You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository has been archived by the owner on Jan 6, 2023. It is now read-only.
cve-check-tool as integrated into yocto cve-check feature fails to detect CVE's which match to certain SW version and previous versions. For example the systemd "0day" bug CVE says:
Unfortunately, the NVD 2.0 XML schema feed from NIST does not support the "and previous versions" annotation and thus lists only systemd 233 as vulnerable:
I would like to see this as well, so I’ve been poking around a bit. The version relation is also in the new JSON 1.0 feeds. But more importantly, NIST plans for the XML feeds to go away around April 2019.
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Hi,
cve-check-tool as integrated into yocto cve-check feature fails to detect CVE's which match to certain SW version and previous versions. For example the systemd "0day" bug CVE says:
https://nvd.nist.gov/vuln/detail/CVE-2017-1000082
The version 233 is marked as vulnerable but also all older versions (Debian security tracker states that 229 version introduced the feature, https://security-tracker.debian.org/tracker/CVE-2017-1000082 ).
Unfortunately, the NVD 2.0 XML schema feed from NIST does not support the "and previous versions" annotation and thus lists only systemd 233 as vulnerable:
Thus a scan for systemd version 232 will not show that it is vulnerable to CVE-2017-1000082:
Only version 233 will show the issue and others as a vulnerability:
This seems to be a common limitation in NVD 2.0 data, BUT the information is still in 1.2.1 XML data format of https://nvd.nist.gov/vuln/data-feeds#CVE_FEED
https://nvd.nist.gov/download/nvdcve-2017.xml.gz
Note the prev parameter in vers of product systemd. Of course comparing two version numbers need to be supported some how, but for that there are quite standard solutions like https://stackoverflow.com/questions/4957514/how-to-compare-debian-package-versions .
So, it would be nice that cve-check-tool would:
This systemd use case is a simple test for that and cve-check-tool should detect that systemd 232 is vulnerable to CVE-2017-1000082.
The text was updated successfully, but these errors were encountered: