<feed xmlns='http://www.w3.org/2005/Atom'>
<title>linux/poky.git/meta/classes/cve-check.bbclass, branch master-next2</title>
<subtitle>Mirror of git.yoctoproject.org/poky</subtitle>
<id>https://git.enea.com/cgit/linux/poky.git/atom?h=master-next2</id>
<link rel='self' href='https://git.enea.com/cgit/linux/poky.git/atom?h=master-next2'/>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/'/>
<updated>2019-07-19T07:41:40+00:00</updated>
<entry>
<title>cve-update-db-native: Remove hash column from database.</title>
<updated>2019-07-19T07:41:40+00:00</updated>
<author>
<name>Pierre Le Magourou</name>
<email>pierre.lemagourou@softbankrobotics.com</email>
</author>
<published>2019-07-18T12:41:19+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=050a96fe030f5669898e8cc6589d37b1e3da365b'/>
<id>urn:sha1:050a96fe030f5669898e8cc6589d37b1e3da365b</id>
<content type='text'>
djb2 hash algorithm was found to do collisions, so the database was
sometime missing data. Remove this hash mechanism, clear and populate
elements from scratch in PRODUCTS table if the current year needs an
update.

(From OE-Core rev: 78de2cb39d74b030cd4ec811bf6f9a6daa003d19)

Signed-off-by: Pierre Le Magourou &lt;pierre.lemagourou@softbankrobotics.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>cve-check: Replace CVE_CHECK_CVE_WHITELIST by CVE_CHECK_WHITELIST</title>
<updated>2019-07-19T07:41:40+00:00</updated>
<author>
<name>Pierre Le Magourou</name>
<email>pierre.lemagourou@softbankrobotics.com</email>
</author>
<published>2019-07-18T12:41:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=4b8a6f4929eb2b843fa237e21fc5c5dce3b1f9f0'/>
<id>urn:sha1:4b8a6f4929eb2b843fa237e21fc5c5dce3b1f9f0</id>
<content type='text'>
CVE_CHECK_WHITELIST does not contain version anymore, as it was not
used. This variable should be set per recipe.

(From OE-Core rev: 7069302a4ccbb5b72e1902f284cf078516fd7294)

Signed-off-by: Pierre Le Magourou &lt;pierre.lemagourou@softbankrobotics.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>cve-check: allow comparison of Vendor as well as Product</title>
<updated>2019-07-18T11:16:19+00:00</updated>
<author>
<name>Ross Burton</name>
<email>ross.burton@intel.com</email>
</author>
<published>2019-07-17T10:45:36+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=a78725c81f78559a4223fd6822c5b886772cca4c'/>
<id>urn:sha1:a78725c81f78559a4223fd6822c5b886772cca4c</id>
<content type='text'>
Some product names are too vague to be searched without also matching the
vendor, for example Flex could be the parser compiler we ship, or Adobe Flex, or
Apache Flex, or IBM Flex.

If entries in CVE_PRODUCT contain a colon then split it as vendor:product to improve the search.

Also don't use .format() to construct SQL as that can lead to security
issues. Instead, use ? placeholders and lets sqlite3 handle the escaping.

(From OE-Core rev: e6bf90009877d00243417898700d2320fd87b39c)

Signed-off-by: Ross Burton &lt;ross.burton@intel.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>cve-check.bbclass: initialize to_append</title>
<updated>2019-07-18T11:16:19+00:00</updated>
<author>
<name>Mikko Rapeli</name>
<email>mikko.rapeli@bmw.de</email>
</author>
<published>2019-07-17T09:08:37+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=9f6dcdaf96ecad8de945859fac6487664e4526c1'/>
<id>urn:sha1:9f6dcdaf96ecad8de945859fac6487664e4526c1</id>
<content type='text'>
Fixes build failure with core-image-minimal:

Exception: UnboundLocalError: local variable 'to_append' referenced before assignment

(From OE-Core rev: 270ac00cb43d0614dfe1c95f960c76e9e5fa20d4)

Signed-off-by: Mikko Rapeli &lt;mikko.rapeli@bmw.de&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>glibc: exclude child recipes from CVE scanning</title>
<updated>2019-07-17T08:36:35+00:00</updated>
<author>
<name>Ross Burton</name>
<email>ross.burton@intel.com</email>
</author>
<published>2019-07-16T12:47:21+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=c75f0e92473906899950ce6b059fe6ab2cb41b5c'/>
<id>urn:sha1:c75f0e92473906899950ce6b059fe6ab2cb41b5c</id>
<content type='text'>
As glibc will be scanned for CVEs, we don't need to scan glibc-locale,
glibc-mtrace, and glibc-scripts which are all separate recipes for technical
reasons.

Exclude the recipes by setting CVE_PRODUCT in the recipe, instead of using the
global whitelist.

(From OE-Core rev: 1f9a963b9ff7ebe052ba54b9fcbdf7d09478dd17)

Signed-off-by: Ross Burton &lt;ross.burton@intel.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>cve-check: remove redundant readline CVE whitelisting</title>
<updated>2019-07-17T08:36:35+00:00</updated>
<author>
<name>Ross Burton</name>
<email>ross.burton@intel.com</email>
</author>
<published>2019-07-16T12:46:43+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=91f6c9f3ee51f3dd290993748cda9da5b53cb834'/>
<id>urn:sha1:91f6c9f3ee51f3dd290993748cda9da5b53cb834</id>
<content type='text'>
CVE-2014-2524 is a readline CVE that was fixed in 6.3patch3 onwards, but the
tooling wasn't able to detect this version.  As we now ship readline 8 we don't
need to manually whitelist it, and if we did then the whitelisting should be in
the readline recipe.

(From OE-Core rev: 07bb8b25e172aa5c8ae96b6e8eb4ac901b835219)

Signed-off-by: Ross Burton &lt;ross.burton@intel.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>cve-check: Update unpatched CVE matching</title>
<updated>2019-07-09T22:30:44+00:00</updated>
<author>
<name>Pierre Le Magourou</name>
<email>pierre.lemagourou@softbankrobotics.com</email>
</author>
<published>2019-07-05T09:40:38+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=8073a9862e95947755861879ea19782316db5bc5'/>
<id>urn:sha1:8073a9862e95947755861879ea19782316db5bc5</id>
<content type='text'>
Now that cve-update-db added CPE information to NVD database. We can
check for unpatched versions with operators '&lt;', '&lt;=', '&gt;', and '&gt;='.

(From OE-Core rev: bc0195be1b15bcffe60127bc5e8b7011a853c2ed)

Signed-off-by: Pierre Le Magourou &lt;pierre.lemagourou@softbankrobotics.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>cve-check: Depends on cve-update-db-native</title>
<updated>2019-07-09T22:30:44+00:00</updated>
<author>
<name>Pierre Le Magourou</name>
<email>pierre.lemagourou@softbankrobotics.com</email>
</author>
<published>2019-07-05T09:40:36+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=8f81d2e863283557e360a0cb4cdcb70a94ce0a8c'/>
<id>urn:sha1:8f81d2e863283557e360a0cb4cdcb70a94ce0a8c</id>
<content type='text'>
do_populate_cve_db is a native task.

(From OE-Core rev: 4078da92b49946848cddebe1735f301af161e162)

Signed-off-by: Pierre Le Magourou &lt;pierre.lemagourou@softbankrobotics.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>cve-update-db: Catch request.urlopen errors.</title>
<updated>2019-07-05T11:00:20+00:00</updated>
<author>
<name>Pierre Le Magourou</name>
<email>pierre.lemagourou@softbankrobotics.com</email>
</author>
<published>2019-07-03T09:35:06+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=4a68a44f56c725914cfa721993a2ea8a3dc6ebd5'/>
<id>urn:sha1:4a68a44f56c725914cfa721993a2ea8a3dc6ebd5</id>
<content type='text'>
If the NVD url is not accessible, print a warning on top of the CVE
report, and continue. The database will not be fully updated, but
cve_check can still run on the previous database.

(From OE-Core rev: 0325dd72714f0b447558084f481b77f0ec850eed)

Signed-off-by: Pierre Le Magourou &lt;pierre.lemagourou@softbankrobotics.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
<entry>
<title>cve-check: be idiomatic</title>
<updated>2019-06-27T11:20:35+00:00</updated>
<author>
<name>Ross Burton</name>
<email>ross.burton@intel.com</email>
</author>
<published>2019-06-24T10:42:55+00:00</published>
<link rel='alternate' type='text/html' href='https://git.enea.com/cgit/linux/poky.git/commit/?id=db98b1ef483c6e0f4a31c752aed1a2c5b2780ced'/>
<id>urn:sha1:db98b1ef483c6e0f4a31c752aed1a2c5b2780ced</id>
<content type='text'>
Instead of generating a series of indexes via range(len(list)), just iterate the
list.

(From OE-Core rev: 27eb839ee651c2d584db42d23bcf5dd764eb33f1)

Signed-off-by: Ross Burton &lt;ross.burton@intel.com&gt;
Signed-off-by: Richard Purdie &lt;richard.purdie@linuxfoundation.org&gt;
</content>
</entry>
</feed>
