-
Notifications
You must be signed in to change notification settings - Fork 78
Is there a way to improve the CVE reporting for kernel packages? #30
Comments
yeah I was just looking at the same thing myself, along with the embargoed 2016 CVE So this example annoys me quite explicitly: <entry id="CVE-2015-8543">
<vuln:vulnerable-configuration id="http://nvd.nist.gov/">
<cpe-lang:logical-test operator="OR" negate="false">
<cpe-lang:fact-ref name="cpe:/o:linux:linux_kernel:4.3.2"/>
</cpe-lang:logical-test>
</vuln:vulnerable-configuration>
<vuln:vulnerable-software-list>
<vuln:product>cpe:/o:linux:linux_kernel:4.3.2</vuln:product>
</vuln:vulnerable-software-list> Quite clearly we can see this is inaccurate. But according to the NVD, the only affected version is 4.3.2.. |
Another example here: CVE-2015-7550 Still technically embargoed: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-7550 |
What we need is more data sources :) |
I was actually talking about very simple cases, not even these special ones. Currently I don't see a way to make cve-check-tool report me any CVEs on kernel. What package name should I use? |
Are you not using the mapping feature? https://git.solus-project.com/common/tree/mapping#n3 linux_kernel = kernel Thus cve-check-tool evaluates the kernel package against linux_kernel vulnerabilities. Let's see how that goes for you - and if we can expand that! |
Hm.. I haven't used it indeed. Maybe you should adverstize it with the cve-check-tool for all other users also :) I will try on Monday and see how it goes. |
Yeah we could do with an Integration wiki page |
Still not sure what I am doing wrongly: I now supply as input "linux_kernel", but get this kind of output: linux_kernel,4.1.15,,,0 |
@ikeydoherty, could you please suggest what I am doing wrongly? |
Please drop me a mail with your test data, expectations, etc, so I can validate them personally and commit any relevant fixes |
OK so here's what I'm now getting in git for version 4.3.2:
tst_file
mapping
|
For
For
|
So, did you find the issue? Can I try with latest cve-check-tool release or where did you merge the commit fixes? |
Note that many kernel CVE's are affecting multiple kernel versions which can be seen from CPE statements like |
We all know how important are kernel CVEs and how many of them usually produced every year.
This was post showing just 2015 kernel CVEs: http://www.openwall.com/lists/kernel-hardening/2016/01/19/1
However, currently cve-check-tool isn't doing very well on kernel CVEs particularly since many are just reported as "Linux kernel" and without package name.
Can we somehow improve the situation? Linux kernel is a special case, so maybe having a way to specify common linux kernel package names via some input to cve-check-tool and then instruct the tool to search CVEs with some keywords "linux kernel" and package specified version?
The text was updated successfully, but these errors were encountered: