All of lore.kernel.org
 help / color / mirror / Atom feed
* OE-core CVE metrics for hardknott on Sun 12 Sep 2021 05:00:01 AM HST
@ 2021-09-12 15:01 Steve Sakoman
  2021-09-12 15:57 ` [yocto-security] " Richard Purdie
  2021-09-15 16:58 ` [OE-core] " Anuj Mittal
  0 siblings, 2 replies; 10+ messages in thread
From: Steve Sakoman @ 2021-09-12 15:01 UTC (permalink / raw)
  To: openembedded-core, yocto-security

Branch: hardknott

New this week: 0 CVEs

Removed this week: 2 CVEs
CVE-2020-27748: xdg-utils https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27748 *
CVE-2021-38185: cpio https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38185 *

Full list:  Found 27 unpatched CVEs
CVE-2013-0340: expat:expat-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0340 *
CVE-2019-12067: qemu:qemu-native:qemu-system-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12067 *
CVE-2019-6293: flex:flex-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6293 *
CVE-2019-6470: bind https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6470 *
CVE-2020-18974: nasm:nasm-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18974 *
CVE-2020-29623: webkitgtk https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29623 *
CVE-2020-35503: qemu:qemu-native:qemu-system-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35503 *
CVE-2021-0129: bluez5 https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0129 *
CVE-2021-1765: webkitgtk https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1765 *
CVE-2021-1789: webkitgtk https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1789 *
CVE-2021-1799: webkitgtk https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1799 *
CVE-2021-1801: webkitgtk https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1801 *
CVE-2021-1870: webkitgtk https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1870 *
CVE-2021-20196: qemu:qemu-native:qemu-system-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20196 *
CVE-2021-20255: qemu:qemu-native:qemu-system-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20255 *
CVE-2021-22922: curl:curl-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22922 *
CVE-2021-22923: curl:curl-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22923 *
CVE-2021-29923: go https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-29923 *
CVE-2021-31810: ruby:ruby-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31810 *
CVE-2021-31879: wget https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879 *
CVE-2021-32066: ruby:ruby-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32066 *
CVE-2021-3445: libdnf https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3445 *
CVE-2021-3507: qemu:qemu-native:qemu-system-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3507 *
CVE-2021-35331: tcl:tcl-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35331 *
CVE-2021-3682: qemu:qemu-native:qemu-system-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3682 *
CVE-2021-36976: libarchive https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36976 *
CVE-2021-3713: qemu:qemu-native:qemu-system-native https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3713 *

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [yocto-security] OE-core CVE metrics for hardknott on Sun 12 Sep 2021 05:00:01 AM HST
  2021-09-12 15:01 OE-core CVE metrics for hardknott on Sun 12 Sep 2021 05:00:01 AM HST Steve Sakoman
@ 2021-09-12 15:57 ` Richard Purdie
  2021-09-12 16:04   ` Steve Sakoman
       [not found]   ` <16A41EB09718E439.21276@lists.openembedded.org>
  2021-09-15 16:58 ` [OE-core] " Anuj Mittal
  1 sibling, 2 replies; 10+ messages in thread
From: Richard Purdie @ 2021-09-12 15:57 UTC (permalink / raw)
  To: Steve Sakoman, openembedded-core, yocto-security

On Sun, 2021-09-12 at 05:01 -1000, Steve Sakoman wrote:
> Branch: hardknott
> 
> New this week: 0 CVEs
> 
> Removed this week: 2 CVEs
> CVE-2020-27748: xdg-utils https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27748 *
> CVE-2021-38185: cpio https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38185 *

I'm not sure I believe these numbers as tar CVEs which showed up for dunfell and
master don't show up here. Why? :/

Cheers,

Richard


^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [yocto-security] OE-core CVE metrics for hardknott on Sun 12 Sep 2021 05:00:01 AM HST
  2021-09-12 15:57 ` [yocto-security] " Richard Purdie
@ 2021-09-12 16:04   ` Steve Sakoman
       [not found]   ` <16A41EB09718E439.21276@lists.openembedded.org>
  1 sibling, 0 replies; 10+ messages in thread
From: Steve Sakoman @ 2021-09-12 16:04 UTC (permalink / raw)
  To: Richard Purdie
  Cc: Patches and discussions about the oe-core layer, yocto-security

[-- Attachment #1: Type: text/plain, Size: 656 bytes --]

On Sun, Sep 12, 2021, 5:57 AM Richard Purdie <
richard.purdie@linuxfoundation.org> wrote:

> On Sun, 2021-09-12 at 05:01 -1000, Steve Sakoman wrote:
> > Branch: hardknott
> >
> > New this week: 0 CVEs
> >
> > Removed this week: 2 CVEs
> > CVE-2020-27748: xdg-utils
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27748 *
> > CVE-2021-38185: cpio
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38185 *
>
> I'm not sure I believe these numbers as tar CVEs which showed up for
> dunfell and
> master don't show up here. Why? :/
>

Don't know! Will investigate tomorrow.

Steve


> Cheers,
>
> Richard
>
>

[-- Attachment #2: Type: text/html, Size: 1526 bytes --]

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [OE-core] [yocto-security] OE-core CVE metrics for hardknott on Sun 12 Sep 2021 05:00:01 AM HST
       [not found]   ` <16A41EB09718E439.21276@lists.openembedded.org>
@ 2021-09-13 15:19     ` Steve Sakoman
  2021-09-13 17:01       ` Richard Purdie
  0 siblings, 1 reply; 10+ messages in thread
From: Steve Sakoman @ 2021-09-13 15:19 UTC (permalink / raw)
  To: Steve Sakoman
  Cc: Richard Purdie, Patches and discussions about the oe-core layer,
	yocto-security

On Sun, Sep 12, 2021 at 6:05 AM Steve Sakoman via
lists.openembedded.org <steve=sakoman.com@lists.openembedded.org>
wrote:
>
>
>
> On Sun, Sep 12, 2021, 5:57 AM Richard Purdie <richard.purdie@linuxfoundation.org> wrote:
>>
>> On Sun, 2021-09-12 at 05:01 -1000, Steve Sakoman wrote:
>> > Branch: hardknott
>> >
>> > New this week: 0 CVEs
>> >
>> > Removed this week: 2 CVEs
>> > CVE-2020-27748: xdg-utils https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27748 *
>> > CVE-2021-38185: cpio https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38185 *
>>
>> I'm not sure I believe these numbers as tar CVEs which showed up for dunfell and
>> master don't show up here. Why? :/
>
>
> Don't know! Will investigate tomorrow.

I re-ran the hardknott report this morning and it now includes the
missing tar cve's (as well as the libsolv, vim, and inetutils cve's we
saw in master/dunfell)

No idea why these weren't in yesterday's report since they were
obviously in the upstream database and appeared in the master and
dunfell runs (and hardknott runs last)

I've seen this kind of thing once or twice in the past and have never
been able to figure out what is going on since it is so intermittent.

Steve

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [OE-core] [yocto-security] OE-core CVE metrics for hardknott on Sun 12 Sep 2021 05:00:01 AM HST
  2021-09-13 15:19     ` [OE-core] " Steve Sakoman
@ 2021-09-13 17:01       ` Richard Purdie
  2021-09-13 17:26         ` Steve Sakoman
  0 siblings, 1 reply; 10+ messages in thread
From: Richard Purdie @ 2021-09-13 17:01 UTC (permalink / raw)
  To: Steve Sakoman
  Cc: Patches and discussions about the oe-core layer, yocto-security

On Mon, 2021-09-13 at 05:19 -1000, Steve Sakoman wrote:
> On Sun, Sep 12, 2021 at 6:05 AM Steve Sakoman via
> lists.openembedded.org <steve=sakoman.com@lists.openembedded.org>
> wrote:
> > 
> > 
> > 
> > On Sun, Sep 12, 2021, 5:57 AM Richard Purdie <richard.purdie@linuxfoundation.org> wrote:
> > > 
> > > On Sun, 2021-09-12 at 05:01 -1000, Steve Sakoman wrote:
> > > > Branch: hardknott
> > > > 
> > > > New this week: 0 CVEs
> > > > 
> > > > Removed this week: 2 CVEs
> > > > CVE-2020-27748: xdg-utils https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27748 *
> > > > CVE-2021-38185: cpio https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38185 *
> > > 
> > > I'm not sure I believe these numbers as tar CVEs which showed up for dunfell and
> > > master don't show up here. Why? :/
> > 
> > 
> > Don't know! Will investigate tomorrow.
> 
> I re-ran the hardknott report this morning and it now includes the
> missing tar cve's (as well as the libsolv, vim, and inetutils cve's we
> saw in master/dunfell)
> 
> No idea why these weren't in yesterday's report since they were
> obviously in the upstream database and appeared in the master and
> dunfell runs (and hardknott runs last)
> 
> I've seen this kind of thing once or twice in the past and have never
> been able to figure out what is going on since it is so intermittent.

I'm not sure how we pull the database but is it possible that there are multiple
upstream servers of that data and we pull from different instances which may not
have all updated to the same data? Would there be any way to investigate/prove
that?

