Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Collect SUSE #62

Closed
haikoschol opened this issue Sep 25, 2019 · 5 comments · Fixed by #194
Closed

Collect SUSE #62

haikoschol opened this issue Sep 25, 2019 · 5 comments · Fixed by #194
Labels
Data collection sys system or OS packages

Comments

@haikoschol
Copy link
Collaborator

https://www.suse.com/support/security/cvrf/

@pombredanne
Copy link
Member

pombredanne commented Sep 26, 2019

@sbs2001
Copy link
Collaborator

sbs2001 commented Feb 25, 2020

This is the total data which I am able to get

Note_Notes :::: Title:Vulnerability Description|Type:General|Ordinal:1|{http://www.w3.org/XML/1998/namespace}lang:en|Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.
ProductID :::: openSUSE Leap 42.3:ucode-intel-debuginfo-20170707-13.1
CVE_Vulnerability :::: CVE-2017-5715
Status_ProductStatuses :::: Type:Fixed
Threat_Threats :::: Type:Impact|Description:critical
BaseScore_ScoreSet :::: 4.7
Vector_ScoreSet :::: AV:L/AC:M/Au:N/C:C/I:N/A:N
Remediation_Remediations :::: Type:Vendor Fix|URL:http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00015.html
Description_Remediation :::: {http://www.w3.org/XML/1998/namespace}lang:en|Please Install the update.
URL_Reference :::: ['https://www.suse.com/security/cve/CVE-2017-5715.html', 'https://bugzilla.suse.com/1068032', 'https://bugzilla.suse.com/1074562', 'https://bugzilla.suse.com/1074578', 'https://bugzilla.suse.com/1074701', 'https://bugzilla.suse.com/1074919', 'https://bugzilla.suse.com/1075006', 'https://bugzilla.suse.com/1075007', 'https://bugzilla.suse.com/1075419']
Description_Reference :::: ['CVE-2017-5715', 'SUSE Bug 1068032', 'SUSE Bug 1074562', 'SUSE Bug 1074578', 'SUSE Bug 1074701', 'SUSE Bug 1074919', 'SUSE Bug 1075006', 'SUSE Bug 1075007', 'SUSE Bug 1075419']
FullProductName :::: ProductID:openSUSE Leap 42.3:ucode-intel-debuginfo-20170707-13.1|ucode-intel-debuginfo-20170707-13.1 as a component of openSUSE Leap 42.3
Relationship :::: ProductReference:ucode-intel-debuginfo-20170707-13.1|RelationType:Default Component Of|RelatesToProductReference:openSUSE Leap 42.3

Which is further filtered to get
{'title': 'Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.', 'platform': 'openSUSE Leap 42.3', 'cve_id': 'CVE-2017-5715', 'package': 'ucode-intel-debuginfo-20170707-13.1'}
Let me know if we can add more data to the above dict from the total data

@haikoschol
Copy link
Collaborator Author

@sbs2001 thanks! Adding the URLs in URL_Reference as VulnerabilityReference would be nice.

@sbs2001
Copy link
Collaborator

sbs2001 commented May 13, 2020

Just discovered http://ftp.suse.com/pub/projects/security/ , specifically http://ftp.suse.com/pub/projects/security/yaml/ is useful, we could populate our db with resolved packages(these yamls basically contains list of backports with fix to vulnerabilities). http://ftp.suse.com/pub/projects/security/oval/ is of limited value as I am not sure what difference will it make compared to using CVRF.

http://ftp.suse.com/pub/projects/security/yaml/suse-cvss-scores.yaml is also interesting considering we might want to collect severity indicators of a particular vulnerability from different sources.

Also @haikoschol SUSE folks provide Etags :) in their response headers.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment