Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

api/v1/cves/CVE-2017-5715 missing erratum 32025 / RHSA-2018:0032 and others #746

Open
jsvob opened this issue Aug 5, 2020 · 0 comments
Open

Comments

@jsvob
Copy link
Member

jsvob commented Aug 5, 2020

https://webapp-vmaas-stable.1b13.insights.openshiftapps.com/api/v1/cves/CVE-2017-5715 is missing these libvirt versions:

  • libvirt-0.9.4-23.el6_2.11
  • libvirt-0.10.2-18.el6_4.16
  • libvirt-0.10.2-29.el6_5.15
  • libvirt-0.10.2-46.el6_6.7
  • libvirt-0.10.2-54.el6_7.7
  • libvirt-0.10.2-62.el6_9.1
  • libvirt-1.2.17-13.el7_2.7
  • libvirt-2.0.0-10.el7_3.10
  • libvirt-2.0.0-10.el7_3.11
  • libvirt-3.2.0-14.el7_4.7
  • libvirt-3.2.0-14.el7_4.9

For example, libvirt-1.2.17-13.el7_2.7 was released in erratum 32025 / RHSA-2018:0032:

This is what I get:

$ curl -X GET "https://webapp-vmaas-stable.1b13.insights.openshiftapps.com/api/v1/cves/CVE-2017-5715" -H "accept: application/json" | python -mjson.tool 
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100  3449  100  3449    0     0   7010      0 --:--:-- --:--:-- --:--:--  7010
{
    "cve_list": {
        "CVE-2017-5715": {
            "redhat_url": "https://access.redhat.com/security/cve/cve-2017-5715",
            "secondary_url": "https://googleprojectzero.blogspot.com/2018/01/reading-privileged-memory-with-side.html\nhttps://spectreattack.com/\nhttps://meltdownattack.com",
            "synopsis": "CVE-2017-5715",
            "impact": "Important",
            "public_date": "2018-01-03T22:00:00+00:00",
            "modified_date": "2020-08-05T09:13:21+00:00",
            "cwe_list": [
                "CWE-226",
                "CWE-200",
                "CWE-385"
            ],
            "cvss3_score": "5.600",
            "cvss3_metrics": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "cvss2_score": "",
            "cvss2_metrics": "",
            "description": "An industry-wide issue was found in the way many modern microprocessor designs have implemented speculative execution of instructions (a commonly used performance optimization). There are three primary variants of the issue which differ in the way the speculative execution can be exploited. Variant CVE-2017-5715 triggers the speculative execution by utilizing branch target injection. It relies on the presence of a precisely-defined instruction sequence in the privileged code as well as the fact that memory accesses may cause allocation into the microprocessor's data cache even for speculatively executed instructions that never actually commit (retire). As a result, an unprivileged attacker could use this flaw to cross the syscall and guest/host boundaries and read privileged memory by conducting targeted cache side-channel attacks.",
            "package_list": [
                "dracut-debuginfo-033-502.el7_4.1.ppc64le",
                "dracut-debuginfo-033-502.el7_4.1.ppc64",
                "dracut-caps-033-502.el7_4.1.ppc64",
                "dracut-tools-033-502.el7_4.1.ppc64",
                "dracut-debuginfo-033-502.el7_4.1.x86_64",
                "dracut-caps-033-502.el7_4.1.x86_64",
                "dracut-tools-033-502.el7_4.1.x86_64",
                "dracut-config-rescue-033-502.el7_4.1.x86_64",
                "dracut-fips-033-502.el7_4.1.x86_64",
                "dracut-fips-aesni-033-502.el7_4.1.x86_64",
                "dracut-config-generic-033-502.el7_4.1.x86_64",
                "dracut-033-502.el7_4.1.x86_64",
                "dracut-network-033-502.el7_4.1.x86_64",
                "dracut-caps-033-502.el7_4.1.ppc64le",
                "dracut-tools-033-502.el7_4.1.ppc64le",
                "dracut-debuginfo-033-502.el7_4.1.aarch64",
                "dracut-debuginfo-033-502.el7_4.1.s390x",
                "dracut-tools-033-502.el7_4.1.s390x",
                "dracut-caps-033-502.el7_4.1.s390x",
                "dracut-fips-033-502.el7_4.1.ppc64",
                "dracut-033-502.el7_4.1.ppc64",
                "dracut-network-033-502.el7_4.1.ppc64",
                "dracut-config-generic-033-502.el7_4.1.ppc64",
                "dracut-config-rescue-033-502.el7_4.1.ppc64",
                "dracut-fips-aesni-033-502.el7_4.1.ppc64",
                "dracut-033-502.el7_4.1.ppc64le",
                "dracut-config-rescue-033-502.el7_4.1.ppc64le",
                "dracut-fips-033-502.el7_4.1.ppc64le",
                "dracut-fips-aesni-033-502.el7_4.1.ppc64le",
                "dracut-config-generic-033-502.el7_4.1.ppc64le",
                "dracut-network-033-502.el7_4.1.ppc64le",
                "dracut-tools-033-502.el7_4.1.aarch64",
                "dracut-caps-033-502.el7_4.1.aarch64",
                "dracut-config-rescue-033-502.el7_4.1.aarch64",
                "dracut-033-502.el7_4.1.aarch64",
                "dracut-config-generic-033-502.el7_4.1.aarch64",
                "dracut-fips-aesni-033-502.el7_4.1.aarch64",
                "dracut-fips-033-502.el7_4.1.aarch64",
                "dracut-network-033-502.el7_4.1.aarch64",
                "dracut-033-502.el7_4.1.s390x",
                "dracut-fips-aesni-033-502.el7_4.1.s390x",
                "dracut-fips-033-502.el7_4.1.s390x",
                "dracut-config-generic-033-502.el7_4.1.s390x",
                "dracut-network-033-502.el7_4.1.s390x",
                "dracut-config-rescue-033-502.el7_4.1.s390x"
            ],
            "source_package_list": [
                "dracut-033-502.el7_4.1.src"
            ],
            "errata_list": [
                "RHBA-2018:0042"
            ]
        }
    },
    "page": 1,
    "page_size": 1,
    "pages": 1
}

It does link to https://access.redhat.com/security/cve/cve-2017-5715 where libvirt is mentioned (in fact, I see many other packages that are missing in the endpoint), and the only thing that has the "Errata" and "Release Date" columns filled out is just the dracut that is present in the endpoint's output. It seems to me that this bug is not caused by VMaaS itself, but by something else somewhere else. However, I'm using the endpoint and it does report inaccurate information, so reporting here (IDK the intricacies behind the curtains). If there's another place I can contact in order to help to resolve this, I'd be happy help.

Thanks!

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

1 participant