On Mon, Jan 27, 2020 at 10:16:16AM +0200, Anders Montonen wrote:
> On 24 Jan 2020, at 12:54, Ross Burton <[email protected]> wrote:
> > 
> > On 24/01/2020 09:02, Anders Montonen wrote:
> >> Hi,
> >> What's the best way for handling name collisions when using the 
> >> cve-checker tool? For example, there's a ton of Adobe Flex vulnerabilities 
> >> that are reported against the Flex lexical analyzer generator tool. 
> >> Whitelisting the individual CVEs would be one option, but the list is 
> >> pretty long.
> > 
> > Set CVE_PRODUCT, if you use a colon then you can set the vendor too.
> > 
> > This specific instance is already fixed in oe-core master:
> > 
> > # Not Apache Flex, or Adobe Flex, or IBM Flex.
> > CVE_PRODUCT = "flex_project:flex”
> 
> Thanks (and to Mikko too), that worked, though I’m a bit curious how one 
> would find the proper vendor name, especially for a project like this where 
> there’s no clear company name.

I always search for existing CVEs for the SW component and check what
project and product names were used.

For flex, Internet search shows for example
https://www.suse.com/security/cve/CVE-2019-6293/

which has "flex_project:flex" in NVD:

https://nvd.nist.gov/vuln/detail/CVE-2019-6293

In my projects I also have exported CVE_PRODUCT to buildhistory and
have a check for CVE product name. Any SW components with non-CLOSED
LICENSE must either have a matching CPE in NVD database or be checked
manually and whitelisted.

Cheers,

-Mikko
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#48154): https://lists.yoctoproject.org/g/yocto/message/48154
Mute This Topic: https://lists.yoctoproject.org/mt/70066324/21656
Group Owner: [email protected]
Unsubscribe: https://lists.yoctoproject.org/g/yocto/unsub  
[[email protected]]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to