Home
last modified time | relevance | path

Searched refs:cve (Results 1 – 25 of 58) sorted by relevance

123

/OK3568_Linux_fs/yocto/poky/documentation/migration-guides/
H A Drelease-notes-4.0.rst198 - cve-check: add json output format
199 - cve-check: add coverage statistics on recipes with/without CVEs
336 - binutils: :cve:`2021-42574`, :cve:`2021-45078`
337 - curl: :cve:`2021-22945`, :cve:`2021-22946`, :cve:`2021-22947`
338 - epiphany: :cve:`2021-45085`, :cve:`2021-45086`, :cve:`2021-45087`, :cve:`2021-45088`
339cve:`2021-45960`, :cve:`2021-46143`, :cve:`2022-22822`, :cve:`2022-22823`, :cve:`2022-22824`, :cve
340 - ffmpeg: :cve:`2021-38114`
341 - gcc: :cve:`2021-35465`, :cve:`2021-42574`, :cve:`2021-46195`, :cve:`2022-24765`
342 - glibc: :cve:`2021-3998`, :cve:`2021-3999`, :cve:`2021-43396`, :cve:`2022-23218`, :cve:`2022-23219`
343 - gmp: :cve:`2021-43618`
[all …]
H A Drelease-notes-4.0.7.rst9 - binutils: Fix :cve:`2022-4285`
10 - curl: Fix :cve:`2022-43551` and `CVE-2022-43552 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=…
11 - ffmpeg: Fix :cve:`2022-3109` and :cve:`2022-3341`
12 - go: Fix :cve:`2022-41715` and :cve:`2022-41717`
13 - libX11: Fix :cve:`2022-3554` and :cve:`2022-3555`
14 - libarchive: Fix :cve:`2022-36227`
15 - libksba: Fix :cve:`2022-47629`
16 - libpng: Fix :cve:`2019-6129`
17 - libxml2: Fix :cve:`2022-40303` and :cve:`2022-40304`
18 - openssl: Fix :cve:`2022-3996`
[all …]
H A Drelease-notes-4.0.6.rst9 - bash: Fix :cve:`2022-3715`
10 - curl: Fix :cve:`2022-32221`, :cve:`2022-42915` and :cve:`2022-42916`
11 - dbus: Fix :cve:`2022-42010`, :cve:`2022-42011` and :cve:`2022-42012`
12 - dropbear: Fix :cve:`2021-36369`
13 - ffmpeg: Fix :cve:`2022-3964`, :cve:`2022-3965`
14 - go: Fix :cve:`2022-2880`
15 - grub2: Fix :cve:`2022-2601`, :cve:`2022-3775` and :cve:`2022-28736`
16 - libarchive: Fix :cve:`2022-36227`
17 - libpam: Fix :cve:`2022-28321`
18 - libsndfile1: Fix :cve:`2021-4156`
[all …]
H A Drelease-notes-3.4.rst150 - cve-extra-exclusions.inc: add exclusion list for intractable CVE's
219 - apr: :cve:`2021-35940`
220 - aspell: :cve:`2019-25051`
221 - avahi: :cve:`2021-3468`, :cve:`2021-36217`
222 - binutils: :cve:`2021-20197`
223 - bluez: :cve:`2021-3658`
224 - busybox: :cve:`2021-28831`
225 - cairo: :cve:`2020-35492`
226 - cpio: :cve:`2021-38185`
227 - expat: :cve:`2013-0340`
[all …]
H A Drelease-notes-3.4.2.rst7 - tiff: backport fix for :cve:`2022-22844`
8 - glibc : Fix :cve:`2021-3999`
9 - glibc : Fix :cve:`2021-3998`
10 - glibc : Fix :cve:`2022-23219`
11 - glibc : Fix :cve:`2022-23218`
12 - lighttpd: backport a fix for :cve:`2022-22707`
13 - speex: fix :cve:`2020-23903`
14 - linux-yocto/5.10: amdgpu: updates for :cve:`2021-42327`
15 - libsndfile1: fix :cve:`2021-4156`
17 - grub2: fix :cve:`2021-3981`
[all …]
H A Drelease-notes-4.0.2.rst7 - libxslt: Mark :cve:`2022-29824` as not applying
8 - tiff: Add jbig PACKAGECONFIG and clarify IGNORE :cve:`2022-1210`
9 - tiff: mark :cve:`2022-1622` and :cve:`2022-1623` as invalid
10 - pcre2:fix :cve:`2022-1586` Out-of-bounds read
11cve:`2022-22576`, :cve:`2022-27775`, :cve:`2022-27776`, :cve:`2022-27774`, :cve:`2022-30115`, :cve
12 - qemu: fix :cve:`2021-4206` and :cve:`2021-4207`
13 - freetype: fix :cve:`2022-27404`, :cve:`2022-27405` and :cve:`2022-27406`
37 - cve-check.bbclass: Added do_populate_sdk[recrdeptask].
38 - cve-check: Add helper for symlink handling
39 - cve-check: Allow warnings to be disabled
[all …]
H A Drelease-notes-4.0.3.rst7 - binutils: fix :cve:`2019-1010204`
8 - busybox: fix :cve:`2022-30065`
9 - cups: ignore :cve:`2022-26691`
10 - curl: Fix :cve:`2022-32205`, :cve:`2022-32206`, :cve:`2022-32207` and :cve:`2022-32208`
11 - dpkg: fix :cve:`2022-1664`
12 - ghostscript: fix :cve:`2022-2085`
13 - harfbuzz: fix :cve:`2022-33068`
14 - libtirpc: fix :cve:`2021-46828`
15 - lua: fix :cve:`2022-33099`
16 - nasm: ignore :cve:`2020-18974`
[all …]
H A Drelease-notes-4.0.4.rst7 - binutils : fix :cve:`2022-38533`
8 - curl: fix :cve:`2022-35252`
9 - sqlite: fix :cve:`2022-35737`
10 - grub2: fix :cve:`2021-3695`, :cve:`2021-3696`, :cve:`2021-3697`, :cve:`2022-28733`, :cve:`2022-2…
11 - u-boot: fix :cve:`2022-30552` and :cve:`2022-33967`
12 - libxml2: Ignore :cve:`2016-3709`
13 - libtiff: fix :cve:`2022-34526`
14 - zlib: fix :cve:`2022-37434`
15 - gnutls: fix :cve:`2022-2509`
16 - u-boot: fix :cve:`2022-33103`
[all …]
H A Drelease-notes-4.0.8.rst9 - apr-util: Fix :cve:`2022-25147`
10 - apr: Fix :cve:`2022-24963`, :cve:`2022-28331` and :cve:`2021-35940`
11 - bind: Fix :cve:`2022-3094`, :cve:`2022-3736` and :cve:`2022-3924`
12 - git: Ignore :cve:`2022-41953`
13 - git: Fix :cve:`2022-23521` and :cve:`2022-41903`
14 - libgit2: Fix :cve:`2023-22742`
15 - ppp: Fix :cve:`2022-4603`
16 - python3-certifi: Fix :cve:`2022-23491`
17 - sudo: Fix :cve:`2023-22809`
18 - tar: Fix :cve:`2022-48303`
H A Drelease-notes-4.0.5.rst7 - qemu: fix :cve:`2021-3750`, :cve:`2021-3611` and :cve:`2022-2962`
8 - binutils : fix :cve:`2022-38126`, :cve:`2022-38127` and :cve:`2022-38128`
9 - tff: fix :cve:`2022-2867`, :cve:`2022-2868` and :cve:`2022-2869`
10 - inetutils: fix :cve:`2022-39028`
11 - go: fix :cve:`2022-27664`
H A Drelease-notes-3.4.4.rst7 - tiff: fix :cve:`2022-0865`, :cve:`2022-0891`, :cve:`2022-0907`, :cve:`2022-0908`, :cve:`2022-090…
10 - zlib: fix :cve:`2018-25032`
11 - grub: ignore :cve:`2021-46705`
H A Drelease-notes-3.4.3.rst7 - ghostscript: fix :cve:`2021-3781`
8 - ghostscript: fix :cve:`2021-45949`
9 - tiff: Add backports for two CVEs from upstream (:cve:`2022-0561` & :cve:`2022-0562`)
10 - gcc : Fix :cve:`2021-46195`
12 - binutils: Add fix for :cve:`2021-45078`
18 - Revert "cve-check: add lockfile to task"
32 - cve-check: create directory of CVE_CHECK_MANIFEST before copy
33 - cve-check: get_cve_info should open the database read-only
H A Drelease-notes-3.4.1.rst12 - glibc: Backport fix for :cve:`2021-43396`
13 - vim: add patch number to :cve:`2021-3778` patch
14 - vim: fix :cve:`2021-3796`, :cve:`2021-3872`, and :cve:`2021-3875`
15 - squashfs-tools: follow-up fix for :cve:`2021-41072`
17 - squashfs-tools: fix :cve:`2021-41072`
18 - ffmpeg: fix :cve:`2021-38114`
19 - curl: fix :cve:`2021-22945`, :cve:`2021-22946` and :cve:`2021-22947`
H A Drelease-notes-4.0.1.rst7 - linux-yocto/5.15: fix :cve:`2022-28796`
8 - python3: ignore :cve:`2015-20107`
9 - e2fsprogs: fix :cve:`2022-1304`
10 - lua: fix :cve:`2022-28805`
11 - busybox: fix :cve:`2022-28391`
30 - cve-check: add JSON format to summary output
31 - cve-check: fix symlinks where link and output path are equal
32 - cve-check: no need to depend on the fetch task
33 - cve-update-db-native: let the user to drive the update interval
34 - cve-update-db-native: update the CVE database once a day only
[all …]
H A Dmigration-3.0.rst49 - ``cve-check-tool``: Functionally replaced by the ``cve-update-db``
50 recipe and :ref:`cve-check <ref-classes-cve-check>` class.
139 .. _migration-3.0-cve-checking:
144 ``cve-check-tool`` has been functionally replaced by a new
145 ``cve-update-db`` recipe and functionality built into the :ref:`cve-check <ref-classes-cve-check>`
147 XML feeds that ``cve-check-tool`` was using, supports CVSSv3 scoring,
/OK3568_Linux_fs/yocto/poky/meta/classes/
H A Dcve-check.bbclass8 # CVE found and generate a file in the recipe WORKDIR/cve
32 CVE_CHECK_LOG ?= "${T}/cve.log"
34 CVE_CHECK_SUMMARY_DIR ?= "${LOG_DIR}/cve"
35 CVE_CHECK_SUMMARY_FILE_NAME ?= "cve-summary"
37 CVE_CHECK_SUMMARY_FILE_NAME_JSON = "cve-summary.json"
38 CVE_CHECK_SUMMARY_INDEX_PATH = "${CVE_CHECK_SUMMARY_DIR}/cve-summary-index.txt"
40 CVE_CHECK_LOG_JSON ?= "${T}/cve.json"
42 CVE_CHECK_DIR ??= "${DEPLOY_DIR}/cve"
45 CVE_CHECK_MANIFEST ?= "${IMGDEPLOYDIR}/${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.cve"
158 do_cve_check[depends] = "cve-update-db-native:do_fetch"
[all …]
/OK3568_Linux_fs/yocto/poky/meta/recipes-extended/unzip/
H A Dunzip_6.0.bb14 file://cve-2014-9636.patch \
15 file://09-cve-2014-8139-crc-overflow.patch \
16 file://10-cve-2014-8140-test-compr-eb.patch \
17 file://11-cve-2014-8141-getzip64data.patch \
21 file://18-cve-2014-9913-unzip-buffer-overflow.patch \
22 file://19-cve-2016-9844-zipinfo-buffer-overflow.patch \
/OK3568_Linux_fs/yocto/poky/meta/lib/oe/
H A Dcve_check.py100 cve = fname_match.group(1).upper()
101 patched_cves.add(cve)
102 bb.debug(2, "Found CVE %s from patch file name %s" % (cve, patch_file))
119 for cve in cves.split():
120 bb.debug(2, "Patch %s solves %s" % (patch_file, cve))
121 patched_cves.add(cve)
/OK3568_Linux_fs/buildroot/package/ltp-testsuite/
H A D0005-lapi-if_addr.h-Define-IFA_FLAGS.patch24 testcases/cve/icmp_rate_limit01.c | 3 ++-
40 diff --git a/testcases/cve/icmp_rate_limit01.c b/testcases/cve/icmp_rate_limit01.c
42 --- a/testcases/cve/icmp_rate_limit01.c
43 +++ b/testcases/cve/icmp_rate_limit01.c
/OK3568_Linux_fs/buildroot/support/scripts/
H A Dpkg-stats577 def check_package_cve_affects(cve, cpe_product_pkgs): argument
578 for product in cve.affected_products:
582 … if cve.affects(pkg.name, pkg.current_version, pkg.ignored_cves, pkg.cpeid) == cve.CVE_AFFECTS:
583 pkg.cves.append(cve.identifier)
604 for cve in cvecheck.CVE.read_nvd_dir(nvd_path):
605 check_package_cve_affects(cve, cpe_product_pkgs)
921 for cve in pkg.cves:
922 … f.write(" <a href=\"https://security-tracker.debian.org/tracker/%s\">%s<br/>\n" % (cve, cve))
1116 import cve as cvecheck
H A Dcve.py135 for cve in content:
136 yield cls(cve)
/OK3568_Linux_fs/yocto/poky/meta/recipes-graphics/virglrenderer/
H A Dvirglrenderer_0.9.1.bb15 file://cve-2022-0135.patch \
16 file://cve-2022-0175.patch \
/OK3568_Linux_fs/yocto/poky/meta/recipes-core/meta/
H A Dcve-update-db-native.bb15 NVDCVE_URL ?= "https://nvd.nist.gov/feeds/json/cve/1.1/nvdcve-1.1-"
27 if not bb.data.inherits_class("cve-check", d):
28 raise bb.parse.SkipRecipe("Skip recipe when cve-check class is not loaded.")
266 cveId = elt['cve']['CVE_data_meta']['ID']
267 cveDesc = elt['cve']['description']['description_data'][0]['value']
/OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-gnome/vte9/
H A Dvte9_0.28.2.bb6 file://cve-2012-2738.patch \
/OK3568_Linux_fs/u-boot/doc/device-tree-bindings/clock/
H A Dnvidia,tegra20-car.txt78 49 unassigned (register bit affects tvo and cve)
134 103 cve

123