Skip to content

SLES oval DB is broken #384

Closed
future-architect/vuls
#1899
@wagde-orca

Description

@wagde-orca

What did you do? (required. The issue will be closed when not provided.)

I fetched latest oval of sles 15
used vuls to scan sles 15.3

What did you expect to happen?

I expected to see CVEs

What happened instead?

I got no CVEs. instead I saw this
[Apr 21 11:19:56] WARN [localhost] Unknown Oval format. Please register the issue as it needs to be investigated. https://github.com/vulsio/goval-dictionary/issues family: suse.linux.enterprise.server, defID: oval:org.opensuse.security:def:20214024

I have an old DB for SLES, so I compared the old DB tables and the new DB table and I think I see the problem
In the OLD DB, in the table of cves. we have "normal" CVE values in the cve_id column like CVE-2024-3864. but in the NEW fetched DB I see that we have entries like CVE-2024-3864 at SUSE and CVE-2024-3864 at NVD and I think this what causes vuls to fail...
I downloaded the sles 15 xml from //ftp.suse.com/pub/projects/security/oval/suse.linux.enterprise.server.15.xml.gz
and I see that the entry looks like

<title>CVE-2023-7216</title> SUSE Linux Enterprise Server 15 SP1-LTSS SUSE Linux Enterprise Server 15 SP2-LTSS SUSE Linux Enterprise Server 15 SP3-LTSS SUSE Linux Enterprise Server 15-LTSS SUSE Linux Enterprise Server for SAP Applications 15 SP1 SUSE Linux Enterprise Server for SAP Applications 15 SP2 SUSE Linux Enterprise Server for SAP Applications 15 SP3 A path traversal vulnerability was found in the CPIO utility. This issue could allow a remote unauthenticated attacker to trick a user into opening a specially crafted archive. During the extraction process, the archiver could follow symlinks outside of the intended directory, this allows writing files in arbitrary directories through symlinks. Important CVE-2023-7216 at SUSE CVE-2023-7216 at NVD SUSE bug 1219619 cpe:/o:suse:sles-ltss:15 cpe:/o:suse:sles-ltss:15:sp1 cpe:/o:suse:sles-ltss:15:sp2 cpe:/o:suse:sles-ltss:15:sp3 cpe:/o:suse:sles_sap:15:sp1 cpe:/o:suse:sles_sap:15:sp2 cpe:/o:suse:sles_sap:15:sp3 and in the goval suse fetcher code we have this code which I guess is not broken... for _, c := range d.Advisory.Cves { cves = append(cves, models.Cve{ CveID: c.CveID, Cvss3: c.Cvss3, Impact: c.Impact, Href: c.Href, }) }

to reporduce the DB problem just fetch the sles 15
./goval-dictionary fetch suse --suse-type suse-enterprise-server 15 --no-details and examine the DB
I do not have an old SLES oval xml file so I do not know what was the exact format

This is very serious problem because it means that scanning SLES is broken and does not return any CVEs... meaning lots of False Negatives :-(

Metadata

Metadata

Assignees

Labels

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions