mirror of
https://git.yoctoproject.org/poky
synced 2026-03-25 19:02:23 +01:00
improve_kernel_cve_report: do not override backported-patch
If the user has a CVE_STATUS for their own backported patch, the backport takes priority over upstream vulnerable versions. (From OE-Core rev: d317e2a52bd29a772de9bcd751f5b0e03277bd77) Signed-off-by: Daniel Turull <daniel.turull@ericsson.com> Signed-off-by: Antonin Godard <antonin.godard@bootlin.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org> (cherry picked from commit 0beef05be119ea465ba06553a42edea03dfc9fd3) Signed-off-by: Himanshu Jadon <hjadon@cisco.com> Signed-off-by: Yoann Congal <yoann.congal@smile.fr> Signed-off-by: Paul Barker <paul@pbarker.dev>
This commit is contained in:
committed by
Paul Barker
parent
f7363369bf
commit
eb31e34477
@@ -340,6 +340,10 @@ def cve_update(cve_data, cve, entry):
|
||||
if cve_data[cve]['status'] == entry['status']:
|
||||
return
|
||||
if entry['status'] == "Unpatched" and cve_data[cve]['status'] == "Patched":
|
||||
# Backported-patch (e.g. vendor kernel repo with cherry-picked CVE patch)
|
||||
# has priority over unpatch from CNA
|
||||
if cve_data[cve]['detail'] == "backported-patch":
|
||||
return
|
||||
logging.warning("CVE entry %s update from Patched to Unpatched from the scan result", cve)
|
||||
cve_data[cve] = copy_data(cve_data[cve], entry)
|
||||
return
|
||||
|
||||
Reference in New Issue
Block a user