From: Antonin Godard <antonin.godard@bootlin.com>
To: docs@lists.yoctoproject.org
Cc: Thomas Petazzoni <thomas.petazzoni@bootlin.com>,
Antonin Godard <antonin.godard@bootlin.com>
Subject: [PATCH v2 11/18] migration-guides/migration-6.0.rst: add migration notes on cve-check removal
Date: Fri, 24 Apr 2026 10:28:39 +0200 [thread overview]
Message-ID: <20260424-third-release-notes-6-0-v2-11-4feacf138e13@bootlin.com> (raw)
In-Reply-To: <20260424-third-release-notes-6-0-v2-0-4feacf138e13@bootlin.com>
The cve-check class was removed with 00de455f8d3a ("classes/cve-check:
remove class") in OE-Core. Add migration notes to migrate from cve-check
to sbom-cve-check.
Signed-off-by: Antonin Godard <antonin.godard@bootlin.com>
---
documentation/migration-guides/migration-6.0.rst | 79 ++++++++++++++++++++++
.../migration-guides/release-notes-6.0.rst | 3 -
2 files changed, 79 insertions(+), 3 deletions(-)
diff --git a/documentation/migration-guides/migration-6.0.rst b/documentation/migration-guides/migration-6.0.rst
index d763062da..ecb124a93 100644
--- a/documentation/migration-guides/migration-6.0.rst
+++ b/documentation/migration-guides/migration-6.0.rst
@@ -291,6 +291,81 @@ information.
Users are advised to transition to SDPX 3.0, which is provided by the
:ref:`ref-classes-create-spdx` class.
+``cve-check`` class removed
+---------------------------
+
+The ``cve-check`` class was removed and replaced by the
+:ref:`ref-classes-sbom-cve-check` class. Quoting the commit removing the class
+(:oecore_rev:`00de455f8d3aeca880129d23e8cfb7e246404699`):
+
+.. code-block:: text
+
+ It's been long known that the cve-check class in oe-core is not that
+ usable in the real world, for more details see "Future of CVE scanning
+ in Yocto"[1]. This mail proposed an alternative direction that included
+ a CVE scanning tool that can be ran both during the build and afterwards,
+ so that periodic scans of a previously build image is possible.
+
+ Last year, Bootlin wrote sbom-cve-check[2] and I compared this to my
+ proposal in "Comparing cve-check with sbom-cve-check"[3], concluding
+ that this is likely the missing piece.
+
+ Support for sbom-cve-check has been merged into oe-core, and the
+ cve-check class is now obsolete. So that we don't have to maintain it for
+ the four-year lifecycle of the Wrynose release, delete it.
+
+ This patch also deletes the database fetcher recipes, and the test cases
+ that were specific to cve-check. Note that the oe.cve_check library
+ still exists as this is used by the SPDX classes.
+
+ [1] https://lore.kernel.org/openembedded-core/7D6E419E-A7AE-4324-966C-3552C586E452@arm.com/
+ [2] https://github.com/bootlin/sbom-cve-check
+ [3] https://lore.kernel.org/openembedded-core/2CD10DD9-FB2A-4B10-B98A-85918EB6B4B7@arm.com/
+
+Users currently using the ``cve-check`` class are advised to switch to
+:ref:`ref-classes-sbom-cve-check`:
+
+- The following assignment::
+
+ INHERIT += "cve-check"
+
+ Should be removed and replaced by::
+
+ OE_FRAGMENTS += "core/yocto/sbom-cve-check"
+
+ This will enable the :ref:`ref-classes-sbom-cve-check` class along with the recommended
+ settings.
+
+ This will deploy two files to the deployment directory
+ (:term:`DEPLOY_DIR_IMAGE`) after building an image:
+
+ - A file ending with ``.sbom-cve-check.yocto.json``: this is the output JSON
+ report in the same format as the one deployed by the ``cve-check`` class.
+
+ - A file ending with ``.sbom-cve-check.spdx.json``: this is an output SPDX
+ report annonated with vulnerable CVEs.
+
+- The ``cve-check`` class output summary file (deployed in the
+ :term:`DEPLOY_DIR_IMAGE`) ending with ``.cve.txt`` is no longer
+ deployed by default but can be added back by adding the following statement
+ to a configuration file::
+
+ SBOM_CVE_CHECK_EXPORT_VARS:append = " SBOM_CVE_CHECK_EXPORT_SUMMARY"
+
+ This will deploy a new file ending with ``.cve.txt``, which uses the same
+ format as the summary previously deployed by the ``cve-check`` class.
+
+ See the documentation of :term:`SBOM_CVE_CHECK_EXPORT_VARS` for more
+ details.
+
+- The ``CVE_CHECK_SHOW_WARNINGS`` variable, which was used to control whether
+ the ``cve-check`` would print warning when unpatched CVEs were found, is now
+ removed and replaced by the :term:`SBOM_CVE_CHECK_SHOW_WARNINGS` variable,
+ which does the same.
+
+See the :doc:`/security-manual/vulnerabilities` section of the Yocto Project
+Security Manual for more information.
+
:term:`CVE_PRODUCT` character escaping change
---------------------------------------------
@@ -410,6 +485,10 @@ The following recipes have been removed in this release:
(OE-Core)` and Python 3.14 now has built-in support for zstd
(:oecore_rev:`55061de857657ea01babc5652caa062e8d292c44`)
+- ``cve-update-db-native``, ``cve-update-nvd2-native``: removed with the
+ ``cve-check`` class removal as it was the only user of these recipes.
+ (:oecore_rev:`00de455f8d3aeca880129d23e8cfb7e246404699`)
+
Removed :term:`PACKAGECONFIG` options
-------------------------------------
diff --git a/documentation/migration-guides/release-notes-6.0.rst b/documentation/migration-guides/release-notes-6.0.rst
index 31d4cdfce..9d611d70a 100644
--- a/documentation/migration-guides/release-notes-6.0.rst
+++ b/documentation/migration-guides/release-notes-6.0.rst
@@ -574,9 +574,6 @@ New Features / Enhancements in |yocto-ver|
- :ref:`ref-classes-sbom-cve-check`-related changes:
- - ``cve-update-nvd2-native``: Use maximum CVSS score when extracting it from
- multiple sources (:oecore_rev:`4f6192f3165de0bc2499e045607c7e7ffd878a4b`)
-
- Escape special characters in CPE 2.3 strings
(:oecore_rev:`9dd9c0038907340ba08ff4c8ee06a8748c1ac00a`)
--
2.53.0
next prev parent reply other threads:[~2026-04-24 8:29 UTC|newest]
Thread overview: 19+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-04-24 8:28 [PATCH v2 00/18] Updates for upcoming Wrynose release (2) Antonin Godard
2026-04-24 8:28 ` [PATCH v2 01/18] conf.py: add a :yocto_bug: role Antonin Godard
2026-04-24 8:28 ` [PATCH v2 02/18] migration-guides/release-notes-6.0.rst: add known KVM issue Antonin Godard
2026-04-24 8:28 ` [PATCH v2 03/18] migration-guides/migration-6.0.rst: document the CVE_PRODUCT behavior change Antonin Godard
2026-04-24 8:28 ` [PATCH v2 04/18] tools/build-docs-container: add missing leap 16.0 in help message Antonin Godard
2026-04-24 8:28 ` [PATCH v2 05/18] tools/build-docs-container: add CentOS 10 support Antonin Godard
2026-04-24 8:28 ` [PATCH v2 06/18] ref-manual/system-requirements.rst: add CentOS 10 as a supported distro Antonin Godard
2026-04-24 8:28 ` [PATCH v2 07/18] docs-wide: drop documentation for cve-check and variables Antonin Godard
2026-04-24 8:28 ` [PATCH v2 08/18] ref-manual/variables.rst: document the SBOM_CVE_CHECK_SHOW_WARNINGS variable Antonin Godard
2026-04-24 8:28 ` [PATCH v2 09/18] security-manual/vulnerabilities.rst: require Upstream-Status, not recommend Antonin Godard
2026-04-24 8:28 ` [PATCH v2 10/18] security-manual/vulnerabilities.rst: refresh the document after cve-check removal Antonin Godard
2026-04-24 8:28 ` Antonin Godard [this message]
2026-04-24 8:28 ` [PATCH v2 12/18] migration-guides/release-notes-6.0.rst: cover recent changes Antonin Godard
2026-04-24 8:28 ` [PATCH v2 13/18] migration-guides/release-notes-6.0.rst: add license changes Antonin Godard
2026-04-24 8:28 ` [PATCH v2 14/18] migration-guides/release-notes-6.0.rst: update CVE fixes Antonin Godard
2026-04-24 8:28 ` [PATCH v2 15/18] migration-guides/release-notes-6.0.rst: add recipe version changes Antonin Godard
2026-04-24 8:28 ` [PATCH v2 16/18] migration-guides/migration-6.0.rst: mention python3-roman-numerals-py rename Antonin Godard
2026-04-24 8:28 ` [PATCH v2 17/18] migration-guides/release-notes-6.0.rst: add contributors Antonin Godard
2026-04-24 8:28 ` [PATCH v2 18/18] ref-manual/variables: IMAGE_TYPES: add new wicenv type Antonin Godard
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260424-third-release-notes-6-0-v2-11-4feacf138e13@bootlin.com \
--to=antonin.godard@bootlin.com \
--cc=docs@lists.yoctoproject.org \
--cc=thomas.petazzoni@bootlin.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox