summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorMarta Rybczynska <rybczynska@gmail.com>2025-02-18 16:55:29 +0100
committerSteve Sakoman <steve@sakoman.com>2025-02-28 06:45:14 -0800
commitf93188cb87bebd6bf8b6cf0f18ba4e078feaf12b (patch)
tree179fdb5a4dc2dc08f423d8b638e2970301672b4d
parent23a4190b5662eb36a643827bbbd68d8395a1c91f (diff)
downloadpoky-f93188cb87bebd6bf8b6cf0f18ba4e078feaf12b.tar.gz
vulnerabilities/classes: remove references to cve-check text format
The text format has been removed, so also remove references and examples using this format. Replace with examples with the JSON format. (From yocto-docs rev: 3757ace0581e6279aa7c065b21cee56edfe985dd) Signed-off-by: Marta Rybczynska <marta.rybczynska@ygreky.com> Signed-off-by: Antonin Godard <antonin.godard@bootlin.com> (cherry picked from commit a52cd7bcadccc53e982f90d6e170d00798322597) Signed-off-by: Antonin Godard <antonin.godard@bootlin.com> Signed-off-by: Steve Sakoman <steve@sakoman.com>
-rw-r--r--documentation/dev-manual/vulnerabilities.rst96
-rw-r--r--documentation/ref-manual/classes.rst2
2 files changed, 69 insertions, 29 deletions
diff --git a/documentation/dev-manual/vulnerabilities.rst b/documentation/dev-manual/vulnerabilities.rst
index 1bc2a85929..f5f9fe3a0c 100644
--- a/documentation/dev-manual/vulnerabilities.rst
+++ b/documentation/dev-manual/vulnerabilities.rst
@@ -62,37 +62,77 @@ found in ``build/tmp/deploy/cve``.
62 62
63For example the CVE check report for the ``flex-native`` recipe looks like:: 63For example the CVE check report for the ``flex-native`` recipe looks like::
64 64
65 $ cat poky/build/tmp/deploy/cve/flex-native 65 $ cat ./tmp/deploy/cve/flex-native_cve.json
66 LAYER: meta 66 {
67 PACKAGE NAME: flex-native 67 "version": "1",
68 PACKAGE VERSION: 2.6.4 68 "package": [
69 CVE: CVE-2016-6354 69 {
70 CVE STATUS: Patched 70 "name": "flex-native",
71 CVE SUMMARY: Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read. 71 "layer": "meta",
72 CVSS v2 BASE SCORE: 7.5 72 "version": "2.6.4",
73 CVSS v3 BASE SCORE: 9.8 73 "products": [
74 VECTOR: NETWORK 74 {
75 MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2016-6354 75 "product": "flex",
76 76 "cvesInRecord": "No"
77 LAYER: meta 77 },
78 PACKAGE NAME: flex-native 78 {
79 PACKAGE VERSION: 2.6.4 79 "product": "flex",
80 CVE: CVE-2019-6293 80 "cvesInRecord": "Yes"
81 CVE STATUS: Ignored 81 }
82 CVE SUMMARY: An issue was discovered in the function mark_beginning_as_normal in nfa.c in flex 2.6.4. There is a stack exhaustion problem caused by the mark_beginning_as_normal function making recursive calls to itself in certain scenarios involving lots of '*' characters. Remote attackers could leverage this vulnerability to cause a denial-of-service. 82 ],
83 CVSS v2 BASE SCORE: 4.3 83 "issue": [
84 CVSS v3 BASE SCORE: 5.5 84 {
85 VECTOR: NETWORK 85 "id": "CVE-2006-0459",
86 MORE INFORMATION: https://nvd.nist.gov/vuln/detail/CVE-2019-6293 86 "status": "Patched",
87 "link": "https://nvd.nist.gov/vuln/detail/CVE-2006-0459",
88 "summary": "flex.skl in Will Estes and John Millaway Fast Lexical Analyzer Generator (flex) before 2.5.33 does not allocate enough memory for grammars containing (1) REJECT statements or (2) trailing context rules, which causes flex to generate code that contains a buffer overflow that might allow context-dependent attackers to execute arbitrary code.",
89 "scorev2": "7.5",
90 "scorev3": "0.0",
91 "scorev4": "0.0",
92 "modified": "2024-11-21T00:06Z",
93 "vector": "NETWORK",
94 "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
95 "detail": "version-not-in-range"
96 },
97 {
98 "id": "CVE-2016-6354",
99 "status": "Patched",
100 "link": "https://nvd.nist.gov/vuln/detail/CVE-2016-6354",
101 "summary": "Heap-based buffer overflow in the yy_get_next_buffer function in Flex before 2.6.1 might allow context-dependent attackers to cause a denial of service or possibly execute arbitrary code via vectors involving num_to_read.",
102 "scorev2": "7.5",
103 "scorev3": "9.8",
104 "scorev4": "0.0",
105 "modified": "2024-11-21T02:55Z",
106 "vector": "NETWORK",
107 "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
108 "detail": "version-not-in-range"
109 },
110 {
111 "id": "CVE-2019-6293",
112 "status": "Ignored",
113 "link": "https://nvd.nist.gov/vuln/detail/CVE-2019-6293",
114 "summary": "An issue was discovered in the function mark_beginning_as_normal in nfa.c in flex 2.6.4. There is a stack exhaustion problem caused by the mark_beginning_as_normal function making recursive calls to itself in certain scenarios involving lots of '*' characters. Remote attackers could leverage this vulnerability to cause a denial-of-service.",
115 "scorev2": "4.3",
116 "scorev3": "5.5",
117 "scorev4": "0.0",
118 "modified": "2024-11-21T04:46Z",
119 "vector": "NETWORK",
120 "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
121 "detail": "upstream-wontfix",
122 "description": "there is stack exhaustion but no bug and it is building the parser, not running it, effectively similar to a compiler ICE. Upstream no plans to address this."
123 }
124 ]
125 }
126 ]
127 }
87 128
88For images, a summary of all recipes included in the image and their CVEs is also 129For images, a summary of all recipes included in the image and their CVEs is also
89generated in textual and JSON formats. These ``.cve`` and ``.json`` reports can be found 130generated in the JSON format. These ``.json`` reports can be found
90in the ``tmp/deploy/images`` directory for each compiled image. 131in the ``tmp/deploy/images`` directory for each compiled image.
91 132
92At build time CVE check will also throw warnings about ``Unpatched`` CVEs:: 133At build time CVE check will also throw warnings about ``Unpatched`` CVEs::
93 134
94 WARNING: flex-2.6.4-r0 do_cve_check: Found unpatched CVE (CVE-2019-6293), for more information check /poky/build/tmp/work/core2-64-poky-linux/flex/2.6.4-r0/temp/cve.log 135 WARNING: qemu-native-9.2.0-r0 do_cve_check: Found unpatched CVE (CVE-2023-1386)
95 WARNING: libarchive-3.5.1-r0 do_cve_check: Found unpatched CVE (CVE-2021-36976), for more information check /poky/build/tmp/work/core2-64-poky-linux/libarchive/3.5.1-r0/temp/cve.log
96 136
97It is also possible to check the CVE status of individual packages as follows:: 137It is also possible to check the CVE status of individual packages as follows::
98 138
@@ -111,10 +151,10 @@ upstream `NIST CVE database <https://nvd.nist.gov/>`__.
111 151
112The variable supports using vendor and product names like this:: 152The variable supports using vendor and product names like this::
113 153
114 CVE_PRODUCT = "flex_project:flex" 154 CVE_PRODUCT = "flex_project:flex westes:flex"
115 155
116In this example the vendor name used in the CVE database is ``flex_project`` and the 156In this example we have two possible vendors names, ``flex_project`` and ``westes``,
117product is ``flex``. With this setting the ``flex`` recipe only maps to this specific 157with the product name ``flex``. With this setting the ``flex`` recipe only maps to this specific
118product and not products from other vendors with same name ``flex``. 158product and not products from other vendors with same name ``flex``.
119 159
120Similarly, when the recipe version :term:`PV` is not compatible with software versions used by 160Similarly, when the recipe version :term:`PV` is not compatible with software versions used by
diff --git a/documentation/ref-manual/classes.rst b/documentation/ref-manual/classes.rst
index 5bd1d50947..45973befbe 100644
--- a/documentation/ref-manual/classes.rst
+++ b/documentation/ref-manual/classes.rst
@@ -563,7 +563,7 @@ You can also look for vulnerabilities in specific packages by passing
563``-c cve_check`` to BitBake. 563``-c cve_check`` to BitBake.
564 564
565After building the software with Bitbake, CVE check output reports are available in ``tmp/deploy/cve`` 565After building the software with Bitbake, CVE check output reports are available in ``tmp/deploy/cve``
566and image specific summaries in ``tmp/deploy/images/*.cve`` or ``tmp/deploy/images/*.json`` files. 566and image specific summaries in ``tmp/deploy/images/*.json`` files.
567 567
568When building, the CVE checker will emit build time warnings for any detected 568When building, the CVE checker will emit build time warnings for any detected
569issues which are in the state ``Unpatched``, meaning that CVE issue seems to affect the software component 569issues which are in the state ``Unpatched``, meaning that CVE issue seems to affect the software component