{"id":2215945,"url":"http://patchwork.ozlabs.org/api/patches/2215945/?format=json","web_url":"http://patchwork.ozlabs.org/project/buildroot/patch/20260325150346.414826-1-heiko@sntech.de/","project":{"id":27,"url":"http://patchwork.ozlabs.org/api/projects/27/?format=json","name":"Buildroot development","link_name":"buildroot","list_id":"buildroot.buildroot.org","list_email":"buildroot@buildroot.org","web_url":"","scm_url":"","webscm_url":"","list_archive_url":"","list_archive_url_format":"","commit_url_format":""},"msgid":"<20260325150346.414826-1-heiko@sntech.de>","list_archive_url":null,"date":"2026-03-25T15:03:46","name":"package/arm-trusted-firmware: add ARM_TRUSTED_FIRMWARE_CPE_ID_*","commit_ref":null,"pull_url":null,"state":"new","archived":false,"hash":"b7ea3211f0a227ba03c097247ec35f38254e11f3","submitter":{"id":10645,"url":"http://patchwork.ozlabs.org/api/people/10645/?format=json","name":"Heiko Stuebner","email":"heiko@sntech.de"},"delegate":null,"mbox":"http://patchwork.ozlabs.org/project/buildroot/patch/20260325150346.414826-1-heiko@sntech.de/mbox/","series":[{"id":497459,"url":"http://patchwork.ozlabs.org/api/series/497459/?format=json","web_url":"http://patchwork.ozlabs.org/project/buildroot/list/?series=497459","date":"2026-03-25T15:03:46","name":"package/arm-trusted-firmware: add ARM_TRUSTED_FIRMWARE_CPE_ID_*","version":1,"mbox":"http://patchwork.ozlabs.org/series/497459/mbox/"}],"comments":"http://patchwork.ozlabs.org/api/patches/2215945/comments/","check":"pending","checks":"http://patchwork.ozlabs.org/api/patches/2215945/checks/","tags":{},"related":[],"headers":{"Return-Path":"<buildroot-bounces@buildroot.org>","X-Original-To":["incoming-buildroot@patchwork.ozlabs.org","buildroot@buildroot.org"],"Delivered-To":["patchwork-incoming-buildroot@legolas.ozlabs.org","buildroot@buildroot.org"],"Authentication-Results":["legolas.ozlabs.org;\n\tdkim=pass (2048-bit key;\n unprotected) header.d=buildroot.org header.i=@buildroot.org\n header.a=rsa-sha256 header.s=default header.b=bn0E39Wk;\n\tdkim-atps=neutral","legolas.ozlabs.org;\n spf=pass (sender SPF authorized) smtp.mailfrom=buildroot.org\n (client-ip=2605:bc80:3010::138; helo=smtp1.osuosl.org;\n envelope-from=buildroot-bounces@buildroot.org; receiver=patchwork.ozlabs.org)"],"Received":["from smtp1.osuosl.org (smtp1.osuosl.org [IPv6:2605:bc80:3010::138])\n\t(using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits)\n\t key-exchange x25519 server-signature ECDSA (secp384r1) server-digest SHA384)\n\t(No client certificate requested)\n\tby legolas.ozlabs.org (Postfix) with ESMTPS id 4fgqtQ4Njtz1xy3\n\tfor <incoming-buildroot@patchwork.ozlabs.org>;\n Thu, 26 Mar 2026 02:03:58 +1100 (AEDT)","from localhost (localhost [127.0.0.1])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id 3DAF882265;\n\tWed, 25 Mar 2026 15:03:57 +0000 (UTC)","from smtp1.osuosl.org ([127.0.0.1])\n by localhost (smtp1.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id eiZcR4hmdXB4; Wed, 25 Mar 2026 15:03:56 +0000 (UTC)","from lists1.osuosl.org (lists1.osuosl.org [140.211.166.142])\n\tby smtp1.osuosl.org (Postfix) with ESMTP id 7AC61811F3;\n\tWed, 25 Mar 2026 15:03:56 +0000 (UTC)","from smtp4.osuosl.org (smtp4.osuosl.org [IPv6:2605:bc80:3010::137])\n by lists1.osuosl.org (Postfix) with ESMTP id D1B571D3\n for <buildroot@buildroot.org>; Wed, 25 Mar 2026 15:03:54 +0000 (UTC)","from localhost (localhost [127.0.0.1])\n by smtp4.osuosl.org (Postfix) with ESMTP id B759140FE8\n for <buildroot@buildroot.org>; Wed, 25 Mar 2026 15:03:54 +0000 (UTC)","from smtp4.osuosl.org ([127.0.0.1])\n by localhost (smtp4.osuosl.org [127.0.0.1]) (amavis, port 10024) with ESMTP\n id SrptW6uAC8IJ for <buildroot@buildroot.org>;\n Wed, 25 Mar 2026 15:03:54 +0000 (UTC)","from gloria.sntech.de (gloria.sntech.de [185.11.138.130])\n by smtp4.osuosl.org (Postfix) with ESMTPS id 0D90F40D31\n for <buildroot@buildroot.org>; Wed, 25 Mar 2026 15:03:52 +0000 (UTC)"],"X-Virus-Scanned":["amavis at osuosl.org","amavis at osuosl.org"],"X-Comment":"SPF check N/A for local connections - client-ip=140.211.166.142;\n helo=lists1.osuosl.org; envelope-from=buildroot-bounces@buildroot.org;\n receiver=<UNKNOWN> ","DKIM-Filter":["OpenDKIM Filter v2.11.0 smtp1.osuosl.org 7AC61811F3","OpenDKIM Filter v2.11.0 smtp4.osuosl.org 0D90F40D31"],"DKIM-Signature":"v=1; a=rsa-sha256; c=relaxed/relaxed; d=buildroot.org;\n\ts=default; t=1774451036;\n\tbh=uNEB5t3NUWnrEEZUiNXpW+LHXtv5NnpjDYWHNgipK5I=;\n\th=To:Cc:Date:Subject:List-Id:List-Unsubscribe:List-Archive:\n\t List-Post:List-Help:List-Subscribe:From:Reply-To:From;\n\tb=bn0E39WkmBg4SUbZ2LNklMmbnN28qlPU9MZ2Qe3MJGujxHD4mvwpJ/TMEAjYslZmj\n\t enod94P9JCqJpogYa/JHeVfIv/a1RBqpcJYjt9BR1voGjnGSBWscz9saOUnWppQ0zW\n\t vpCJV7eTa5CghHpI0G7kJVtwOUQmoS5N/qSliy74CdwTCcvjE8VrC5tXdWz1aGq2i5\n\t 3I3v2Tem3YWjTfaa26XE9Dtz8i+2z6Hi9QP7WODbKlpO551F13OX1dzFfcsEtqGPwv\n\t XVXRc8Iy909AF6U1vXZ/UBGmc4bgCgM4ZuDwrILCkyfXE6P/tSoSypNETSeponr7I1\n\t 9pmho7TSOEJ7A==","Received-SPF":"Pass (mailfrom) identity=mailfrom; client-ip=185.11.138.130;\n helo=gloria.sntech.de; envelope-from=heiko@sntech.de; receiver=<UNKNOWN>","DMARC-Filter":"OpenDMARC Filter v1.4.2 smtp4.osuosl.org 0D90F40D31","To":"buildroot@buildroot.org","Cc":"Etienne Carriere <etienne.carriere@foss.st.com>,\n Quentin Schulz <quentin.schulz@cherry.de>, heiko@sntech.de,\n Heiko Stuebner <heiko.stuebner@cherry.de>","Date":"Wed, 25 Mar 2026 16:03:46 +0100","Message-ID":"<20260325150346.414826-1-heiko@sntech.de>","X-Mailer":"git-send-email 2.51.0","MIME-Version":"1.0","X-Mailman-Original-DKIM-Signature":"v=1; a=rsa-sha256; q=dns/txt;\n c=relaxed/relaxed; d=sntech.de;\n s=gloria202408; h=Content-Transfer-Encoding:MIME-Version:Message-ID:Date:\n Subject:Cc:To:From:Reply-To:Content-Type:In-Reply-To:References;\n bh=4CR5tkBv6CVUG6g4umwnCVifllmluXMmRwuT4soPECo=; b=LG2ubJErkaDdG9A7JN8QfWBZjs\n L7RpGcVTj/Z0MoEUYUmL7rcemcF0SQDZmLyB8SxBK6ZnGaNqNweYmrnxfHS7DA5OMbLAB+UcGeK+9\n FaWeZm7m7Mkm2aTLlonW+KYbxS5BrKnCidWOKqYKrJu/PpLe6OE75lvlcl4X4Fg1l/jTt64ccyUQQ\n r2EeldpUDBGE1n2Vav+XhQLtI670kuH89y5tbt4goEBKuRfPFHKFO2Jv0EonDSEX099rUaRAblQwR\n AkRGtP+aaFyJLcfiHv6AW79DKug16Bv5HlzlKNs7+AQw92tj9ipMO908z6t2FFlIg7BuDq1pJCoXr\n XCX4L2dQ==;","X-Mailman-Original-Authentication-Results":["smtp4.osuosl.org;\n dmarc=pass (p=quarantine dis=none)\n header.from=sntech.de","smtp4.osuosl.org;\n dkim=pass (2048-bit key,\n unprotected) header.d=sntech.de header.i=@sntech.de header.a=rsa-sha256\n header.s=gloria202408 header.b=LG2ubJEr"],"Subject":"[Buildroot] [PATCH] package/arm-trusted-firmware: add\n ARM_TRUSTED_FIRMWARE_CPE_ID_*","X-BeenThere":"buildroot@buildroot.org","X-Mailman-Version":"2.1.30","Precedence":"list","List-Id":"Discussion and development of buildroot <buildroot.buildroot.org>","List-Unsubscribe":"<https://lists.buildroot.org/mailman/options/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=unsubscribe>","List-Archive":"<http://lists.buildroot.org/pipermail/buildroot/>","List-Post":"<mailto:buildroot@buildroot.org>","List-Help":"<mailto:buildroot-request@buildroot.org?subject=help>","List-Subscribe":"<https://lists.buildroot.org/mailman/listinfo/buildroot>,\n <mailto:buildroot-request@buildroot.org?subject=subscribe>","From":"Heiko Stuebner via buildroot <buildroot@buildroot.org>","Reply-To":"Heiko Stuebner <heiko@sntech.de>","Content-Type":"text/plain; charset=\"us-ascii\"","Content-Transfer-Encoding":"7bit","Errors-To":"buildroot-bounces@buildroot.org","Sender":"\"buildroot\" <buildroot-bounces@buildroot.org>"},"content":"From: Heiko Stuebner <heiko.stuebner@cherry.de>\n\nTrusted-Firmware has been using a number of CPE identifiers in the past\nbut especially after v2.4, the correct identifier would be similar\nto cpe:2.3:o:arm:trusted_firmware-a:2.12:rc0:*:*:-:*:*:*\n\n  https://nvd.nist.gov/products/cpe/detail/65DEC230-1CD5-40DB-903A-22537D1E44FE\n\nAdd the relevant CPE fields to the trusted-firmware package.\n\nSigned-off-by: Heiko Stuebner <heiko.stuebner@cherry.de>\n---\n boot/arm-trusted-firmware/arm-trusted-firmware.mk | 3 +++\n 1 file changed, 3 insertions(+)","diff":"diff --git a/boot/arm-trusted-firmware/arm-trusted-firmware.mk b/boot/arm-trusted-firmware/arm-trusted-firmware.mk\nindex b81ce0d827..6de35dca7a 100644\n--- a/boot/arm-trusted-firmware/arm-trusted-firmware.mk\n+++ b/boot/arm-trusted-firmware/arm-trusted-firmware.mk\n@@ -5,6 +5,9 @@\n ################################################################################\n \n ARM_TRUSTED_FIRMWARE_VERSION = $(call qstrip,$(BR2_TARGET_ARM_TRUSTED_FIRMWARE_VERSION))\n+ARM_TRUSTED_FIRMWARE_CPE_ID_PREFIX = cpe:2.3:o\n+ARM_TRUSTED_FIRMWARE_CPE_ID_VENDOR = arm\n+ARM_TRUSTED_FIRMWARE_CPE_ID_PRODUCT = trusted_firmware-a\n \n ifeq ($(BR2_TARGET_ARM_TRUSTED_FIRMWARE_CUSTOM_TARBALL),y)\n # Handle custom ATF tarballs as specified by the configuration\n","prefixes":[]}