Hi, On Tue, Feb 16, 2021 at 08:23:31AM -1000, Steve Sakoman wrote: > The weekly cve reports for master, gatesgarth, and dunfell currently > omit linux-yocto since the CPE database for the kernel is notoriously > incomplete in versioning information. > > This morning at the YP technical team meeting we discussed this and > decided to see if we might, as a team, expend some effort to update > the CPE database to improve this situation (much as we have been doing > for the other packages in oe-core) > > The first step in this process is to shine some light on the current > situation, so below is a list of the current CVE hits for linux-yocto > in all three branches.
Please check https://github.com/nluedtke/linux_kernel_cves IMO, that information could be moved over to NVD and CPE, but AFAIK the scripts which generate this git repo with data aren't public. Another option would be to switch kernel CVE scans to use that git repo to pull in data from kernel major version and which CVEs are fixed and unfixed by given minor version release. That is rather simple to do for anyone who has a bit of time. Though as recommended by upstream developers, CVEs should never be patched independently and instead upstream point releases should be merged into product trees. For example for dunfell linux-yocto version 5.4.87 and data from https://github.com/nluedtke/linux_kernel_cves/blob/master/data/5.4/5.4_security.txt shows that the list of fixed CVEs is between lines 1 and 297 (note that 5.4.87 point release is missing from the list but previous and following releases are there, not perfect but that's what it is). Then the list of unfixed CVEs from newer point releases is: CVEs fixed in 5.4.88: CVE-2020-36158: 0a49aaf4df2936bca119ee38fe5a570a7024efdc mwifiex: Fix possible buffer overflows in mwifiex_cmd_802_11_ad_hoc_start CVEs fixed in 5.4.89: CVE-2020-28374: 485e21729b1e1235e6075318225c09e76b376e81 scsi: target: Fix XCOPY NAA identifier lookup CVEs fixed in 5.4.92: CVE-2021-3178: 4aef760c28e8bd1860a27fd78067b4ea77124987 nfsd4: readdirplus shouldn't return parent of export CVEs fixed in 5.4.94: CVE-2020-27825: b899d5b2a42a963d6ca7e33d51a35b2eb25f6d10 tracing: Fix race in trace_open and buffer resize call CVE-2021-3347: 0dae88a92596db9405fd4a341c1915cf7d8fbad4 futex: Ensure the correct return value from futex_lock_pi() CVEs fixed in 5.4.95: CVE-2021-3348: 587c6b75d7fdd366ad7dc615471006ce73c03a51 nbd: freeze the queue while we're adding connections CVEs fixed in 5.4.97: CVE-2021-20194: 9146fffc5d2a3ec49906daf18d2e983d995b3521 bpf, cgroup: Fix optlen WARN_ON_ONCE toctou And list of CVEs for which no fix is available in 5.4 branch is the long list of outstanding (all lines after "Outstanding CVEs") CVEs, some of which do not apply to 5.4 because buggy code doesn't exist there, or no-one has yet backported the patches etc. This same process could apply to any kernel major version for which data exists in this git tree and if the database keeps seeing updates. I've been using this manually to trigger updates and cross reference which point releases have fixes and I have not yet found major bugs in the data. Though for updates, like I said, full merge or rebase of the upstream kernel.org point releases must be done, as also Greg K-H. says. Cheers, -Mikko
-=-=-=-=-=-=-=-=-=-=-=- Links: You receive all messages sent to this group. View/Reply Online (#148290): https://lists.openembedded.org/g/openembedded-core/message/148290 Mute This Topic: https://lists.openembedded.org/mt/80685241/21656 Group Owner: [email protected] Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub [[email protected]] -=-=-=-=-=-=-=-=-=-=-=-