I'm a little worried about the inconsistencies. I'm guessing your builds don't
share a DL_DIR so they'd fetch different CVE databases?

Cheers,

Richard




^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [OE-core] [yocto-security] OE-core CVE metrics for hardknott on Sun 12 Sep 2021 05:00:01 AM HST
  2021-09-13 17:01       ` Richard Purdie
@ 2021-09-13 17:26         ` Steve Sakoman
  2021-09-15 11:08           ` Ross Burton
  0 siblings, 1 reply; 10+ messages in thread
From: Steve Sakoman @ 2021-09-13 17:26 UTC (permalink / raw)
  To: Richard Purdie
  Cc: Patches and discussions about the oe-core layer, yocto-security,
	Ross Burton

On Mon, Sep 13, 2021 at 7:01 AM Richard Purdie
<richard.purdie@linuxfoundation.org> wrote:
>
> On Mon, 2021-09-13 at 05:19 -1000, Steve Sakoman wrote:
> > On Sun, Sep 12, 2021 at 6:05 AM Steve Sakoman via
> > lists.openembedded.org <steve=sakoman.com@lists.openembedded.org>
> > wrote:
> > >
> > >
> > >
> > > On Sun, Sep 12, 2021, 5:57 AM Richard Purdie <richard.purdie@linuxfoundation.org> wrote:
> > > >
> > > > On Sun, 2021-09-12 at 05:01 -1000, Steve Sakoman wrote:
> > > > > Branch: hardknott
> > > > >
> > > > > New this week: 0 CVEs
> > > > >
> > > > > Removed this week: 2 CVEs
> > > > > CVE-2020-27748: xdg-utils https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27748 *
> > > > > CVE-2021-38185: cpio https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38185 *
> > > >
> > > > I'm not sure I believe these numbers as tar CVEs which showed up for dunfell and
> > > > master don't show up here. Why? :/
> > >
> > >
> > > Don't know! Will investigate tomorrow.
> >
> > I re-ran the hardknott report this morning and it now includes the
> > missing tar cve's (as well as the libsolv, vim, and inetutils cve's we
> > saw in master/dunfell)
> >
> > No idea why these weren't in yesterday's report since they were
> > obviously in the upstream database and appeared in the master and
> > dunfell runs (and hardknott runs last)
> >
> > I've seen this kind of thing once or twice in the past and have never
> > been able to figure out what is going on since it is so intermittent.
>
> I'm not sure how we pull the database but is it possible that there are multiple
> upstream servers of that data and we pull from different instances which may not
> have all updated to the same data? Would there be any way to investigate/prove
> that?

Taking a quick look at the code in cve-update-db-native.bb I see that
database updates can fail with a warning message printed.  So it could
well be that the update failed for some reason, printed the warning,
and then used the old database for the scan. That would explain what
we are seeing.

Perhaps someone who knows the code better can comment (Ross? I see
you've mucked about in this section of the code!)

Unfortunately I didn't enable cron logging on the machine that does
the reports, but I will enable that now so that I can examine the cron
output if this happens in the future.

> I'm a little worried about the inconsistencies. I'm guessing your builds don't
> share a DL_DIR so they'd fetch different CVE databases?

Correct -- I use a separate DL_DIR for each branch.

Steve

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [OE-core] [yocto-security] OE-core CVE metrics for hardknott on Sun 12 Sep 2021 05:00:01 AM HST
  2021-09-13 17:26         ` Steve Sakoman
@ 2021-09-15 11:08           ` Ross Burton
  2021-09-15 14:09             ` Steve Sakoman
  0 siblings, 1 reply; 10+ messages in thread
From: Ross Burton @ 2021-09-15 11:08 UTC (permalink / raw)
  To: Steve Sakoman
  Cc: Richard Purdie, Patches and discussions about the oe-core layer,
	yocto-security

On Mon, 13 Sept 2021 at 18:26, Steve Sakoman <steve@sakoman.com> wrote:

> Taking a quick look at the code in cve-update-db-native.bb I see that
> database updates can fail with a warning message printed.  So it could
> well be that the update failed for some reason, printed the warning,
> and then used the old database for the scan. That would explain what
> we are seeing.
>
> Perhaps someone who knows the code better can comment (Ross? I see
> you've mucked about in this section of the code!)
>
> Unfortunately I didn't enable cron logging on the machine that does
> the reports, but I will enable that now so that I can examine the cron
> output if this happens in the future.

That's indeed a good hypothesis, and having the log to hand would be
useful.  If you don't delete the tmpdir after the event then the
console logs will be available in there still.

A hunch is that if you have all three jobs running at once, they might
be rejecting some of your connections.  Maybe stagger the runs by ten
minutes?

Ross

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [OE-core] [yocto-security] OE-core CVE metrics for hardknott on Sun 12 Sep 2021 05:00:01 AM HST
  2021-09-15 11:08           ` Ross Burton
@ 2021-09-15 14:09             ` Steve Sakoman
  0 siblings, 0 replies; 10+ messages in thread
From: Steve Sakoman @ 2021-09-15 14:09 UTC (permalink / raw)
  To: Ross Burton
  Cc: Richard Purdie, Patches and discussions about the oe-core layer,
	yocto-security

On Wed, Sep 15, 2021 at 1:08 AM Ross Burton <ross@burtonini.com> wrote:
>
> On Mon, 13 Sept 2021 at 18:26, Steve Sakoman <steve@sakoman.com> wrote:
>
> > Taking a quick look at the code in cve-update-db-native.bb I see that
> > database updates can fail with a warning message printed.  So it could
> > well be that the update failed for some reason, printed the warning,
> > and then used the old database for the scan. That would explain what
> > we are seeing.
> >
> > Perhaps someone who knows the code better can comment (Ross? I see
> > you've mucked about in this section of the code!)
> >
> > Unfortunately I didn't enable cron logging on the machine that does
> > the reports, but I will enable that now so that I can examine the cron
> > output if this happens in the future.
>
> That's indeed a good hypothesis, and having the log to hand would be
> useful.  If you don't delete the tmpdir after the event then the
> console logs will be available in there still.

You are my hero Ross :-)  I should have thought to look in tmpdir,
harknott was the last to run so the log was still there:

DEBUG: Executing python function do_fetch
DEBUG: Updating 2002
WARNING: Failed to fetch CVE data (Service Unavailable)
DEBUG: Python function do_fetch finished

So my hypothesis was indeed correct.

> A hunch is that if you have all three jobs running at once, they might
> be rejecting some of your connections.  Maybe stagger the runs by ten
> minutes?

 I stagger them by 30 minutes, so we should be good unless they are
really picky!

Steve

^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [OE-core] OE-core CVE metrics for hardknott on Sun 12 Sep 2021 05:00:01 AM HST
  2021-09-12 15:01 OE-core CVE metrics for hardknott on Sun 12 Sep 2021 05:00:01 AM HST Steve Sakoman
  2021-09-12 15:57 ` [yocto-security] " Richard Purdie
@ 2021-09-15 16:58 ` Anuj Mittal
  2021-09-15 17:03   ` Steve Sakoman
  1 sibling, 1 reply; 10+ messages in thread
From: Anuj Mittal @ 2021-09-15 16:58 UTC (permalink / raw)
  To: openembedded-core, steve, yocto-security

Can we also set commercial flag while generating this list so recipes
like ffmpeg are also picked up?

Thanks,

Anuj

On Sun, 2021-09-12 at 05:01 -1000, Steve Sakoman wrote:
> Branch: hardknott
> 
> New this week: 0 CVEs
> 
> Removed this week: 2 CVEs
> CVE-2020-27748: xdg-utils
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27748 *
> CVE-2021-38185: cpio
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38185 *
> 
> Full list:  Found 27 unpatched CVEs
> CVE-2013-0340: expat:expat-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0340 *
> CVE-2019-12067: qemu:qemu-native:qemu-system-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12067 *
> CVE-2019-6293: flex:flex-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6293 *
> CVE-2019-6470: bind
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6470 *
> CVE-2020-18974: nasm:nasm-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18974 *
> CVE-2020-29623: webkitgtk
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29623 *
> CVE-2020-35503: qemu:qemu-native:qemu-system-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35503 *
> CVE-2021-0129: bluez5
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0129 *
> CVE-2021-1765: webkitgtk
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1765 *
> CVE-2021-1789: webkitgtk
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1789 *
> CVE-2021-1799: webkitgtk
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1799 *
> CVE-2021-1801: webkitgtk
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1801 *
> CVE-2021-1870: webkitgtk
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1870 *
> CVE-2021-20196: qemu:qemu-native:qemu-system-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20196 *
> CVE-2021-20255: qemu:qemu-native:qemu-system-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20255 *
> CVE-2021-22922: curl:curl-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22922 *
> CVE-2021-22923: curl:curl-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22923 *
> CVE-2021-29923: go
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-29923 *
> CVE-2021-31810: ruby:ruby-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31810 *
> CVE-2021-31879: wget
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879 *
> CVE-2021-32066: ruby:ruby-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32066 *
> CVE-2021-3445: libdnf
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3445 *
> CVE-2021-3507: qemu:qemu-native:qemu-system-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3507 *
> CVE-2021-35331: tcl:tcl-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35331 *
> CVE-2021-3682: qemu:qemu-native:qemu-system-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3682 *
> CVE-2021-36976: libarchive
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36976 *
> CVE-2021-3713: qemu:qemu-native:qemu-system-native
> https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3713 *
> 
> 
> 


