All of lore.kernel.org
 help / color / mirror / Atom feed
From: Benjamin Robin <benjamin.robin@bootlin.com>
To: Ross Burton <ross.burton@arm.com>,
	"Marko, Peter" <Peter.Marko@siemens.com>
Cc: "openembedded-core@lists.openembedded.org"
	<openembedded-core@lists.openembedded.org>
Subject: Re: [PATCH 2/2] xwayland: set status for CVE-2024-21886
Date: Mon, 13 Apr 2026 09:05:17 +0200	[thread overview]
Message-ID: <3410842.44csPzL39Z@brobin-bootlin> (raw)
In-Reply-To: <AS1PR10MB56973C7FC237B95B05B7B1DBFD272@AS1PR10MB5697.EURPRD10.PROD.OUTLOOK.COM>

On Sunday, April 12, 2026 at 11:01 PM, Marko, Peter wrote:
> > From: Benjamin Robin <benjamin.robin@bootlin.com>
> > This should not be possible. With default configuration a manual
> > annotation cannot be overwritten. sbom-cve-check directly use the
> > annotation without any extra processing.
> 
> I wonder what I'm doing wrong when using this new code for the first time...
> When I got to the "new" CVE for ovmf, cve-metrics shows only CVE-2024-1298.
> In my local build, I get all the CVEs (which are se to fixed-version in the recipe).
> 
> RECIPE=ovmf; bitbake $RECIPE -c sbom_cve_check_recipe; jq -r '.package[] | select(.name == "'$RECIPE'") | .issue[]? | select(.status == "Unpatched") | .id' tmp/deploy/images/qemux86-64/$RECIPE-recipe-sbom.sbom-cve-check.yocto.json
> CVE-2014-4859
> CVE-2014-4860
> CVE-2014-8271
> CVE-2019-14553
> CVE-2019-14559
> CVE-2019-14562
> CVE-2019-14563
> CVE-2019-14575
> CVE-2019-14586
> CVE-2019-14587
> CVE-2024-1298
> 
> My local.conf is:
> DISTRO = "poky"
> INHERIT += "sbom-cve-check-recipe"
> SRCREV:pn-sbom-cve-check-update-cvelist-native = "82e18eb3051039642ed8ec0b8eb15ea27dbbf52c"
> include conf/distro/include/cve-extra-exclusions.inc

I still cannot reproduce your issue.
Could you share these 2 files (by email and compressed, and maybe only to me):
 - ovmf-recipe-sbom.spdx.json
 - ovmf-recipe-sbom.sbom-cve-check.yocto.json

If you also have a KAS configuration file of your current setup, this will
be great.

-- 
Benjamin Robin, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com





  reply	other threads:[~2026-04-13  7:05 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-12 18:52 [PATCH 1/2] xserver-org: update CVE_PRODUCT Peter Marko
2026-04-12 18:52 ` [PATCH 2/2] xwayland: set status for CVE-2024-21886 Peter Marko
2026-04-12 19:04   ` Marko, Peter
2026-04-12 20:22     ` Benjamin Robin
2026-04-12 21:01       ` Marko, Peter
2026-04-13  7:05         ` Benjamin Robin [this message]
2026-04-13  9:00           ` Marko, Peter

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=3410842.44csPzL39Z@brobin-bootlin \
    --to=benjamin.robin@bootlin.com \
    --cc=Peter.Marko@siemens.com \
    --cc=openembedded-core@lists.openembedded.org \
    --cc=ross.burton@arm.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.