mirror of
https://git.yoctoproject.org/poky
synced 2026-04-18 21:32:12 +02:00
cve-check: ensure all known CVEs are in the report
CVEs that are whitelisted or were not vulnerable when there are version comparisons were not included in the report, so alter the logic to ensure that all relevant CVEs are in the report for completeness. (From OE-Core rev: 29d926802e7f8b4614a2dafa0af4c923912e1811) Signed-off-by: Ross Burton <ross.burton@intel.com> Signed-off-by: Armin Kuster <akuster808@gmail.com> Signed-off-by: Richard Purdie <richard.purdie@linuxfoundation.org>
This commit is contained in:
committed by
Richard Purdie
parent
9c38686e17
commit
faf0ebf337
@@ -208,12 +208,14 @@ def check_cves(d, patched_cves):
|
||||
|
||||
if cve in cve_whitelist:
|
||||
bb.note("%s-%s has been whitelisted for %s" % (product, pv, cve))
|
||||
# TODO: this should be in the report as 'whitelisted'
|
||||
patched_cves.add(cve)
|
||||
elif cve in patched_cves:
|
||||
bb.note("%s has been patched" % (cve))
|
||||
else:
|
||||
to_append = False
|
||||
if (operator_start == '=' and pv == version_start):
|
||||
cves_unpatched.append(cve)
|
||||
to_append = True
|
||||
else:
|
||||
if operator_start:
|
||||
try:
|
||||
@@ -243,8 +245,11 @@ def check_cves(d, patched_cves):
|
||||
to_append = to_append_start or to_append_end
|
||||
|
||||
if to_append:
|
||||
bb.note("%s-%s is vulnerable to %s" % (product, pv, cve))
|
||||
cves_unpatched.append(cve)
|
||||
bb.debug(2, "%s-%s is not patched for %s" % (product, pv, cve))
|
||||
else:
|
||||
bb.note("%s-%s is not vulnerable to %s" % (product, pv, cve))
|
||||
patched_cves.add(cve)
|
||||
conn.close()
|
||||
|
||||
return (list(patched_cves), cves_unpatched)
|
||||
|
||||
Reference in New Issue
Block a user