^ permalink raw reply	[flat|nested] 10+ messages in thread

* Re: [OE-core] OE-core CVE metrics for hardknott on Sun 12 Sep 2021 05:00:01 AM HST
  2021-09-15 16:58 ` [OE-core] " Anuj Mittal
@ 2021-09-15 17:03   ` Steve Sakoman
  0 siblings, 0 replies; 10+ messages in thread
From: Steve Sakoman @ 2021-09-15 17:03 UTC (permalink / raw)
  To: Anuj Mittal; +Cc: openembedded-core, yocto-security

On Wed, Sep 15, 2021 at 6:59 AM Anuj Mittal <anuj.mittal@intel.com> wrote:
>
> Can we also set commercial flag while generating this list so recipes
> like ffmpeg are also picked up?

Yes, I can do that.

Steve

>
> Thanks,
>
> Anuj
>
> On Sun, 2021-09-12 at 05:01 -1000, Steve Sakoman wrote:
> > Branch: hardknott
> >
> > New this week: 0 CVEs
> >
> > Removed this week: 2 CVEs
> > CVE-2020-27748: xdg-utils
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-27748 *
> > CVE-2021-38185: cpio
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-38185 *
> >
> > Full list:  Found 27 unpatched CVEs
> > CVE-2013-0340: expat:expat-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2013-0340 *
> > CVE-2019-12067: qemu:qemu-native:qemu-system-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-12067 *
> > CVE-2019-6293: flex:flex-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6293 *
> > CVE-2019-6470: bind
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-6470 *
> > CVE-2020-18974: nasm:nasm-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-18974 *
> > CVE-2020-29623: webkitgtk
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-29623 *
> > CVE-2020-35503: qemu:qemu-native:qemu-system-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-35503 *
> > CVE-2021-0129: bluez5
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-0129 *
> > CVE-2021-1765: webkitgtk
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1765 *
> > CVE-2021-1789: webkitgtk
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1789 *
> > CVE-2021-1799: webkitgtk
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1799 *
> > CVE-2021-1801: webkitgtk
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1801 *
> > CVE-2021-1870: webkitgtk
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-1870 *
> > CVE-2021-20196: qemu:qemu-native:qemu-system-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20196 *
> > CVE-2021-20255: qemu:qemu-native:qemu-system-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-20255 *
> > CVE-2021-22922: curl:curl-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22922 *
> > CVE-2021-22923: curl:curl-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-22923 *
> > CVE-2021-29923: go
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-29923 *
> > CVE-2021-31810: ruby:ruby-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31810 *
> > CVE-2021-31879: wget
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-31879 *
> > CVE-2021-32066: ruby:ruby-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-32066 *
> > CVE-2021-3445: libdnf
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3445 *
> > CVE-2021-3507: qemu:qemu-native:qemu-system-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3507 *
> > CVE-2021-35331: tcl:tcl-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-35331 *
> > CVE-2021-3682: qemu:qemu-native:qemu-system-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3682 *
> > CVE-2021-36976: libarchive
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-36976 *
> > CVE-2021-3713: qemu:qemu-native:qemu-system-native
> > https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2021-3713 *
> >
> >
> >
>
>
> 
>

^ permalink raw reply	[flat|nested] 10+ messages in thread

end of thread, other threads:[~2021-09-15 17:03 UTC | newest]

Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-09-12 15:01 OE-core CVE metrics for hardknott on Sun 12 Sep 2021 05:00:01 AM HST Steve Sakoman
2021-09-12 15:57 ` [yocto-security] " Richard Purdie
2021-09-12 16:04   ` Steve Sakoman
     [not found]   ` <16A41EB09718E439.21276@lists.openembedded.org>
2021-09-13 15:19     ` [OE-core] " Steve Sakoman
2021-09-13 17:01       ` Richard Purdie
2021-09-13 17:26         ` Steve Sakoman
2021-09-15 11:08           ` Ross Burton
2021-09-15 14:09             ` Steve Sakoman
2021-09-15 16:58 ` [OE-core] " Anuj Mittal
2021-09-15 17:03   ` Steve Sakoman

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.