summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorAndrej Valek <andrej.valek@siemens.com>2023-07-26 11:50:09 +0200
committerKhem Raj <raj.khem@gmail.com>2023-07-27 08:54:40 -0700
commit8af2f17a6fa8bf282c4c27054adbea1bf0873069 (patch)
tree22b6484379a0f3d3e2b89f958dda0fd45f2a1880
parent4c201ede939610946847ccd4221320ed776224aa (diff)
downloadmeta-openembedded-8af2f17a6fa8bf282c4c27054adbea1bf0873069.tar.gz
cve_check: convert CVE_CHECK_IGNORE to CVE_STATUS
- Try to add convert and apply statuses for old CVEs - Drop some obsolete ignores, while they are not relevant for current version Signed-off-by: Andrej Valek <andrej.valek@siemens.com> Signed-off-by: Khem Raj <raj.khem@gmail.com>
-rw-r--r--meta-initramfs/recipes-devtools/dracut/dracut_056.bb3
-rw-r--r--meta-networking/recipes-connectivity/freeradius/freeradius_3.0.26.bb6
-rw-r--r--meta-networking/recipes-connectivity/mbedtls/mbedtls_2.28.3.bb6
-rw-r--r--meta-networking/recipes-connectivity/mbedtls/mbedtls_3.4.0.bb5
-rw-r--r--meta-networking/recipes-connectivity/openthread/wpantund_git.bb9
-rw-r--r--meta-networking/recipes-connectivity/samba/samba_4.18.4.bb7
-rw-r--r--meta-networking/recipes-protocols/mdns/mdns_1790.80.10.bb22
-rw-r--r--meta-networking/recipes-protocols/openflow/openflow.inc12
-rw-r--r--meta-networking/recipes-support/dovecot/dovecot_2.3.20.bb3
-rw-r--r--meta-networking/recipes-support/ntp/ntp_4.2.8p17.bb12
-rw-r--r--meta-networking/recipes-support/openvpn/openvpn_2.6.3.bb3
-rw-r--r--meta-networking/recipes-support/spice/spice_git.bb6
-rw-r--r--meta-oe/dynamic-layers/meta-python/recipes-dbs/mongodb/mongodb_git.bb7
-rw-r--r--meta-oe/recipes-connectivity/libtorrent/libtorrent_git.bb4
-rw-r--r--meta-oe/recipes-core/emlog/emlog_git.bb8
-rw-r--r--meta-oe/recipes-dbs/postgresql/postgresql_15.3.bb4
-rw-r--r--meta-oe/recipes-devtools/flatbuffers/flatbuffers.bb2
-rw-r--r--meta-oe/recipes-devtools/php/php_8.2.8.bb4
-rw-r--r--meta-oe/recipes-devtools/uw-imap/uw-imap_2007f.bb4
-rw-r--r--meta-oe/recipes-extended/libimobiledevice/libplist_2.3.0.bb4
-rw-r--r--meta-oe/recipes-extended/libimobiledevice/libplist_git.bb4
-rw-r--r--meta-oe/recipes-extended/libzip/libzip_1.10.0.bb3
-rw-r--r--meta-oe/recipes-extended/sanlock/sanlock_3.8.5.bb4
-rw-r--r--meta-oe/recipes-extended/sblim-sfcb/sblim-sfcb_1.4.9.bb4
-rw-r--r--meta-oe/recipes-graphics/graphviz/graphviz_8.1.0.bb4
-rw-r--r--meta-oe/recipes-graphics/jasper/jasper_2.0.33.bb4
-rw-r--r--meta-oe/recipes-graphics/libsdl/libsdl_1.2.15.bb3
-rw-r--r--meta-oe/recipes-networking/cyrus-sasl/cyrus-sasl_2.1.28.bb3
-rw-r--r--meta-oe/recipes-support/atop/atop_2.4.0.bb4
-rw-r--r--meta-oe/recipes-support/emacs/emacs_28.2.bb4
-rw-r--r--meta-oe/recipes-support/nss/nss_3.74.bb12
-rw-r--r--meta-oe/recipes-support/openldap/openldap_2.5.13.bb3
-rw-r--r--meta-oe/recipes-support/pidgin/pidgin_2.14.2.bb6
33 files changed, 60 insertions, 129 deletions
diff --git a/meta-initramfs/recipes-devtools/dracut/dracut_056.bb b/meta-initramfs/recipes-devtools/dracut/dracut_056.bb
index 989a37a877..db08fffe9a 100644
--- a/meta-initramfs/recipes-devtools/dracut/dracut_056.bb
+++ b/meta-initramfs/recipes-devtools/dracut/dracut_056.bb
@@ -68,5 +68,4 @@ RRECOMMENDS:${PN} = " \
68 coreutils \ 68 coreutils \
69 " 69 "
70 70
71# CVE-2010-4176 affects only Fedora 71CVE_STATUS[CVE-2010-4176] = "not-applicable-platform: Applies only to Fedora"
72CVE_CHECK_IGNORE += "CVE-2010-4176"
diff --git a/meta-networking/recipes-connectivity/freeradius/freeradius_3.0.26.bb b/meta-networking/recipes-connectivity/freeradius/freeradius_3.0.26.bb
index 9a2bbab39f..35733c5307 100644
--- a/meta-networking/recipes-connectivity/freeradius/freeradius_3.0.26.bb
+++ b/meta-networking/recipes-connectivity/freeradius/freeradius_3.0.26.bb
@@ -43,10 +43,8 @@ SRCREV = "d956f683d37ea40e7977cc5907361f3e6988a439"
43 43
44UPSTREAM_CHECK_GITTAGREGEX = "release_(?P<pver>\d+(\_\d+)+)" 44UPSTREAM_CHECK_GITTAGREGEX = "release_(?P<pver>\d+(\_\d+)+)"
45 45
46CVE_CHECK_IGNORE = "\ 46CVE_CHECK_STATUS[CVE-2002-0318] = "fixed-version: The CPE in the NVD database doesn't reflect correctly the vulnerable versions."
