From: Het Patel <[email protected]>

The patches address the following bugs:

1. Incomplete CVE Assessment Details: Currently, the `detail` field is missing 
for approximately 81% of entries, rendering reports unreliable for auditing. 
These changes ensure that the rationale for a "Patched" or "Unpatched" 
assessment is properly recorded, allowing for a clear distinction between 
version-based assessments and missing data.

2. Runtime Warnings: Corrects four instances where debug calls were missing the 
required log level parameter. This change eliminates the runtime warnings that 
currently trigger during every CVE scan.

Testing:
- Applied cleanly to the current `scarthgap` HEAD.
- Verified via a full CVE scan.
- Confirmed that all existing CVE statuses are preserved with no regressions 
observed.

Het Patel (4):
  cve-check: encode affected product/vendor in CVE_STATUS
  cve-check: annotate CVEs during analysis
  cve-check-map: add new statuses
  cve-check: fix debug message

 meta/classes/cve-check.bbclass | 246 +++++++++++++++++++++--------------------
 meta/conf/cve-check-map.conf   |   9 +
 meta/lib/oe/cve_check.py       |  74 +++++++++---
 3 files changed, 197 insertions(+), 132 deletions(-)
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.
View/Reply Online (#233362): 
https://lists.openembedded.org/g/openembedded-core/message/233362
Mute This Topic: https://lists.openembedded.org/mt/118378623/21656
Group Owner: [email protected]
Unsubscribe: https://lists.openembedded.org/g/openembedded-core/unsub 
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to