public inbox for openembedded-core@lists.openembedded.org
 help / color / mirror / Atom feed
From: Benjamin Robin <benjamin.robin@bootlin.com>
To: "openembedded-core@lists.openembedded.org"
	<openembedded-core@lists.openembedded.org>,
	Daniel Turull <daniel.turull@ericsson.com>
Subject: Re: [PATCH] improve_kernel_cve_report: use numeric versions instead of cpeApplicability
Date: Fri, 17 Apr 2026 16:47:08 +0200	[thread overview]
Message-ID: <8667598.T7Z3S40VBb@brobin-bootlin> (raw)
In-Reply-To: <PA3PR07MB10721AC4C17755A46BB4D4F378A202@PA3PR07MB10721.eurprd07.prod.outlook.com>

On Friday, April 17, 2026 at 4:35 PM, Daniel Turull wrote:
> True,
> I sent CVEs that had different responses. I used an old checkout and rerun with the old and the new script.
> 
> I'm starting to find some issues with the data that we should clarify before merging this patch. Let's pause it and have it correct.
> 
> For example,
> https://git.kernel.org/pub/scm/linux/security/vulns.git/tree/cve/published/2025/CVE-2025-40067.json
> 
> "defaultStatus": "affected",
> {
>                      "version": "6.6.112",
>                      "lessThanOrEqual": "6.6.*",
>                      "status": "unaffected",
>                      "versionType": "semver"
>                   },
> 
> "negate": false,
> {
>                            "vulnerable": true,
>                            "criteria": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
>                            "versionStartIncluding": "6.6.102",
>                            "versionEndExcluding": "6.6.112"
>                         },

I see nothing wrong here.
In [>6.6.102, <6.6.112] => vulnerable, and [>=6.6.112, <=6.6.*] => not vulnerable.

> In this case, the information in one of the entries is not correct. For example, in 6.6.100 is vulnerable in the version not in the cpeApplicability, but git versions and cpeApplicability match if we do a git describe on them.

I really did not understood this sentence.
Be aware that if you do a git describe, this is the tag that can be reached
that is displayed, not the tag that include the commit!

Could you elaborate in more details, I may be wrong here...

> I'll send an email to ask for clarification to the kernel security team and try to see other similar cases. I must say that this is a minority of all CVEs.
> 
> Also I need to look if this could be integrated in the sbom-cve-check, so we have it only one place. I want to be able to run the script as well with older releases or just telling the kernel to use without SBOM.

This is already integrated to sbom-cve-check (I pushed today in main),
but the algorithm is completely different.
And again since NVD database is enabled (by default) the result is not as
good as if you are only using the CVEList entries.

I was going to propose to drop this Python script that you are working on.

> 
> Best regards,
> Daniel
> 
> 
> > -----Original Message-----
> > From: Benjamin Robin <benjamin.robin@bootlin.com>
> > Sent: Friday, 17 April 2026 15:55
> > To: openembedded-core@lists.openembedded.org; Daniel Turull
> > <daniel.turull@ericsson.com>
> > Subject: Re: [PATCH] improve_kernel_cve_report: use numeric versions
> > instead of cpeApplicability
> > 
> > On Friday, April 17, 2026 at 3:44 PM, Daniel Turull wrote:
> > > Hi,
> > > We had Greg visiting us and I asked him what is better to use and he said git
> > or versions, not cvepAplicability that has issues defining trees.
> > 
> > You reply is technically not responding to my question :) Could you provide at
> > least one example with an entry that is not correct in the cpeApplicability
> > node?
> > 
> > The script had previously various issue (or at least it looked like it).
> > I preferred to use a completely different algorithm (and using all sources of
> > information)
> > 
> > But since I am also using NVD entries this degrade a bit the quality of the
> > generated assessment message
> > 
> > > I have done some comparison with 6.6.100 and 6.18.22



-- 
Benjamin Robin, Bootlin
Embedded Linux and Kernel engineering
https://bootlin.com





  reply	other threads:[~2026-04-17 14:47 UTC|newest]

Thread overview: 11+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-17 13:24 [PATCH] improve_kernel_cve_report: use numeric versions instead of cpeApplicability daniel.turull
2026-04-17 13:32 ` Benjamin Robin
2026-04-17 13:44   ` Daniel Turull
2026-04-17 13:54     ` Benjamin Robin
2026-04-17 14:35       ` Daniel Turull
2026-04-17 14:47         ` Benjamin Robin [this message]
2026-04-17 16:54           ` Daniel Turull
2026-04-19  9:07             ` Benjamin Robin
2026-04-20  7:10               ` [OE-core] " Daniel Turull
2026-04-20  7:30                 ` Benjamin Robin
2026-04-20  7:53                   ` Daniel Turull

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=8667598.T7Z3S40VBb@brobin-bootlin \
    --to=benjamin.robin@bootlin.com \
    --cc=daniel.turull@ericsson.com \
    --cc=openembedded-core@lists.openembedded.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox