-
I enabled the Has anyone dealt with the CVE checker and this layer/kernel? Would rather not have to individually allowlist all of the entries if it can be avoided. I am building off of recent master right now ( Wondering if it is getting confused since the kernel is called Here is the cve.log if anyone is curious. You can |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 2 replies
-
First, cve-checker will use the NIC database to create the report and will use the bitbake recipes for that so this bbclass will compare whatever you set as virtual/kernel against the CVE database, now, this doesn't means that all 700 CVEs applies to you because you don't use all the features or drivers that where reported for that kernel version. Also notice that from the report you will find not only kernel related CVEs, again cve-checker uses all bb-recipes so you will find CVEs for common packages like coreutils, more info here -> https://wiki.yoctoproject.org/wiki/Security You can easily know if package CVEs applies to you because yo can compare against the pkg-manifest but for kernel I'm not sure if it exists something similar |
Beta Was this translation helpful? Give feedback.
First, cve-checker will use the NIC database to create the report and will use the bitbake recipes for that so this bbclass will compare whatever you set as virtual/kernel against the CVE database, now, this doesn't means that all 700 CVEs applies to you because you don't use all the features or drivers that where reported for that kernel version. Also notice that from the report you will find not only kernel related CVEs, again cve-checker uses all bb-recipes so you will find CVEs for common packages like coreutils, more info here -> https://wiki.yoctoproject.org/wiki/Security
You can easily know if package CVEs applies to you because yo can compare against the pkg-manifest but for kerne…