External check

2018-06-07 Thread Security Tracker
CVE-2016-10537: TODO: check
CVE-2016-10541: TODO: check
CVE-2016-10621: TODO: check
CVE-2016-10624: TODO: check
CVE-2016-10656: TODO: check
CVE-2017-16005: TODO: check
CVE-2017-16021: TODO: check
CVE-2017-16023: TODO: check
CVE-2017-16026: TODO: check
CVE-2017-16030: TODO: check
CVE-2017-16113: TODO: check
CVE-2017-16114: TODO: check
CVE-2017-16116: TODO: check
CVE-2017-16118: TODO: check
CVE-2017-16119: TODO: check
CVE-2017-16129: TODO: check
CVE-2017-16136: TODO: check
CVE-2017-16137: TODO: check
CVE-2017-16138: TODO: check
CVE-2018-1000193: TODO: check
CVE-2018-1000194: TODO: check
CVE-2018-1000195: TODO: check
CVE-2018-1070: RESERVED
CVE-2018-11813: TODO: check
CVE-2018-3717: TODO: check
CVE-2018-3736: TODO: check
CVE-2018-3737: TODO: check
CVE-2018-4945: RESERVED
CVE-2018-5000: RESERVED
CVE-2018-5001: RESERVED
CVE-2018-5002: RESERVED
--
The output might be a bit terse, but the above ids are known elsewhere,
check the references in the tracker. The second part indicates the status
of that id in the tracker at the moment the script was run.



Re: Dealing with renamed source packages during CVE triaging

2018-06-07 Thread Holger Levsen
On Thu, Jun 07, 2018 at 06:07:24PM -0400, Antoine Beaupré wrote:
> Sorry for resurrecting this old thread…

No!

I very much appreciate it when people keep issues in the back of their minds
and keep thinking about them and keep reminding us "others" until they are
solved properly!

Thank you.

:)


-- 
cheers,
Holger (and SCNR too)


signature.asc
Description: PGP signature


Re: Dealing with renamed source packages during CVE triaging

2018-06-07 Thread Antoine Beaupré
Sorry for resurrecting this old thread, but I've been looking at how to
deal with renamed packages in CVE triaging again. When we last talked
about this, we observed how we were sometimes missing packages during
triage, e.g. `tiff3` that was present in wheezy. That's not an issue
anymore since wheezy is gone, but the problem occurs more broadly in
other packages.

In fact, it seems to me this is similar to the broader of embedded code
copies. We could generalize renamed packages to the embedded code copies
problem. We have a database of those in data/embedded-code-copies
already, although I'm not sure how up to date that file actually is, nor
how it is currently used in the workflow.

It seems to me any database of renames we could be would clearly overlap
with the embedded-code-copies file, so I figured I would write a
(Python, we already have Perl and bash ones...) to start with. I have
tried to upload this in a fork on salsa but gave up as push (of a single
commit!) was stuck "resolving deltas"... Anyways, here's the snippet:

https://salsa.debian.org/anarcat/security-tracker/snippets/70

The next step is to figure out how to actually modify the data/CVE/list
file to introduce the changes. Considering the large number of packages
in the embedded-code-copies file, I am not sure we want to retroactively
change all previous entries. jmm suggested we run a cronjob that would
keep track of where it is in history which would resolve this nicely.

One question that remains is what, exactly, to add in the CVE
metadata. One problem we faced last we looked at this is that we needed
to add an entry like:

   SOURCEPACKAGE 

... which would (e.g.) get triaged to:

   SOURCEPACKAGE 
   [wheezy] SOURCEPACKAGE  (or whatever)

... later on. This requires inside knowledge of the suites and their
packages, something I find surprisingly hard to do in the security
tracker.

With embedded-code-copies, we will have to add something for all the
other source packages, e.g.:

   OTHERSOURCE 

Right now, it seems that all scripts that hammer at those files do so
with their own ad-hoc parsing code. Is that the recommended way of
chopping those files up? Or is there a better parsing library out there?

Thanks for any advice,

A.