From: Het Patel <[email protected]> The patches address the following bugs:
1. Incomplete CVE Assessment Details: Currently, the `detail` field is missing for approximately 81% of entries, rendering reports unreliable for auditing. These changes ensure that the rationale for a "Patched" or "Unpatched" assessment is properly recorded, allowing for a clear distinction between version-based assessments and missing data. 2. Runtime Warnings: Corrects four instances where debug calls were missing the required log level parameter. This change eliminates the runtime warnings that currently trigger during every CVE scan. Testing: - Applied cleanly to the current `scarthgap` HEAD. - Verified via a full CVE scan. - Confirmed that all existing CVE statuses are preserved with no regressions observed. Het Patel (4): cve-check: encode affected product/vendor in CVE_STATUS cve-check: annotate CVEs during analysis cve-check-map: add new statuses cve-check: fix debug message meta/classes/cve-check.bbclass | 246 +++++++++++++++++++++-------------------- meta/conf/cve-check-map.conf | 9 + meta/lib/oe/cve_check.py | 74 +++++++++--- 3 files changed, 197 insertions(+), 132 deletions(-)
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#233362): https://lists.openembedded.org/g/openembedded-core/message/233362 Mute This Topic: https://lists.openembedded.org/mt/118378623/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
