| /OK3568_Linux_fs/yocto/poky/documentation/migration-guides/ |
| H A D | release-notes-4.0.rst | 198 - cve-check: add json output format 199 - cve-check: add coverage statistics on recipes with/without CVEs 336 - binutils: :cve:`2021-42574`, :cve:`2021-45078` 337 - curl: :cve:`2021-22945`, :cve:`2021-22946`, :cve:`2021-22947` 338 - epiphany: :cve:`2021-45085`, :cve:`2021-45086`, :cve:`2021-45087`, :cve:`2021-45088` 339 …cve:`2021-45960`, :cve:`2021-46143`, :cve:`2022-22822`, :cve:`2022-22823`, :cve:`2022-22824`, :cve… 340 - ffmpeg: :cve:`2021-38114` 341 - gcc: :cve:`2021-35465`, :cve:`2021-42574`, :cve:`2021-46195`, :cve:`2022-24765` 342 - glibc: :cve:`2021-3998`, :cve:`2021-3999`, :cve:`2021-43396`, :cve:`2022-23218`, :cve:`2022-23219` 343 - gmp: :cve:`2021-43618` [all …]
|
| H A D | release-notes-4.0.7.rst | 9 - binutils: Fix :cve:`2022-4285` 10 - curl: Fix :cve:`2022-43551` and `CVE-2022-43552 <https://cve.mitre.org/cgi-bin/cvename.cgi?name=… 11 - ffmpeg: Fix :cve:`2022-3109` and :cve:`2022-3341` 12 - go: Fix :cve:`2022-41715` and :cve:`2022-41717` 13 - libX11: Fix :cve:`2022-3554` and :cve:`2022-3555` 14 - libarchive: Fix :cve:`2022-36227` 15 - libksba: Fix :cve:`2022-47629` 16 - libpng: Fix :cve:`2019-6129` 17 - libxml2: Fix :cve:`2022-40303` and :cve:`2022-40304` 18 - openssl: Fix :cve:`2022-3996` [all …]
|
| H A D | release-notes-4.0.6.rst | 9 - bash: Fix :cve:`2022-3715` 10 - curl: Fix :cve:`2022-32221`, :cve:`2022-42915` and :cve:`2022-42916` 11 - dbus: Fix :cve:`2022-42010`, :cve:`2022-42011` and :cve:`2022-42012` 12 - dropbear: Fix :cve:`2021-36369` 13 - ffmpeg: Fix :cve:`2022-3964`, :cve:`2022-3965` 14 - go: Fix :cve:`2022-2880` 15 - grub2: Fix :cve:`2022-2601`, :cve:`2022-3775` and :cve:`2022-28736` 16 - libarchive: Fix :cve:`2022-36227` 17 - libpam: Fix :cve:`2022-28321` 18 - libsndfile1: Fix :cve:`2021-4156` [all …]
|
| H A D | release-notes-3.4.rst | 150 - cve-extra-exclusions.inc: add exclusion list for intractable CVE's 219 - apr: :cve:`2021-35940` 220 - aspell: :cve:`2019-25051` 221 - avahi: :cve:`2021-3468`, :cve:`2021-36217` 222 - binutils: :cve:`2021-20197` 223 - bluez: :cve:`2021-3658` 224 - busybox: :cve:`2021-28831` 225 - cairo: :cve:`2020-35492` 226 - cpio: :cve:`2021-38185` 227 - expat: :cve:`2013-0340` [all …]
|
| H A D | release-notes-3.4.2.rst | 7 - tiff: backport fix for :cve:`2022-22844` 8 - glibc : Fix :cve:`2021-3999` 9 - glibc : Fix :cve:`2021-3998` 10 - glibc : Fix :cve:`2022-23219` 11 - glibc : Fix :cve:`2022-23218` 12 - lighttpd: backport a fix for :cve:`2022-22707` 13 - speex: fix :cve:`2020-23903` 14 - linux-yocto/5.10: amdgpu: updates for :cve:`2021-42327` 15 - libsndfile1: fix :cve:`2021-4156` 17 - grub2: fix :cve:`2021-3981` [all …]
|
| H A D | release-notes-4.0.2.rst | 7 - libxslt: Mark :cve:`2022-29824` as not applying 8 - tiff: Add jbig PACKAGECONFIG and clarify IGNORE :cve:`2022-1210` 9 - tiff: mark :cve:`2022-1622` and :cve:`2022-1623` as invalid 10 - pcre2:fix :cve:`2022-1586` Out-of-bounds read 11 …cve:`2022-22576`, :cve:`2022-27775`, :cve:`2022-27776`, :cve:`2022-27774`, :cve:`2022-30115`, :cve… 12 - qemu: fix :cve:`2021-4206` and :cve:`2021-4207` 13 - freetype: fix :cve:`2022-27404`, :cve:`2022-27405` and :cve:`2022-27406` 37 - cve-check.bbclass: Added do_populate_sdk[recrdeptask]. 38 - cve-check: Add helper for symlink handling 39 - cve-check: Allow warnings to be disabled [all …]
|
| H A D | release-notes-4.0.3.rst | 7 - binutils: fix :cve:`2019-1010204` 8 - busybox: fix :cve:`2022-30065` 9 - cups: ignore :cve:`2022-26691` 10 - curl: Fix :cve:`2022-32205`, :cve:`2022-32206`, :cve:`2022-32207` and :cve:`2022-32208` 11 - dpkg: fix :cve:`2022-1664` 12 - ghostscript: fix :cve:`2022-2085` 13 - harfbuzz: fix :cve:`2022-33068` 14 - libtirpc: fix :cve:`2021-46828` 15 - lua: fix :cve:`2022-33099` 16 - nasm: ignore :cve:`2020-18974` [all …]
|
| H A D | release-notes-4.0.4.rst | 7 - binutils : fix :cve:`2022-38533` 8 - curl: fix :cve:`2022-35252` 9 - sqlite: fix :cve:`2022-35737` 10 - grub2: fix :cve:`2021-3695`, :cve:`2021-3696`, :cve:`2021-3697`, :cve:`2022-28733`, :cve:`2022-2… 11 - u-boot: fix :cve:`2022-30552` and :cve:`2022-33967` 12 - libxml2: Ignore :cve:`2016-3709` 13 - libtiff: fix :cve:`2022-34526` 14 - zlib: fix :cve:`2022-37434` 15 - gnutls: fix :cve:`2022-2509` 16 - u-boot: fix :cve:`2022-33103` [all …]
|
| H A D | release-notes-4.0.8.rst | 9 - apr-util: Fix :cve:`2022-25147` 10 - apr: Fix :cve:`2022-24963`, :cve:`2022-28331` and :cve:`2021-35940` 11 - bind: Fix :cve:`2022-3094`, :cve:`2022-3736` and :cve:`2022-3924` 12 - git: Ignore :cve:`2022-41953` 13 - git: Fix :cve:`2022-23521` and :cve:`2022-41903` 14 - libgit2: Fix :cve:`2023-22742` 15 - ppp: Fix :cve:`2022-4603` 16 - python3-certifi: Fix :cve:`2022-23491` 17 - sudo: Fix :cve:`2023-22809` 18 - tar: Fix :cve:`2022-48303`
|
| H A D | release-notes-4.0.5.rst | 7 - qemu: fix :cve:`2021-3750`, :cve:`2021-3611` and :cve:`2022-2962` 8 - binutils : fix :cve:`2022-38126`, :cve:`2022-38127` and :cve:`2022-38128` 9 - tff: fix :cve:`2022-2867`, :cve:`2022-2868` and :cve:`2022-2869` 10 - inetutils: fix :cve:`2022-39028` 11 - go: fix :cve:`2022-27664`
|
| H A D | release-notes-3.4.4.rst | 7 - tiff: fix :cve:`2022-0865`, :cve:`2022-0891`, :cve:`2022-0907`, :cve:`2022-0908`, :cve:`2022-090… 10 - zlib: fix :cve:`2018-25032` 11 - grub: ignore :cve:`2021-46705`
|
| H A D | release-notes-3.4.3.rst | 7 - ghostscript: fix :cve:`2021-3781` 8 - ghostscript: fix :cve:`2021-45949` 9 - tiff: Add backports for two CVEs from upstream (:cve:`2022-0561` & :cve:`2022-0562`) 10 - gcc : Fix :cve:`2021-46195` 12 - binutils: Add fix for :cve:`2021-45078` 18 - Revert "cve-check: add lockfile to task" 32 - cve-check: create directory of CVE_CHECK_MANIFEST before copy 33 - cve-check: get_cve_info should open the database read-only
|
| H A D | release-notes-3.4.1.rst | 12 - glibc: Backport fix for :cve:`2021-43396` 13 - vim: add patch number to :cve:`2021-3778` patch 14 - vim: fix :cve:`2021-3796`, :cve:`2021-3872`, and :cve:`2021-3875` 15 - squashfs-tools: follow-up fix for :cve:`2021-41072` 17 - squashfs-tools: fix :cve:`2021-41072` 18 - ffmpeg: fix :cve:`2021-38114` 19 - curl: fix :cve:`2021-22945`, :cve:`2021-22946` and :cve:`2021-22947`
|
| H A D | release-notes-4.0.1.rst | 7 - linux-yocto/5.15: fix :cve:`2022-28796` 8 - python3: ignore :cve:`2015-20107` 9 - e2fsprogs: fix :cve:`2022-1304` 10 - lua: fix :cve:`2022-28805` 11 - busybox: fix :cve:`2022-28391` 30 - cve-check: add JSON format to summary output 31 - cve-check: fix symlinks where link and output path are equal 32 - cve-check: no need to depend on the fetch task 33 - cve-update-db-native: let the user to drive the update interval 34 - cve-update-db-native: update the CVE database once a day only [all …]
|
| H A D | migration-3.0.rst | 49 - ``cve-check-tool``: Functionally replaced by the ``cve-update-db`` 50 recipe and :ref:`cve-check <ref-classes-cve-check>` class. 139 .. _migration-3.0-cve-checking: 144 ``cve-check-tool`` has been functionally replaced by a new 145 ``cve-update-db`` recipe and functionality built into the :ref:`cve-check <ref-classes-cve-check>` 147 XML feeds that ``cve-check-tool`` was using, supports CVSSv3 scoring,
|
| /OK3568_Linux_fs/yocto/poky/meta/classes/ |
| H A D | cve-check.bbclass | 8 # CVE found and generate a file in the recipe WORKDIR/cve 32 CVE_CHECK_LOG ?= "${T}/cve.log" 34 CVE_CHECK_SUMMARY_DIR ?= "${LOG_DIR}/cve" 35 CVE_CHECK_SUMMARY_FILE_NAME ?= "cve-summary" 37 CVE_CHECK_SUMMARY_FILE_NAME_JSON = "cve-summary.json" 38 CVE_CHECK_SUMMARY_INDEX_PATH = "${CVE_CHECK_SUMMARY_DIR}/cve-summary-index.txt" 40 CVE_CHECK_LOG_JSON ?= "${T}/cve.json" 42 CVE_CHECK_DIR ??= "${DEPLOY_DIR}/cve" 45 CVE_CHECK_MANIFEST ?= "${IMGDEPLOYDIR}/${IMAGE_NAME}${IMAGE_NAME_SUFFIX}.cve" 158 do_cve_check[depends] = "cve-update-db-native:do_fetch" [all …]
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-extended/unzip/ |
| H A D | unzip_6.0.bb | 14 file://cve-2014-9636.patch \ 15 file://09-cve-2014-8139-crc-overflow.patch \ 16 file://10-cve-2014-8140-test-compr-eb.patch \ 17 file://11-cve-2014-8141-getzip64data.patch \ 21 file://18-cve-2014-9913-unzip-buffer-overflow.patch \ 22 file://19-cve-2016-9844-zipinfo-buffer-overflow.patch \
|
| /OK3568_Linux_fs/yocto/poky/meta/lib/oe/ |
| H A D | cve_check.py | 100 cve = fname_match.group(1).upper() 101 patched_cves.add(cve) 102 bb.debug(2, "Found CVE %s from patch file name %s" % (cve, patch_file)) 119 for cve in cves.split(): 120 bb.debug(2, "Patch %s solves %s" % (patch_file, cve)) 121 patched_cves.add(cve)
|
| /OK3568_Linux_fs/buildroot/package/ltp-testsuite/ |
| H A D | 0005-lapi-if_addr.h-Define-IFA_FLAGS.patch | 24 testcases/cve/icmp_rate_limit01.c | 3 ++- 40 diff --git a/testcases/cve/icmp_rate_limit01.c b/testcases/cve/icmp_rate_limit01.c 42 --- a/testcases/cve/icmp_rate_limit01.c 43 +++ b/testcases/cve/icmp_rate_limit01.c
|
| /OK3568_Linux_fs/buildroot/support/scripts/ |
| H A D | pkg-stats | 577 def check_package_cve_affects(cve, cpe_product_pkgs): argument 578 for product in cve.affected_products: 582 … if cve.affects(pkg.name, pkg.current_version, pkg.ignored_cves, pkg.cpeid) == cve.CVE_AFFECTS: 583 pkg.cves.append(cve.identifier) 604 for cve in cvecheck.CVE.read_nvd_dir(nvd_path): 605 check_package_cve_affects(cve, cpe_product_pkgs) 921 for cve in pkg.cves: 922 … f.write(" <a href=\"https://security-tracker.debian.org/tracker/%s\">%s<br/>\n" % (cve, cve)) 1116 import cve as cvecheck
|
| H A D | cve.py | 135 for cve in content: 136 yield cls(cve)
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-graphics/virglrenderer/ |
| H A D | virglrenderer_0.9.1.bb | 15 file://cve-2022-0135.patch \ 16 file://cve-2022-0175.patch \
|
| /OK3568_Linux_fs/yocto/poky/meta/recipes-core/meta/ |
| H A D | cve-update-db-native.bb | 15 NVDCVE_URL ?= "https://nvd.nist.gov/feeds/json/cve/1.1/nvdcve-1.1-" 27 if not bb.data.inherits_class("cve-check", d): 28 raise bb.parse.SkipRecipe("Skip recipe when cve-check class is not loaded.") 266 cveId = elt['cve']['CVE_data_meta']['ID'] 267 cveDesc = elt['cve']['description']['description_data'][0]['value']
|
| /OK3568_Linux_fs/yocto/meta-openembedded/meta-oe/recipes-gnome/vte9/ |
| H A D | vte9_0.28.2.bb | 6 file://cve-2012-2738.patch \
|
| /OK3568_Linux_fs/u-boot/doc/device-tree-bindings/clock/ |
| H A D | nvidia,tegra20-car.txt | 78 49 unassigned (register bit affects tvo and cve) 134 103 cve
|