diff options
| author | Antonin Godard <antonin.godard@bootlin.com> | 2025-03-18 15:39:13 +0100 |
|---|---|---|
| committer | Richard Purdie <richard.purdie@linuxfoundation.org> | 2025-03-24 17:32:34 +0000 |
| commit | 869c4f3adbddaf20b456c396a56872d83e9dffb4 (patch) | |
| tree | 566587ea6c7f961633b278b4c08c82231beeb321 /documentation | |
| parent | 7f3dbf4f84bc5efd4b55459972ecb4808fe0fb6f (diff) | |
| download | poky-869c4f3adbddaf20b456c396a56872d83e9dffb4.tar.gz | |
migration-guides/release-notes-5.2: add known issue on stalled NVD
Add an entry to the known issue as the NVD is not up-to-date, the
impact on current CVE reports and future plans for the Yocto Project.
Follows the discussion on:
https://lists.openembedded.org/g/openembedded-core/message/212446
(From yocto-docs rev: c83aa6649fb7bca7e6b393356c8268aa4f18dc4b)
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
Diffstat (limited to 'documentation')
| -rw-r--r-- | documentation/migration-guides/release-notes-5.2.rst | 17 |
1 files changed, 17 insertions, 0 deletions
diff --git a/documentation/migration-guides/release-notes-5.2.rst b/documentation/migration-guides/release-notes-5.2.rst index 417b202cdb..d7115230dc 100644 --- a/documentation/migration-guides/release-notes-5.2.rst +++ b/documentation/migration-guides/release-notes-5.2.rst | |||
| @@ -402,6 +402,23 @@ New Features / Enhancements in |yocto-ver| | |||
| 402 | Known Issues in |yocto-ver| | 402 | Known Issues in |yocto-ver| |
| 403 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 403 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 404 | 404 | ||
| 405 | - The :ref:`ref-classes-cve-check` class is based on the `National | ||
| 406 | Vulnerability Database <https://nvd.nist.gov/>`__ (NVD). Since the beginning | ||
| 407 | of 2024, the maintainers of this database have stopped annotating CVEs with | ||
| 408 | the affected CPEs. This prevents the :ref:`ref-classes-cve-check` class to | ||
| 409 | properly report CVEs as CPEs are used to match Yocto recipes with CVEs | ||
| 410 | affecting them. As a result, the current CVE reports may look good but the | ||
| 411 | reality is that some vulnerabilities are just not reported. | ||
| 412 | |||
| 413 | During that time, users may look up the 'CVE database | ||
| 414 | <https://www.cve.org/>'__ for entries concerning software they use, or follow | ||
| 415 | release notes of such projects closely. | ||
| 416 | |||
| 417 | Please note, that the :ref:`ref-classes-cve-check` tool has always been a | ||
| 418 | helper tool, and users are advised to always review the final result. Results | ||
| 419 | of an automatic scan may not take into account configuration options, | ||
| 420 | compiler options and other factors. | ||
| 421 | |||
| 405 | Recipe License changes in |yocto-ver| | 422 | Recipe License changes in |yocto-ver| |
| 406 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ | 423 | ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ |
| 407 | 424 | ||
