Skip to content

Commit 4e769ca

Browse files
Merge branch 'main' into feat/add-support-cvssv4
2 parents c1eb63c + a06af76 commit 4e769ca

File tree

344 files changed

+5226
-2725
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

344 files changed

+5226
-2725
lines changed

Diff for: .github/actions/spelling/allow.txt

+36
Original file line numberDiff line numberDiff line change
@@ -15,6 +15,7 @@ apcupsd
1515
api
1616
apk
1717
apparmor
18+
apr
1819
ares
1920
argparse
2021
Args
@@ -54,6 +55,7 @@ blog
5455
bluetooth
5556
bluetoothctl
5657
bluez
58+
boa
5759
boinc
5860
bolt
5961
boot
@@ -69,6 +71,7 @@ bwm
6971
bzip
7072
c
7173
cabextract
74+
cairo
7275
capnproto
7376
cbt
7477
CDNs
@@ -77,6 +80,7 @@ ceph
7780
cfa
7881
cfea
7982
cff
83+
cflow
8084
chaitanyamogal
8185
Changelog
8286
charset
@@ -86,11 +90,13 @@ chris
8690
chrony
8791
civetweb
8892
clamav
93+
clang
8994
cleartext
9095
clnt
9196
cmdline
9297
codebase
9398
codecov
99+
codespell
94100
collectd
95101
commons
96102
compress
@@ -149,6 +155,7 @@ dio
149155
Dio
150156
distro
151157
distros
158+
djvulibre
152159
dlt
153160
dmidecode
154161
dnsmasq
@@ -221,6 +228,7 @@ ftp
221228
ftpd
222229
fuzzer
223230
g
231+
GAAD
224232
GAD
225233
gawk
226234
gcc
@@ -259,9 +267,11 @@ gpsd
259267
graphicsmagick
260268
grep
261269
grub
270+
gsasl
262271
GSo
263272
gsoc
264273
gstreamer
274+
guile
265275
gupnp
266276
gvfs
267277
gzip
@@ -291,9 +301,13 @@ i
291301
icecast
292302
icu
293303
ikeydoherty
304+
imagemagick
294305
img
295306
imgur
296307
imsahil
308+
inclusivity
309+
indent
310+
inetutils
297311
INI
298312
inosmeet
299313
iperf
@@ -312,6 +326,7 @@ jacksondatabind
312326
janus
313327
jasper
314328
javascript
329+
jbig
315330
jdk
316331
jerinjtitus
317332
jhead
@@ -338,6 +353,7 @@ libass
338353
libbluetooth
339354
libbpg
340355
libc
356+
libcap
341357
libcoap
342358
libconfuse
343359
libcurl
@@ -357,6 +373,7 @@ libinput
357373
libjpeg
358374
libksba
359375
liblas
376+
liblouis
360377
libmatroska
361378
libmemcached
362379
libmicrohttpd
@@ -368,6 +385,8 @@ libpng
368385
libprotobuf
369386
libraryname
370387
libraw
388+
libreoffice
389+
libreswan
371390
librsvg
372391
librsync
373392
libsamplerate
@@ -393,6 +412,7 @@ libvpx
393412
libxml
394413
libxslt
395414
libyaml
415+
libyang
396416
lifecycle
397417
lighttpd
398418
linode
@@ -408,6 +428,7 @@ luajit
408428
lxc
409429
lynx
410430
lz
431+
lzo
411432
mailx
412433
malloc
413434
malware
@@ -508,6 +529,7 @@ onboarding
508529
oneline
509530
open
510531
openafs
532+
openblas
511533
opencv
512534
openjpeg
513535
openldap
@@ -519,7 +541,9 @@ opensuse
519541
openswan
520542
openvex
521543
openvpn
544+
openvswitch
522545
openwrt
546+
opkg
523547
orc
524548
ossl
525549
osv
@@ -546,6 +570,7 @@ picocom
546570
pigz
547571
pixbuf
548572
pixman
573+
pjsip
549574
plotly
550575
png
551576
pocoo
@@ -597,6 +622,7 @@ readthedocs
597622
realpython
598623
rebasing
599624
redhat
625+
redis
600626
refactored
601627
refactoring
602628
regex
@@ -617,6 +643,7 @@ rsync
617643
rsyslog
618644
rtl
619645
rtmpdump
646+
ruby
620647
runc
621648
rust
622649
sakshatshinde
@@ -626,6 +653,7 @@ sandboxing
626653
sane
627654
sanketsaurav
628655
sannanansari
656+
sasl
629657
Saurabh
630658
sbs
631659
sdk
@@ -678,6 +706,7 @@ tagvalue
678706
tar
679707
tarfiles
680708
taskbar
709+
tbb
681710
tcpdump
682711
tcpreplay
683712
tempfile
@@ -702,6 +731,7 @@ toml
702731
toolkit
703732
tools
704733
tor
734+
toybox
705735
tpm
706736
traceroute
707737
transmission
@@ -737,6 +767,7 @@ util
737767
utkarsh
738768
utm
739769
uuid
770+
uwsgi
740771
v
741772
varnish
742773
venv
@@ -756,6 +787,8 @@ Vulnerability
756787
Vulnerabity
757788
vulnerablities
758789
vulnerablity
790+
wavpack
791+
WCAG
759792
webkitgtk
760793
webserver
761794
website
@@ -773,6 +806,7 @@ workarounds
773806
workflow
774807
workflows
775808
wpa
809+
wrt
776810
wsl
777811
www
778812
wzao
@@ -782,9 +816,11 @@ xerces
782816
Xiph
783817
xkcd
784818
xml
819+
xpdf
785820
xscreensaver
786821
xvf
787822
xwayland
823+
xz
788824
yakkety
789825
yaml
790826
yashugarg