47 CVE-2002-0318 \ 47CVE_CHECK_STATUS[CVE-2011-4966] = "fixed-version: The CPE in the NVD database doesn't reflect correctly the vulnerable versions."
48 CVE-2011-4966 \
49"
50 48
51PARALLEL_MAKE = "" 49PARALLEL_MAKE = ""
52 50
diff --git a/meta-networking/recipes-connectivity/mbedtls/mbedtls_2.28.3.bb b/meta-networking/recipes-connectivity/mbedtls/mbedtls_2.28.3.bb
index ce094d5afb..fff320afd8 100644
--- a/meta-networking/recipes-connectivity/mbedtls/mbedtls_2.28.3.bb
+++ b/meta-networking/recipes-connectivity/mbedtls/mbedtls_2.28.3.bb
@@ -57,10 +57,8 @@ BBCLASSEXTEND = "native nativesdk"
57 57
58CVE_PRODUCT = "mbed_tls" 58CVE_PRODUCT = "mbed_tls"
59 59
60# Fix merged upstream https://github.com/Mbed-TLS/mbedtls/pull/5310 60CVE_STATUS[CVE-2021-43666] = "backported-patch: Fix merged upstream https://github.com/Mbed-TLS/mbedtls/pull/5310"
61CVE_CHECK_IGNORE += "CVE-2021-43666" 61CVE_STATUS[CVE-2021-43666] = "backported-patch: Fix merged upstream https://github.com/Mbed-TLS/mbedtls/commit/9a4a9c66a48edfe9ece03c7e4a53310adf73a86c"
62# Fix merged upstream https://github.com/Mbed-TLS/mbedtls/commit/9a4a9c66a48edfe9ece03c7e4a53310adf73a86c
63CVE_CHECK_IGNORE += "CVE-2021-45451"
64 62
65# Strip host paths from autogenerated test files 63# Strip host paths from autogenerated test files
66do_compile:append() { 64do_compile:append() {
diff --git a/meta-networking/recipes-connectivity/mbedtls/mbedtls_3.4.0.bb b/meta-networking/recipes-connectivity/mbedtls/mbedtls_3.4.0.bb
index b8c9662de7..10fb7de8ca 100644
--- a/meta-networking/recipes-connectivity/mbedtls/mbedtls_3.4.0.bb
+++ b/meta-networking/recipes-connectivity/mbedtls/mbedtls_3.4.0.bb
@@ -58,11 +58,6 @@ BBCLASSEXTEND = "native nativesdk"
58 58
59CVE_PRODUCT = "mbed_tls" 59CVE_PRODUCT = "mbed_tls"
60 60
61# Fix merged upstream https://github.com/Mbed-TLS/mbedtls/pull/5310
62CVE_CHECK_IGNORE += "CVE-2021-43666"
63# Fix merged upstream https://github.com/Mbed-TLS/mbedtls/commit/9a4a9c66a48edfe9ece03c7e4a53310adf73a86c
64CVE_CHECK_IGNORE += "CVE-2021-45451"
65
66# Strip host paths from autogenerated test files 61# Strip host paths from autogenerated test files
67do_compile:append() { 62do_compile:append() {
68 sed -i 's+${S}/++g' ${B}/tests/*.c 2>/dev/null || : 63 sed -i 's+${S}/++g' ${B}/tests/*.c 2>/dev/null || :
diff --git a/meta-networking/recipes-connectivity/openthread/wpantund_git.bb b/meta-networking/recipes-connectivity/openthread/wpantund_git.bb
index a7fcc202a4..ebb3fc3c1c 100644
--- a/meta-networking/recipes-connectivity/openthread/wpantund_git.bb
+++ b/meta-networking/recipes-connectivity/openthread/wpantund_git.bb
@@ -22,11 +22,8 @@ S = "${WORKDIR}/git"
22 22
23inherit pkgconfig perlnative autotools 23inherit pkgconfig perlnative autotools
24 24
25# CVE-2020-8916 has been fixed in commit
26# 3f108441e23e033b936e85be5b6877dd0a1fbf1c which is included in the SRCREV
27# CVE-2021-33889 has been fixed in commit
28# a8f3f761f6753b567d1e5ad22cbe6b0ceb6f2649 which is included in the SRCREV
29# There has not been a wpantund release as of yet that includes these fixes. 25# There has not been a wpantund release as of yet that includes these fixes.
30# That means cve-check can not match them. Once a new release comes we can 26# That means cve-check can not match them. Once a new release comes we can
31# remove the ignore statement. 27# remove the statement.
32CVE_CHECK_IGNORE = "CVE-2020-8916 CVE-2021-33889" 28CVE_STATUS[CVE-2020-8916] = "backported-patch: fixed via 3f108441e23e033b936e85be5b6877dd0a1fbf1c"
29CVE_STATUS[CVE-2021-33889] = "backported-patch: fixed via 3f108441e23e033b936e85be5b6877dd0a1fbf1c"
diff --git a/meta-networking/recipes-connectivity/samba/samba_4.18.4.bb b/meta-networking/recipes-connectivity/samba/samba_4.18.4.bb
index 66089edad5..3386b93b5e 100644
--- a/meta-networking/recipes-connectivity/samba/samba_4.18.4.bb
+++ b/meta-networking/recipes-connectivity/samba/samba_4.18.4.bb
@@ -38,12 +38,7 @@ UPSTREAM_CHECK_REGEX = "samba\-(?P<pver>4\.18(\.\d+)+).tar.gz"
38 38
39inherit systemd waf-samba cpan-base perlnative update-rc.d perl-version pkgconfig 39inherit systemd waf-samba cpan-base perlnative update-rc.d perl-version pkgconfig
40 40
41# CVE-2011-2411 is valnerble only on HP NonStop Servers. 41CVE_STATUS[CVE-2011-2411] = "not-applicable-platform: vulnerable only on HP NonStop Servers"
42CVE_CHECK_IGNORE += "CVE-2011-2411"
43# Patch for CVE-2018-1050 is applied in version 4.5.15, 4.6.13, 4.7.5.
44CVE_CHECK_IGNORE += "CVE-2018-1050"
45# Patch for CVE-2018-1057 is applied in version 4.3.13, 4.4.16.
46CVE_CHECK_IGNORE += "CVE-2018-1057"
47 42
48# remove default added RDEPENDS on perl 43# remove default added RDEPENDS on perl
49RDEPENDS:${PN}:remove = "perl" 44RDEPENDS:${PN}:remove = "perl"
diff --git a/meta-networking/recipes-protocols/mdns/mdns_1790.80.10.bb b/meta-networking/recipes-protocols/mdns/mdns_1790.80.10.bb
index 46f1b70cb7..aff7954f50 100644
--- a/meta-networking/recipes-protocols/mdns/mdns_1790.80.10.bb
+++ b/meta-networking/recipes-protocols/mdns/mdns_1790.80.10.bb
@@ -46,18 +46,16 @@ PACKAGECONFIG[tls] = ",tls=no,mbedtls"
46 46
47CVE_PRODUCT = "apple:mdnsresponder" 47CVE_PRODUCT = "apple:mdnsresponder"
48 48
49# CVE-2007-0613 is not applicable as it only affects Apple products 49CVE_STATUS[CVE-2007-0613] = "not-applicable-platform: Issue affects Apple products \
50# i.e. ichat,mdnsresponder, instant message framework and MacOS. 50i.e. ichat,mdnsresponder, instant message framework and MacOS. Also, \
51# Also, https://www.exploit-db.com/exploits/3230 shows the part of code 51https://www.exploit-db.com/exploits/3230 shows the part of code \
52# affected by CVE-2007-0613 which is not preset in upstream source code. 52affected by CVE-2007-0613 which is not preset in upstream source code. \
53# Hence, CVE-2007-0613 does not affect other Yocto implementations and 53Hence, CVE-2007-0613 does not affect other Yocto implementations and \
54# is not reported for other distros can be marked whitelisted. 54is not reported for other distros can be marked whitelisted. \
55# Links: 55Links: https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613 \
56# https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613 56https://www.incibe-cert.es/en/early-warning/vulnerabilities/cve-2007-0613 \
57# https://www.incibe-cert.es/en/early-warning/vulnerabilities/cve-2007-0613 57https://security-tracker.debian.org/tracker/CVE-2007-0613 \
58# https://security-tracker.debian.org/tracker/CVE-2007-0613 58https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613"
59# https://vulmon.com/vulnerabilitydetails?qid=CVE-2007-0613
60CVE_CHECK_IGNORE += "CVE-2007-0613"
61 59
62PARALLEL_MAKE = "" 60PARALLEL_MAKE = ""
63 61
diff --git a/meta-networking/recipes-protocols/openflow/openflow.inc b/meta-networking/recipes-protocols/openflow/openflow.inc
index aaad0e00e1..7062d21462 100644
--- a/meta-networking/recipes-protocols/openflow/openflow.inc
+++ b/meta-networking/recipes-protocols/openflow/openflow.inc
@@ -13,10 +13,10 @@ LIC_FILES_CHKSUM = "file://COPYING;md5=e870c934e2c3d6ccf085fd7cf0a1e2e2"
13 13
14SRC_URI = "git://gitosis.stanford.edu/openflow.git;protocol=git;branch=master" 14SRC_URI = "git://gitosis.stanford.edu/openflow.git;protocol=git;branch=master"
15 15
16CVE_CHECK_IGNORE = "\ 16CVE_STATUS[CVE-2015-1611] = "not-applicable-config: Not referred to our implementation of openflow"
17 CVE-2015-1611 \ 17CVE_STATUS[CVE-2015-1612] = "not-applicable-config: Not referred to our implementation of openflow"
18 CVE-2015-1612 \ 18CVE_STATUS[CVE-2018-1078] = "cpe-incorrect: This CVE is not for this product but cve-check assumes it is \
19" 19because two CPE collides when checking the NVD database"
20 20
21DEPENDS = "virtual/libc" 21DEPENDS = "virtual/libc"
22 22
@@ -58,7 +58,3 @@ do_install:append() {
58} 58}
59 59
60FILES:${PN} += "${nonarch_libdir}/tmpfiles.d" 60FILES:${PN} += "${nonarch_libdir}/tmpfiles.d"
61
62# This CVE is not for this product but cve-check assumes it is
63# because two CPE collides when checking the NVD database
64CVE_CHECK_IGNORE = "CVE-2018-1078"
diff --git a/meta-networking/recipes-support/dovecot/dovecot_2.3.20.bb b/meta-networking/recipes-support/dovecot/dovecot_2.3.20.bb
index 01e060e2f5..e41dd93f5d 100644
--- a/meta-networking/recipes-support/dovecot/dovecot_2.3.20.bb
+++ b/meta-networking/recipes-support/dovecot/dovecot_2.3.20.bb
@@ -71,5 +71,4 @@ FILES:${PN}-staticdev += "${libdir}/dovecot/*/*.a"
71FILES:${PN}-dev += "${libdir}/dovecot/libdovecot*.so" 71FILES:${PN}-dev += "${libdir}/dovecot/libdovecot*.so"
72FILES:${PN}-dbg += "${libdir}/dovecot/*/.debug" 72FILES:${PN}-dbg += "${libdir}/dovecot/*/.debug"
73 73
74# CVE-2016-4983 affects only postinstall script on specific distribution 74CVE_STATUS[CVE-2016-4983] = "not-applicable-platform: Affects only postinstall script on specific distribution."
75CVE_CHECK_IGNORE += "CVE-2016-4983"
diff --git a/meta-networking/recipes-support/ntp/ntp_4.2.8p17.bb b/meta-networking/recipes-support/ntp/ntp_4.2.8p17.bb
index fba4611b99..e80ea4c149 100644
--- a/meta-networking/recipes-support/ntp/ntp_4.2.8p17.bb
+++ b/meta-networking/recipes-support/ntp/ntp_4.2.8p17.bb
@@ -26,12 +26,11 @@ SRC_URI = "http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-4.2/ntp-${PV}.tar.g
26 26
27SRC_URI[sha256sum] = "103dd272e6a66c5b8df07dce5e9a02555fcd6f1397bdfb782237328e89d3a866" 27SRC_URI[sha256sum] = "103dd272e6a66c5b8df07dce5e9a02555fcd6f1397bdfb782237328e89d3a866"
28 28
29# CVE-2016-9312 is only for windows. 29CVE_STATUS[CVE-2016-9312] = "not-applicable-platform: Issue only applies on Windows"
30# CVE-2019-11331 is inherent to RFC 5905 and cannot be fixed without breaking compatibility 30CVE_STATUS[CVE-2019-11331] = "upstream-wontfix: inherent to RFC 5905 and cannot be fixed without breaking compatibility"
31# The other CVEs are not correctly identified because cve-check 31CVE_STATUS_GROUPS += "CVE_STATUS_NTP"
32# is not able to check the version correctly (it only checks for 4.2.8 omitting p15 that makes the difference) 32CVE_STATUS_NTP[status] = "fixed-version: Yocto CVE check can not handle 'p' in ntp version"
33CVE_CHECK_IGNORE += "\ 33CVE_STATUS_NTP = " \
34 CVE-2016-9312 \
35 CVE-2015-5146 \ 34 CVE-2015-5146 \
36 CVE-2015-5300 \ 35 CVE-2015-5300 \
37 CVE-2015-7975 \ 36 CVE-2015-7975 \
@@ -51,7 +50,6 @@ CVE_CHECK_IGNORE += "\
51 CVE-2016-7433 \ 50 CVE-2016-7433 \
52 CVE-2016-9310 \ 51 CVE-2016-9310 \
53 CVE-2016-9311 \ 52 CVE-2016-9311 \
54 CVE-2019-11331 \
55" 53"
56 54
57 55
diff --git a/meta-networking/recipes-support/openvpn/openvpn_2.6.3.bb b/meta-networking/recipes-support/openvpn/openvpn_2.6.3.bb
index 76bce7db53..a5fc158749 100644
--- a/meta-networking/recipes-support/openvpn/openvpn_2.6.3.bb
+++ b/meta-networking/recipes-support/openvpn/openvpn_2.6.3.bb
@@ -16,8 +16,7 @@ UPSTREAM_CHECK_URI = "https://openvpn.net/community-downloads"
16 16
17SRC_URI[sha256sum] = "13b207a376d8880507c74ff78aabc3778a9da47c89f1e247dcee3c7237138ff6" 17SRC_URI[sha256sum] = "13b207a376d8880507c74ff78aabc3778a9da47c89f1e247dcee3c7237138ff6"
18 18
19# CVE-2020-7224 and CVE-2020-27569 are for Aviatrix OpenVPN client, not for openvpn. 19CVE_STATUS[CVE-2020-27569] = "not-applicable-config: Applies only Aviatrix OpenVPN client, not openvpn"
20CVE_CHECK_IGNORE += "CVE-2020-7224 CVE-2020-27569"
21 20
22INITSCRIPT_PACKAGES = "${PN}" 21INITSCRIPT_PACKAGES = "${PN}"
23INITSCRIPT_NAME:${PN} = "openvpn" 22INITSCRIPT_NAME:${PN} = "openvpn"
diff --git a/meta-networking/recipes-support/spice/spice_git.bb b/meta-networking/recipes-support/spice/spice_git.bb
index b3e687476b..5732f509b1 100644
--- a/meta-networking/recipes-support/spice/spice_git.bb
+++ b/meta-networking/recipes-support/spice/spice_git.bb
@@ -30,11 +30,7 @@ SRC_URI = " \
30 30
31S = "${WORKDIR}/git" 31S = "${WORKDIR}/git"
32 32
33CVE_CHECK_IGNORE += "\ 33CVE_STATUS[CVE-2018-10893] = "fixed-version: patched already, caused by inaccurate CPE in the NVD database."
34 CVE-2016-0749 \
35 CVE-2016-2150 \
36 CVE-2018-10893 \
37"
38 34
39inherit autotools gettext python3native python3-dir pkgconfig 35inherit autotools gettext python3native python3-dir pkgconfig
40 36
diff --git a/meta-oe/dynamic-layers/meta-python/recipes-dbs/mongodb/mongodb_git.bb b/meta-oe/dynamic-layers/meta-python/recipes-dbs/mongodb/mongodb_git.bb
index 550fbc30d3..0ce58b13c4 100644
--- a/meta-oe/dynamic-layers/meta-python/recipes-dbs/mongodb/mongodb_git.bb
+++ b/meta-oe/dynamic-layers/meta-python/recipes-dbs/mongodb/mongodb_git.bb
@@ -50,11 +50,8 @@ SRC_URI:append:toolchain-clang = "\
50 50
51S = "${WORKDIR}/git" 51S = "${WORKDIR}/git"
52 52
53CVE_CHECK_IGNORE += "\ 53CVE_STATUS[CVE-2014-8180] = "not-applicable-config: Not affecting our configuration so it can be safely ignored."
54 CVE-2014-8180 \ 54CVE_STATUS[CVE-2017-2665] = "not-applicable-config: Not affecting our configuration so it can be safely ignored."
55 CVE-2017-18381 \
56 CVE-2017-2665 \
57"
58 55
59COMPATIBLE_HOST ?= '(x86_64|i.86|powerpc64|arm|aarch64).*-linux' 56COMPATIBLE_HOST ?= '(x86_64|i.86|powerpc64|arm|aarch64).*-linux'
60 57
diff --git a/meta-oe/recipes-connectivity/libtorrent/libtorrent_git.bb b/meta-oe/recipes-connectivity/libtorrent/libtorrent_git.bb
index 50096cfdbc..fec05571d1 100644
--- a/meta-oe/recipes-connectivity/libtorrent/libtorrent_git.bb
+++ b/meta-oe/recipes-connectivity/libtorrent/libtorrent_git.bb
@@ -9,9 +9,7 @@ DEPENDS = "zlib libsigc++-2.0 openssl cppunit"
9SRC_URI = "git://github.com/rakshasa/libtorrent;branch=master;protocol=https" 9SRC_URI = "git://github.com/rakshasa/libtorrent;branch=master;protocol=https"
10SRCREV = "e60f222241319aaae482789517ad00ae9344bd13" 10SRCREV = "e60f222241319aaae482789517ad00ae9344bd13"
11 11
12CVE_CHECK_IGNORE += "\ 12CVE_STATUS[CVE-2009-1760] = "backported-patch: patched in our product"
13 CVE-2009-1760 \
14"
15 13
16PV = "0.13.8+git${SRCPV}" 14PV = "0.13.8+git${SRCPV}"
17 15
diff --git a/meta-oe/recipes-core/emlog/emlog_git.bb b/meta-oe/recipes-core/emlog/emlog_git.bb
index 05fa0c334c..03c895f667 100644
--- a/meta-oe/recipes-core/emlog/emlog_git.bb
+++ b/meta-oe/recipes-core/emlog/emlog_git.bb
@@ -25,11 +25,9 @@ do_install() {
25 25
26RRECOMMENDS:${PN} += "kernel-module-emlog" 26RRECOMMENDS:${PN} += "kernel-module-emlog"
27 27
28# The NVD database doesn't have a CPE for this product, 28CVE_STATUS_GROUPS += "CVE_STATUS_EMLOG"
29# the name of this product is exactly the same as github.com/emlog/emlog 29CVE_STATUS_EMLOG[status] = "fixed-version: The name of this product is exactly the same as github.com/emlog/emlog. CVE can be safely ignored."
30# but it's not related in any way. The following CVEs are from that project 30CVE_STATUS_EMLOG = " \
31# so they can be safely ignored
32CVE_CHECK_IGNORE += "\
33 CVE-2019-16868 \ 31 CVE-2019-16868 \
34 CVE-2019-17073 \ 32 CVE-2019-17073 \
35 CVE-2021-44584 \ 33 CVE-2021-44584 \
diff --git a/meta-oe/recipes-dbs/postgresql/postgresql_15.3.bb b/meta-oe/recipes-dbs/postgresql/postgresql_15.3.bb
index c4d4124f9a..e1d49895f0 100644
--- a/meta-oe/recipes-dbs/postgresql/postgresql_15.3.bb
+++ b/meta-oe/recipes-dbs/postgresql/postgresql_15.3.bb
@@ -13,6 +13,4 @@ SRC_URI += "\
13 13
14SRC_URI[sha256sum] = "ffc7d4891f00ffbf5c3f4eab7fbbced8460b8c0ee63c5a5167133b9e6599d932" 14SRC_URI[sha256sum] = "ffc7d4891f00ffbf5c3f4eab7fbbced8460b8c0ee63c5a5167133b9e6599d932"
15 15
16CVE_CHECK_IGNORE += "\ 16CVE_STATUS[CVE-2017-8806] = "not-applicable-config: Ddoesn't apply to out configuration of postgresql so we can safely ignore it."
17 CVE-2017-8806 \
18"
diff --git a/meta-oe/recipes-devtools/flatbuffers/flatbuffers.bb b/meta-oe/recipes-devtools/flatbuffers/flatbuffers.bb
index 6573916362..183554e2c8 100644
--- a/meta-oe/recipes-devtools/flatbuffers/flatbuffers.bb
+++ b/meta-oe/recipes-devtools/flatbuffers/flatbuffers.bb
@@ -15,8 +15,6 @@ RDEPENDS:${PN}-dev += "${PN}-compiler"
15 15
16S = "${WORKDIR}/git" 16S = "${WORKDIR}/git"
17 17
18CVE_CHECK_IGNORE += "CVE-2020-35864"
19
20EXTRA_OECMAKE += " \ 18EXTRA_OECMAKE += " \
21 -DFLATBUFFERS_BUILD_TESTS=OFF \ 19 -DFLATBUFFERS_BUILD_TESTS=OFF \
22 -DFLATBUFFERS_BUILD_SHAREDLIB=ON \ 20 -DFLATBUFFERS_BUILD_SHAREDLIB=ON \
diff --git a/meta-oe/recipes-devtools/php/php_8.2.8.bb b/meta-oe/recipes-devtools/php/php_8.2.8.bb
index 08d041d77a..407b1a7bcb 100644
--- a/meta-oe/recipes-devtools/php/php_8.2.8.bb
+++ b/meta-oe/recipes-devtools/php/php_8.2.8.bb
@@ -36,7 +36,9 @@ SRC_URI:append:class-target = " \
36S = "${WORKDIR}/php-${PV}" 36S = "${WORKDIR}/php-${PV}"
37SRC_URI[sha256sum] = "995ed4009c7917c962d31837a1a3658f36d4af4f357b673c97ffdbe6403f8517" 37SRC_URI[sha256sum] = "995ed4009c7917c962d31837a1a3658f36d4af4f357b673c97ffdbe6403f8517"
38 38
39CVE_CHECK_IGNORE += "\ 39CVE_STATUS_GROUPS += "CVE_STATUS_PHP"
40CVE_STATUS_PHP[status] = "fixed-version: The name of this product is exactly the same as github.com/emlog/emlog. CVE can be safely ignored."
41CVE_STATUS_PHP = " \
40 CVE-2007-2728 \ 42 CVE-2007-2728 \
41 CVE-2007-3205 \ 43 CVE-2007-3205 \
42 CVE-2007-4596 \ 44 CVE-2007-4596 \
diff --git a/meta-oe/recipes-devtools/uw-imap/uw-imap_2007f.bb b/meta-oe/recipes-devtools/uw-imap/uw-imap_2007f.bb
index ea76d4870b..dcb59f4ea0 100644
--- a/meta-oe/recipes-devtools/uw-imap/uw-imap_2007f.bb
+++ b/meta-oe/recipes-devtools/uw-imap/uw-imap_2007f.bb
@@ -22,9 +22,7 @@ SRC_URI[sha256sum] = "53e15a2b5c1bc80161d42e9f69792a3fa18332b7b771910131004eb520
22 22
23S = "${WORKDIR}/imap-${PV}" 23S = "${WORKDIR}/imap-${PV}"
24 24
25CVE_CHECK_IGNORE += "\ 25CVE_STATUS[CVE-2005-0198] = "fixed-version: The CPE in the NVD database doesn't reflect correctly the vulnerable versions."
26 CVE-2005-0198 \
27"
28 26
29PACKAGECONFIG ??= "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}" 27PACKAGECONFIG ??= "${@bb.utils.filter('DISTRO_FEATURES', 'pam', d)}"
30PACKAGECONFIG[pam] = ",,libpam" 28PACKAGECONFIG[pam] = ",,libpam"
diff --git a/meta-oe/recipes-extended/libimobiledevice/libplist_2.3.0.bb b/meta-oe/recipes-extended/libimobiledevice/libplist_2.3.0.bb
index 1a74dc88f1..f636990f89 100644
--- a/meta-oe/recipes-extended/libimobiledevice/libplist_2.3.0.bb
+++ b/meta-oe/recipes-extended/libimobiledevice/libplist_2.3.0.bb
@@ -14,7 +14,9 @@ SRC_URI = "git://github.com/libimobiledevice/libplist;protocol=https;branch=mast
14S = "${WORKDIR}/git" 14S = "${WORKDIR}/git"
15PR = "r1" 15PR = "r1"
16 16
17CVE_CHECK_IGNORE += "\ 17CVE_STATUS_GROUPS += "CVE_STATUS_LIBLIST"
18CVE_STATUS_LIBLIST[status] = "fixed-version: The CPE in the NVD database doesn't reflect correctly the vulnerable versions."
19CVE_STATUS_LIBLIST = " \
18 CVE-2017-5834 \ 20 CVE-2017-5834 \
19 CVE-2017-5835 \ 21 CVE-2017-5835 \
20 CVE-2017-5836 \ 22 CVE-2017-5836 \
diff --git a/meta-oe/recipes-extended/libimobiledevice/libplist_git.bb b/meta-oe/recipes-extended/libimobiledevice/libplist_git.bb
index db092600bc..3a10b40f1f 100644
--- a/meta-oe/recipes-extended/libimobiledevice/libplist_git.bb
+++ b/meta-oe/recipes-extended/libimobiledevice/libplist_git.bb
@@ -15,7 +15,9 @@ SRC_URI = "git://github.com/libimobiledevice/libplist;protocol=https;branch=mast
15 15
16S = "${WORKDIR}/git" 16S = "${WORKDIR}/git"
17 17
18CVE_CHECK_IGNORE += "\ 18CVE_STATUS_GROUPS += "CVE_STATUS_LIBLIST"
19CVE_STATUS_LIBLIST[status] = "fixed-version: The CPE in the NVD database doesn't reflect correctly the vulnerable versions."
20CVE_STATUS_LIBLIST = " \
19 CVE-2017-5834 \ 21 CVE-2017-5834 \
20 CVE-2017-5835 \ 22 CVE-2017-5835 \
21 CVE-2017-5836 \ 23 CVE-2017-5836 \
diff --git a/meta-oe/recipes-extended/libzip/libzip_1.10.0.bb b/meta-oe/recipes-extended/libzip/libzip_1.10.0.bb
index e8aa7fdc07..b500f26e25 100644
--- a/meta-oe/recipes-extended/libzip/libzip_1.10.0.bb
+++ b/meta-oe/recipes-extended/libzip/libzip_1.10.0.bb
@@ -23,7 +23,4 @@ SRC_URI = "https://libzip.org/download/libzip-${PV}.tar.xz"
23 23
24SRC_URI[sha256sum] = "cd2a7ac9f1fb5bfa6218272d9929955dc7237515bba6e14b5ad0e1d1e2212b43" 24SRC_URI[sha256sum] = "cd2a7ac9f1fb5bfa6218272d9929955dc7237515bba6e14b5ad0e1d1e2212b43"
25 25
26# Patch for CVE-2017-12858 is applied in version 1.2.0.
27CVE_CHECK_IGNORE += "CVE-2017-12858"
28
29BBCLASSEXTEND += "native" 26BBCLASSEXTEND += "native"
diff --git a/meta-oe/recipes-extended/sanlock/sanlock_3.8.5.bb b/meta-oe/recipes-extended/sanlock/sanlock_3.8.5.bb
index c2a17d06b9..962d19574c 100644
--- a/meta-oe/recipes-extended/sanlock/sanlock_3.8.5.bb
+++ b/meta-oe/recipes-extended/sanlock/sanlock_3.8.5.bb
@@ -21,9 +21,7 @@ SRCREV = "b820c63093c4ae85d7da4f719cf3026d7fca5d09"
21 21
22S = "${WORKDIR}/git" 22S = "${WORKDIR}/git"
23 23
24CVE_CHECK_IGNORE += "\ 24CVE_STATUS[CVE-2012-5638] = "fixed-version: The CPE in the NVD database doesn't reflect correctly the vulnerable versions."
25 CVE-2012-5638 \
26"
27 25
28DEPENDS = "libaio util-linux" 26DEPENDS = "libaio util-linux"
29 27
diff --git a/meta-oe/recipes-extended/sblim-sfcb/sblim-sfcb_1.4.9.bb b/meta-oe/recipes-extended/sblim-sfcb/sblim-sfcb_1.4.9.bb
index a52f3641dd..2a7cf2285e 100644
--- a/meta-oe/recipes-extended/sblim-sfcb/sblim-sfcb_1.4.9.bb
+++ b/meta-oe/recipes-extended/sblim-sfcb/sblim-sfcb_1.4.9.bb
@@ -34,9 +34,7 @@ SRC_URI = "http://downloads.sourceforge.net/sblim/${BP}.tar.bz2 \
34SRC_URI[md5sum] = "28021cdabc73690a94f4f9d57254ce30" 34SRC_URI[md5sum] = "28021cdabc73690a94f4f9d57254ce30"
35SRC_URI[sha256sum] = "634a67b2f7ac3b386a79160eb44413d618e33e4e7fc74ae68b0240484af149dd" 35SRC_URI[sha256sum] = "634a67b2f7ac3b386a79160eb44413d618e33e4e7fc74ae68b0240484af149dd"
36 36
37CVE_CHECK_IGNORE += "\ 37CVE_STATUS[CVE-2012-3381] = "fixed-version: The CPE in the NVD database doesn't reflect correctly the vulnerable versions."
38 CVE-2012-3381 \
39"
40 38
41inherit autotools 39inherit autotools
42inherit systemd 40inherit systemd
diff --git a/meta-oe/recipes-graphics/graphviz/graphviz_8.1.0.bb b/meta-oe/recipes-graphics/graphviz/graphviz_8.1.0.bb
index 7ab15c9718..ccc114007c 100644
--- a/meta-oe/recipes-graphics/graphviz/graphviz_8.1.0.bb
+++ b/meta-oe/recipes-graphics/graphviz/graphviz_8.1.0.bb
@@ -29,10 +29,6 @@ SRC_URI:append:class-nativesdk = "\
29" 29"
30SRC_URI[sha256sum] = "d593695fdaa8a19297523b679ad13d3ef2027b0b7f14cc2bc23e77969ed81565" 30SRC_URI[sha256sum] = "d593695fdaa8a19297523b679ad13d3ef2027b0b7f14cc2bc23e77969ed81565"
31 31
32CVE_CHECK_IGNORE += "\
33 CVE-2014-9157 \
34"
35
36PACKAGECONFIG ??= "librsvg" 32PACKAGECONFIG ??= "librsvg"
37PACKAGECONFIG[librsvg] = "--with-librsvg,--without-librsvg,librsvg" 33PACKAGECONFIG[librsvg] = "--with-librsvg,--without-librsvg,librsvg"
38 34
diff --git a/meta-oe/recipes-graphics/jasper/jasper_2.0.33.bb b/meta-oe/recipes-graphics/jasper/jasper_2.0.33.bb
index 27dff82df5..85da5bfb4d 100644
--- a/meta-oe/recipes-graphics/jasper/jasper_2.0.33.bb
+++ b/meta-oe/recipes-graphics/jasper/jasper_2.0.33.bb
@@ -6,9 +6,7 @@ LIC_FILES_CHKSUM = "file://LICENSE;md5=a80440d1d8f17d041c71c7271d6e06eb"
6SRC_URI = "git://github.com/jasper-software/jasper.git;protocol=https;branch=master" 6SRC_URI = "git://github.com/jasper-software/jasper.git;protocol=https;branch=master"
7SRCREV = "fe00207dc10db1d7cc6f2757961c5c6bdfd10973" 7SRCREV = "fe00207dc10db1d7cc6f2757961c5c6bdfd10973"
8 8
9CVE_CHECK_IGNORE += "\ 9CVE_STATUS[CVE-2015-8751] = "fixed-version: The CPE in the NVD database doesn't reflect correctly the vulnerable versions."
10 CVE-2015-8751 \
11"
12 10
13S = "${WORKDIR}/git" 11S = "${WORKDIR}/git"
14 12
diff --git a/meta-oe/recipes-graphics/libsdl/libsdl_1.2.15.bb b/meta-oe/recipes-graphics/libsdl/libsdl_1.2.15.bb
index 50c501574b..814e6cd0dd 100644
--- a/meta-oe/recipes-graphics/libsdl/libsdl_1.2.15.bb
+++ b/meta-oe/recipes-graphics/libsdl/libsdl_1.2.15.bb
@@ -81,5 +81,4 @@ do_configure:prepend() {
81 81
82BBCLASSEXTEND = "native nativesdk" 82BBCLASSEXTEND = "native nativesdk"
83 83
84#CVE-2019-14906 is a RHEL specific vulnerability. 84CVE_STATUS[CVE-2019-14906] = "not-applicable-platform: Applies on RHEL only"
85CVE_CHECK_IGNORE += "CVE-2019-14906"
diff --git a/meta-oe/recipes-networking/cyrus-sasl/cyrus-sasl_2.1.28.bb b/meta-oe/recipes-networking/cyrus-sasl/cyrus-sasl_2.1.28.bb
index 3277fb1099..11b53e7b61 100644
--- a/meta-oe/recipes-networking/cyrus-sasl/cyrus-sasl_2.1.28.bb
+++ b/meta-oe/recipes-networking/cyrus-sasl/cyrus-sasl_2.1.28.bb
@@ -95,6 +95,3 @@ FILES:${PN}-dbg += "${libdir}/sasl2/.debug"
95FILES:${PN}-staticdev += "${libdir}/sasl2/*.a" 95FILES:${PN}-staticdev += "${libdir}/sasl2/*.a"
96 96
97INSANE_SKIP:${PN} += "dev-so" 97INSANE_SKIP:${PN} += "dev-so"
98
99# CVE-2020-8032 affects only openSUSE
100CVE_CHECK_IGNORE += "CVE-2020-8032"
diff --git a/meta-oe/recipes-support/atop/atop_2.4.0.bb b/meta-oe/recipes-support/atop/atop_2.4.0.bb
index b1d2abde73..bb1f53624a 100644
--- a/meta-oe/recipes-support/atop/atop_2.4.0.bb
+++ b/meta-oe/recipes-support/atop/atop_2.4.0.bb
@@ -24,9 +24,7 @@ SRC_URI = "http://www.atoptool.nl/download/${BP}.tar.gz \
24SRC_URI[md5sum] = "1077da884ed94f2bc3c81ac3ab970436" 24SRC_URI[md5sum] = "1077da884ed94f2bc3c81ac3ab970436"
25SRC_URI[sha256sum] = "be1c010a77086b7d98376fce96514afcd73c3f20a8d1fe01520899ff69a73d69" 25SRC_URI[sha256sum] = "be1c010a77086b7d98376fce96514afcd73c3f20a8d1fe01520899ff69a73d69"
26 26
27CVE_CHECK_IGNORE += "\ 27CVE_STATUS[CVE-2011-3618] = "fixed-version: The CPE in the NVD database doesn't reflect correctly the vulnerable versions."
28 CVE-2011-3618 \
29"
30 28
31do_compile() { 29do_compile() {
32 oe_runmake all 30 oe_runmake all
diff --git a/meta-oe/recipes-support/emacs/emacs_28.2.bb b/meta-oe/recipes-support/emacs/emacs_28.2.bb
index df210ef5e9..137c29beea 100644
--- a/meta-oe/recipes-support/emacs/emacs_28.2.bb
+++ b/meta-oe/recipes-support/emacs/emacs_28.2.bb
@@ -11,9 +11,7 @@ SRC_URI:append:class-target = " file://usemake-docfile-native.patch"
11 11
12SRC_URI[sha256sum] = "ee21182233ef3232dc97b486af2d86e14042dbb65bbc535df562c3a858232488" 12SRC_URI[sha256sum] = "ee21182233ef3232dc97b486af2d86e14042dbb65bbc535df562c3a858232488"
13 13
14CVE_CHECK_IGNORE = "\ 14CVE_CHECK_STATUS[CVE-2007-6109] = "fixed-version: The CPE in the NVD database doesn't reflect correctly the vulnerable versions."
15 CVE-2007-6109 \
16"
17 15
18PACKAGECONFIG[gnutls] = "--with-gnutls=yes,--with-gnutls=no,gnutls" 16PACKAGECONFIG[gnutls] = "--with-gnutls=yes,--with-gnutls=no,gnutls"
19PACKAGECONFIG[kerberos] = "--with-kerberos=yes,--with-kerberos=no,krb5" 17PACKAGECONFIG[kerberos] = "--with-kerberos=yes,--with-kerberos=no,krb5"
diff --git a/meta-oe/recipes-support/nss/nss_3.74.bb b/meta-oe/recipes-support/nss/nss_3.74.bb
index 38407a7c42..ea5abe07fb 100644
--- a/meta-oe/recipes-support/nss/nss_3.74.bb
+++ b/meta-oe/recipes-support/nss/nss_3.74.bb
@@ -283,12 +283,8 @@ BBCLASSEXTEND = "native nativesdk"
283 283
284CVE_PRODUCT += "network_security_services" 284CVE_PRODUCT += "network_security_services"
285 285
286# CVE-2006-5201 affects only Sun Solaris 286CVE_STATUS_GROUPS += "CVE_STATUS_NSS"
287CVE_CHECK_IGNORE += "CVE-2006-5201" 287CVE_STATUS_NSS[status] = "not-applicable-config: This only affect the legacy db (libnssdbm), only compiled with --enable-legacy-db"
288CVE_STATUS_NSS = "CVE-2017-11695 CVE-2017-11696 CVE-2017-11697 CVE-2017-11698"
288 289
289# CVES CVE-2017-11695 CVE-2017-11696 CVE-2017-11697 CVE-2017-11698 only affect 290CVE_STATUS[CVE-2022-3479] = "not-applicable-config: vulnerability was introduced in 3.77 and fixed in 3.87"
290# the legacy db (libnssdbm), only compiled with --enable-legacy-db.
291CVE_CHECK_IGNORE += "CVE-2017-11695 CVE-2017-11696 CVE-2017-11697 CVE-2017-11698"
292
293# vulnerability was introduced in 3.77 and fixed in 3.87
294CVE_CHECK_IGNORE += "CVE-2022-3479"
diff --git a/meta-oe/recipes-support/openldap/openldap_2.5.13.bb b/meta-oe/recipes-support/openldap/openldap_2.5.13.bb
index b117677f9b..7dc926c61c 100644
--- a/meta-oe/recipes-support/openldap/openldap_2.5.13.bb
+++ b/meta-oe/recipes-support/openldap/openldap_2.5.13.bb
@@ -233,6 +233,3 @@ python populate_packages:prepend () {
233} 233}
234 234
235BBCLASSEXTEND = "native" 235BBCLASSEXTEND = "native"
236
237# CVE-2015-3276 has no target code.
238CVE_CHECK_IGNORE += "CVE-2015-3276"
diff --git a/meta-oe/recipes-support/pidgin/pidgin_2.14.2.bb b/meta-oe/recipes-support/pidgin/pidgin_2.14.2.bb
index 3d8a45786d..3a0cc02299 100644
--- a/meta-oe/recipes-support/pidgin/pidgin_2.14.2.bb
+++ b/meta-oe/recipes-support/pidgin/pidgin_2.14.2.bb
@@ -15,10 +15,8 @@ SRC_URI = "\
15 15
16SRC_URI[sha256sum] = "19654ad276b149646371fbdac21bc7620742f2975f7399fed0ffc1a18fbaf603" 16SRC_URI[sha256sum] = "19654ad276b149646371fbdac21bc7620742f2975f7399fed0ffc1a18fbaf603"
17 17
18CVE_CHECK_IGNORE += "\ 18CVE_CHECK_STATUS[CVE-2010-1624] = "fixed-version: The CPE in the NVD database doesn't reflect correctly the vulnerable versions."
19 CVE-2010-1624 \ 19CVE_CHECK_STATUS[CVE-2011-3594] = "fixed-version: The CPE in the NVD database doesn't reflect correctly the vulnerable versions."
20 CVE-2011-3594 \
21"
22 20
23PACKAGECONFIG ??= "gnutls consoleui avahi dbus idn nss \ 21PACKAGECONFIG ??= "gnutls consoleui avahi dbus idn nss \
24 ${@bb.utils.contains('DISTRO_FEATURES', 'x11', 'x11 gtk startup-notification', '', d)} \ 22 ${@bb.utils.contains('DISTRO_FEATURES', 'x11', 'x11 gtk startup-notification', '', d)} \