK_STATUSMAP[not-applicable-platform] = "Ignored" >> -# use when upstream acknowledged the vulnerability but does not plan >> to fix it -CVE_CHECK_STATUSMAP[upstream-wontfix] = "Ignored"
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#202429): https://lists.openembedded.org/g/openembedded-core/message/202429 Mute This Topic: https://lists.openembedded.org/mt/107518628/21656 Group Owner: openembedded-core+ow...@lists.openembedded.org Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [arch...@mail-archive.com] -=-=-=-=-=-=-=-=-=-=-=-