Diff for: .github/codecov.yml

+14
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,14 @@
1+
codecov:
2+
token: ${{ secrets.CODECOV_TOKEN }}
3+
ci:
4+
- github-actions
5+
max_report_age: 12
6+
require_ci_to_pass: TRUE
7+
8+
coverage:
9+
round: down
10+
range: 60..80
11+
12+
comment:
13+
layout: "condensed_header, condensed_files, condensed_footer"
14+
hide_project_coverage: FALSE

Diff for: .github/workflows/build-wheel.yml

+2-2
Original file line numberDiff line numberDiff line change
@@ -23,12 +23,12 @@ jobs:
2323
if: github.repository == 'intel/cve-bin-tool' # run on origin repo only
2424
steps:
2525
- name: Harden Runner
26-
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
26+
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
2727
with:
2828
egress-policy: audit
2929

3030
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
31-
- uses: actions/setup-python@0b93645e9fea7318ecaed2b359559ac225c90a2b # v5.3.0
31+
- uses: actions/setup-python@42375524e23c412d93fb67b49958b491fce71c38 # v5.4.0
3232
with:
3333
python-version: ${{ matrix.python-version }}
3434
cache: 'pip'

Diff for: .github/workflows/codeql-analysis.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -42,7 +42,7 @@ jobs:
4242

4343
steps:
4444
- name: Harden Runner
45-
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
45+
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
4646
with:
4747
egress-policy: audit
4848

@@ -51,7 +51,7 @@ jobs:
5151

5252
# Initializes the CodeQL tools for scanning.
5353
- name: Initialize CodeQL
54-
uses: github/codeql-action/init@48ab28a6f5dbc2a99bf1e0131198dd8f1df78169 # v3.28.0
54+
uses: github/codeql-action/init@6bb031afdd8eb862ea3fc1848194185e076637e5 # v3.28.11
5555
with:
5656
languages: ${{ matrix.language }}
5757
# If you wish to specify custom queries, you can do so here or in a config file.
@@ -76,4 +76,4 @@ jobs:
7676
# make release
7777

7878
- name: Perform CodeQL Analysis
79-
uses: github/codeql-action/analyze@48ab28a6f5dbc2a99bf1e0131198dd8f1df78169 # v3.28.0
79+
uses: github/codeql-action/analyze@6bb031afdd8eb862ea3fc1848194185e076637e5 # v3.28.11

Diff for: .github/workflows/coverity.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -14,7 +14,7 @@ jobs:
1414
runs-on: ${{ github.repository_owner == 'intel' && 'intel-ubuntu-latest' || 'ubuntu-latest' }}
1515
steps:
1616
- name: Harden Runner
17-
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
17+
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
1818
with:
1919
egress-policy: audit
2020

Diff for: .github/workflows/cve_scan.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -17,12 +17,12 @@ jobs:
1717
timeout-minutes: 60
1818
steps:
1919
- name: Harden Runner
20-
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
20+
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
2121
with:
2222
egress-policy: audit
2323

2424
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
25-
- uses: actions/setup-python@0b93645e9fea7318ecaed2b359559ac225c90a2b # v5.3.0
25+
- uses: actions/setup-python@42375524e23c412d93fb67b49958b491fce71c38 # v5.4.0
2626
with:
2727
python-version: '3.11'
2828
cache: 'pip'
@@ -32,7 +32,7 @@ jobs:
3232
run: |
3333
echo "date=$(/bin/date -u "+%Y%m%d")" >> $GITHUB_OUTPUT
3434
- name: Get cached database
35-
uses: actions/cache@1bd1e32a3bdc45362d1e726936510720a7c30a57 # v4.2.0
35+
uses: actions/cache@d4323d4df104b026a6aa633fdb11d772146be0bf # v4.2.2
3636
with:
3737
path: cache
3838
key: Linux-cve-bin-tool-${{ steps.get-date.outputs.date }}

Diff for: .github/workflows/dependency-review.yml

+1-1
Original file line numberDiff line numberDiff line change
@@ -17,7 +17,7 @@ jobs:
1717
runs-on: ${{ github.repository_owner == 'intel' && 'intel-ubuntu-latest' || 'ubuntu-latest' }}
1818
steps:
1919
- name: Harden Runner
20-
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
20+
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
2121
with:
2222
egress-policy: audit
2323

Diff for: .github/workflows/formatting.yml

+3-3
Original file line numberDiff line numberDiff line change
@@ -19,12 +19,12 @@ jobs:
1919
runs-on: ${{ github.repository_owner == 'intel' && 'intel-ubuntu-latest' || 'ubuntu-latest' }}
2020
steps:
2121
- name: Harden Runner
22-
uses: step-security/harden-runner@cb605e52c26070c328afc4562f0b4ada7618a84e # v2.10.4
22+
uses: step-security/harden-runner@4d991eb9b905ef189e4c376166672c3f2f230481 # v2.11.0
2323
with:
2424
egress-policy: audit
2525

2626
- uses: actions/checkout@b4ffde65f46336ab88eb53be808477a3936bae11 # v4.1.1
27-
- uses: actions/setup-python@0b93645e9fea7318ecaed2b359559ac225c90a2b # v5.3.0
27+
- uses: actions/setup-python@42375524e23c412d93fb67b49958b491fce71c38 # v5.4.0
2828
with:
2929
python-version: '3.11'
3030
cache: 'pip'
@@ -36,7 +36,7 @@ jobs:
3636
run: |
3737
python cve_bin_tool/format_checkers.py
3838
- name: Create Pull Request
39-
uses: peter-evans/create-pull-request@67ccf781d68cd99b580ae25a5c18a1cc84ffff1f # v7.0.6
39+
uses: peter-evans/create-pull-request@271a8d0340265f705b14b6d32b9829c1cb33d45e # v7.0.8
4040
with:
4141
commit-message: "chore: update checkers table"
4242
title: "chore: update checkers table"

0 commit comments

Comments
 (0)