Skip to content
This repository has been archived by the owner on Jan 6, 2023. It is now read-only.

Is there a way to improve the CVE reporting for kernel packages? #30

Open
ereshetova opened this issue Jan 19, 2016 · 14 comments
Open

Is there a way to improve the CVE reporting for kernel packages? #30

ereshetova opened this issue Jan 19, 2016 · 14 comments

Comments

@ereshetova
Copy link

We all know how important are kernel CVEs and how many of them usually produced every year.
This was post showing just 2015 kernel CVEs: http://www.openwall.com/lists/kernel-hardening/2016/01/19/1

However, currently cve-check-tool isn't doing very well on kernel CVEs particularly since many are just reported as "Linux kernel" and without package name.

Can we somehow improve the situation? Linux kernel is a special case, so maybe having a way to specify common linux kernel package names via some input to cve-check-tool and then instruct the tool to search CVEs with some keywords "linux kernel" and package specified version?

@ikeydoherty
Copy link
Contributor

yeah I was just looking at the same thing myself, along with the embargoed 2016 CVE

So this example annoys me quite explicitly:

  <entry id="CVE-2015-8543">
    <vuln:vulnerable-configuration id="http://nvd.nist.gov/">
      <cpe-lang:logical-test operator="OR" negate="false">
        <cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:4.3.2"/>
      </cpe-lang:logical-test>
    </vuln:vulnerable-configuration>
    <vuln:vulnerable-software-list>
      <vuln:product>cpe:/o:linux:linux_kernel:4.3.2</vuln:product>
    </vuln:vulnerable-software-list>

Quite clearly we can see this is inaccurate. But according to the NVD, the only affected version is 4.3.2..

@ikeydoherty
Copy link
Contributor

Another example here: CVE-2015-7550

Still technically embargoed: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550

@ikeydoherty
Copy link
Contributor

What we need is more data sources :)

@ereshetova
Copy link
Author

I was actually talking about very simple cases, not even these special ones. Currently I don't see a way to make cve-check-tool report me any CVEs on kernel. What package name should I use?

@ikeydoherty
Copy link
Contributor

Are you not using the mapping feature?

https://git.solus-project.com/common/tree/mapping#n3

linux_kernel = kernel

Thus cve-check-tool evaluates the kernel package against linux_kernel vulnerabilities. Let's see how that goes for you - and if we can expand that!

@ereshetova
Copy link
Author

Hm.. I haven't used it indeed. Maybe you should adverstize it with the cve-check-tool for all other users also :) I will try on Monday and see how it goes.

@ikeydoherty
Copy link
Contributor

Yeah we could do with an Integration wiki page

@ereshetova
Copy link
Author

Still not sure what I am doing wrongly: I now supply as input "linux_kernel", but get this kind of output:

linux_kernel,4.1.15,,,0

@ereshetova
Copy link
Author

@ikeydoherty, could you please suggest what I am doing wrongly?

@ikeydoherty
Copy link
Contributor

Please drop me a mail with your test data, expectations, etc, so I can validate them personally and commit any relevant fixes

@ikeydoherty
Copy link
Contributor

OK so here's what I'm now getting in git for version 4.3.2:

 ikey@solus-bdw  ~/Projects/cve-check-tool   master  cve-check-tool -u -c -a -t faux tst_file -M mapping
linux_kernel,4.3.2,CVE-2013-7446 CVE-2015-7884 CVE-2015-7885 CVE-2015-7990 CVE-2015-8374 CVE-2015-8543 CVE-2015-8569 CVE-2015-8660,,0
linux,4.3.2,CVE-2013-7446 CVE-2015-7884 CVE-2015-7885 CVE-2015-7990 CVE-2015-8374 CVE-2015-8543 CVE-2015-8569 CVE-2015-8660,,0

tst_file

linux,4.3.2,,
linux_kernel,4.3.2,,

mapping

[Mapping]
linux_kernel = linux

@ikeydoherty
Copy link
Contributor

For 4.1.5:

linux_kernel,4.1.5,CVE-2013-7445 CVE-2015-3290 CVE-2015-3291 CVE-2015-5157 CVE-2015-5697,,0
linux,4.1.5,CVE-2013-7445 CVE-2015-3290 CVE-2015-3291 CVE-2015-5157 CVE-2015-5697,,0

For 4.1.15:

linux_kernel,4.1.15,,,0
linux,4.1.15,,,0

@ereshetova
Copy link
Author

So, did you find the issue? Can I try with latest cve-check-tool release or where did you merge the commit fixes?

@mcfrisk
Copy link

mcfrisk commented Jul 19, 2017

Note that many kernel CVE's are affecting multiple kernel versions which can be seen from CPE statements like cpe:2.3:o:linux:linux_kernel:4.11.5:*:*:*:*:*:*:* and previous versions, but NVD XML 2.0 data does not include this information. NVD XML 1.2.1 does have the 'and previous' flag which can be used to do version comparisons and then decide if the current kernel version is affected by it (according to CVE data only). I've requested for this support in: #64

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants