From: "Björn Höfling" <bjoern.hoefling@bjoernhoefling.de>
To: 31437@debbugs.gnu.org
Subject: [bug#31437] [PATCH 1/2] doc: Update documentation of guix lint
Date: Sun, 13 May 2018 01:40:00 +0200 [thread overview]
Message-ID: <20180513014000.132a2c85@alma-ubu> (raw)
In-Reply-To: <20180513013222.2f0629dc@alma-ubu>
[-- Attachment #1: Type: text/plain, Size: 1598 bytes --]
* doc/guix.texi (Invoking guix lint): Add cpe-version to example.
* doc/guix.texi (Invoking guix lint): Add example for lint-hidden-cve.
---
doc/guix.texi | 22 +++++++++++++++++++---
1 file changed, 19 insertions(+), 3 deletions(-)
diff --git a/doc/guix.texi b/doc/guix.texi
index 637c9c3f4..f0b666b9e 100644
--- a/doc/guix.texi
+++ b/doc/guix.texi
@@ -6835,15 +6835,31 @@ where @code{CVE-YYYY-ABCD} is the CVE identifier---e.g.,
Package developers can specify in package recipes the
@uref{https://nvd.nist.gov/cpe.cfm,Common Platform Enumeration (CPE)}
-name and version of the package when they differ from the name that Guix
-uses, as in this example:
+name and version of the package when they differ from the name or version
+that Guix uses, as in this example:
@example
(package
(name "grub")
;; @dots{}
;; CPE calls this package "grub2".
- (properties '((cpe-name . "grub2"))))
+ (properties '((cpe-name . "grub2")
+ (cpe-version . "2.3")))
+@end example
+
+Sometimes, the CVE database contains false positives. Package developers who
+found CVE alerts and verified they can be ignored can declare them as in
+this example:
+
+@example
+(package
+ (name "t1lib")
+ ;; @dots{}
+ ;; These CVEs are false positives and can be ignored:
+ (properties `((lint-hidden-cve . ("CVE-2011-0433"
+ "CVE-2011-1553"
+ "CVE-2011-1554"
+ "CVE-2011-5244")))))
@end example
@item formatting
--
2.17.0
[-- Attachment #2: OpenPGP digital signature --]
[-- Type: application/pgp-signature, Size: 181 bytes --]
next prev parent reply other threads:[~2018-05-12 23:41 UTC|newest]
Thread overview: 5+ messages / expand[flat|nested] mbox.gz Atom feed top
2018-05-12 23:32 [bug#31437] [PATCH 0/2] opencv: Ignore CVEs. Document lint-hidden-cve Björn Höfling
2018-05-12 23:40 ` Björn Höfling [this message]
2018-05-14 8:59 ` [bug#31437] [PATCH 1/2] doc: Update documentation of guix lint Ludovic Courtès
2018-05-12 23:40 ` [bug#31437] [PATCH 2/2] gnu: opencv: Ignore CVEs Björn Höfling
2018-05-14 9:03 ` bug#31437: " Ludovic Courtès
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20180513014000.132a2c85@alma-ubu \
--to=bjoern.hoefling@bjoernhoefling.de \
--cc=31437@debbugs.gnu.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this external index
https://git.savannah.gnu.org/cgit/guix.git
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.