diff mbox series

[1/1] package/libnids: NVD database has been updated

Message ID 20200721180555.31453-1-guillaume.bressaix@gmail.com
State Rejected
Headers show
Series [1/1] package/libnids: NVD database has been updated | expand

Commit Message

Guillaume Bres July 21, 2020, 6:05 p.m. UTC
From: "Guillaume W. Bres" <guillaume.bressaix@gmail.com>

Thanks to Matthew W. & Thomas, the NVD database has been updated
and CVE-2010-0751 is now declared fixed, see
https://security-tracker.debian.org/tracker/CVE-2010-0751

Signed-off-by: Guillaume W. Bres <guillaume.bressaix@gmail.com>
---
 package/libnids/libnids.mk | 4 ----
 1 file changed, 4 deletions(-)

Comments

Thomas Petazzoni July 21, 2020, 6:43 p.m. UTC | #1
On Tue, 21 Jul 2020 20:05:55 +0200
guillaume.bressaix@gmail.com wrote:

> From: "Guillaume W. Bres" <guillaume.bressaix@gmail.com>
> 
> Thanks to Matthew W. & Thomas, the NVD database has been updated
> and CVE-2010-0751 is now declared fixed, see
> https://security-tracker.debian.org/tracker/CVE-2010-0751
> 
> Signed-off-by: Guillaume W. Bres <guillaume.bressaix@gmail.com>

Are you sure it has already been fixed ?

https://nvd.nist.gov/vuln/detail/CVE-2010-0751 still marks 1.24 as
affected as far as I can see.

Thomas
Matthew Weber July 21, 2020, 8:08 p.m. UTC | #2
Ugh, looks like they only updated the description and didn't adjust the
rest of the version references

https://nvd.nist.gov/vuln/detail/CVE-2010-0751#match-5471142

On Tue, Jul 21, 2020 at 1:46 PM Thomas Petazzoni <
thomas.petazzoni@bootlin.com> wrote:

> On Tue, 21 Jul 2020 20:05:55 +0200
> guillaume.bressaix@gmail.com wrote:
>
> > From: "Guillaume W. Bres" <guillaume.bressaix@gmail.com>
> >
> > Thanks to Matthew W. & Thomas, the NVD database has been updated
> > and CVE-2010-0751 is now declared fixed, see
> > https://security-tracker.debian.org/tracker/CVE-2010-0751
> >
> > Signed-off-by: Guillaume W. Bres <guillaume.bressaix@gmail.com>
>
> Are you sure it has already been fixed ?
>
> https://nvd.nist.gov/vuln/detail/CVE-2010-0751 still marks 1.24 as
> affected as far as I can see.
>
> Thomas
> --
> Thomas Petazzoni, CTO, Bootlin
> Embedded Linux and Kernel engineering
> https://bootlin.com
> _______________________________________________
> buildroot mailing list
> buildroot@busybox.net
> http://lists.busybox.net/mailman/listinfo/buildroot
>
Guillaume Bres July 22, 2020, 7:32 a.m. UTC | #3
>
> Ugh, looks like they only updated the description and didn't adjust the
> rest of the version references


yes that's what happened 😂 we may need to wait a little longer

Guillaume W. Bres
Software engineer
<guillaume.bressaix@gmail.com>


Le mar. 21 juil. 2020 à 22:09, Matthew Weber <matthew.weber@collins.com> a
écrit :

> Ugh, looks like they only updated the description and didn't adjust the
> rest of the version references
>
> https://nvd.nist.gov/vuln/detail/CVE-2010-0751#match-5471142
>
> On Tue, Jul 21, 2020 at 1:46 PM Thomas Petazzoni <
> thomas.petazzoni@bootlin.com> wrote:
>
>> On Tue, 21 Jul 2020 20:05:55 +0200
>> guillaume.bressaix@gmail.com wrote:
>>
>> > From: "Guillaume W. Bres" <guillaume.bressaix@gmail.com>
>> >
>> > Thanks to Matthew W. & Thomas, the NVD database has been updated
>> > and CVE-2010-0751 is now declared fixed, see
>> > https://security-tracker.debian.org/tracker/CVE-2010-0751
>> >
>> > Signed-off-by: Guillaume W. Bres <guillaume.bressaix@gmail.com>
>>
>> Are you sure it has already been fixed ?
>>
>> https://nvd.nist.gov/vuln/detail/CVE-2010-0751 still marks 1.24 as
>> affected as far as I can see.
>>
>> Thomas
>> --
>> Thomas Petazzoni, CTO, Bootlin
>> Embedded Linux and Kernel engineering
>> https://bootlin.com
>> _______________________________________________
>> buildroot mailing list
>> buildroot@busybox.net
>> http://lists.busybox.net/mailman/listinfo/buildroot
>>
>
Matthew Weber July 30, 2020, 6:01 p.m. UTC | #4
Guillaume, I've submitted another request with more detail and hopefully
they'll update all the references to the version

On Wed, Jul 22, 2020 at 2:34 AM Guillaume Bres <guillaume.bressaix@gmail.com>
wrote:

> Ugh, looks like they only updated the description and didn't adjust the
>> rest of the version references
>
>
> yes that's what happened 😂 we may need to wait a little longer
>
> Guillaume W. Bres
> Software engineer
> <guillaume.bressaix@gmail.com>
>
>
> Le mar. 21 juil. 2020 à 22:09, Matthew Weber <matthew.weber@collins.com>
> a écrit :
>
>> Ugh, looks like they only updated the description and didn't adjust the
>> rest of the version references
>>
>> https://nvd.nist.gov/vuln/detail/CVE-2010-0751#match-5471142
>>
>> On Tue, Jul 21, 2020 at 1:46 PM Thomas Petazzoni <
>> thomas.petazzoni@bootlin.com> wrote:
>>
>>> On Tue, 21 Jul 2020 20:05:55 +0200
>>> guillaume.bressaix@gmail.com wrote:
>>>
>>> > From: "Guillaume W. Bres" <guillaume.bressaix@gmail.com>
>>> >
>>> > Thanks to Matthew W. & Thomas, the NVD database has been updated
>>> > and CVE-2010-0751 is now declared fixed, see
>>> > https://security-tracker.debian.org/tracker/CVE-2010-0751
>>> >
>>> > Signed-off-by: Guillaume W. Bres <guillaume.bressaix@gmail.com>
>>>
>>> Are you sure it has already been fixed ?
>>>
>>> https://nvd.nist.gov/vuln/detail/CVE-2010-0751 still marks 1.24 as
>>> affected as far as I can see.
>>>
>>> Thomas
>>> --
>>> Thomas Petazzoni, CTO, Bootlin
>>> Embedded Linux and Kernel engineering
>>> https://bootlin.com
>>> _______________________________________________
>>> buildroot mailing list
>>> buildroot@busybox.net
>>> http://lists.busybox.net/mailman/listinfo/buildroot
>>>
>> _______________________________________________
> buildroot mailing list
> buildroot@busybox.net
> http://lists.busybox.net/mailman/listinfo/buildroot
>
Matthew Weber Aug. 5, 2020, 4:18 p.m. UTC | #5
It has been fixed but I had to update the wiki notes because there are two
steps.  The first is a CVE description update by the Mitre/CVE team and the
second is a CPE assignment update by the dictionary team.  I checked the
NVD link that Thomas provided and it looks correct to me.

On Thu, Jul 30, 2020 at 1:01 PM Matthew Weber <matthew.weber@collins.com>
wrote:

> Guillaume, I've submitted another request with more detail and hopefully
> they'll update all the references to the version
>
> On Wed, Jul 22, 2020 at 2:34 AM Guillaume Bres <
> guillaume.bressaix@gmail.com> wrote:
>
>> Ugh, looks like they only updated the description and didn't adjust the
>>> rest of the version references
>>
>>
>> yes that's what happened 😂 we may need to wait a little longer
>>
>> Guillaume W. Bres
>> Software engineer
>> <guillaume.bressaix@gmail.com>
>>
>>
>> Le mar. 21 juil. 2020 à 22:09, Matthew Weber <matthew.weber@collins.com>
>> a écrit :
>>
>>> Ugh, looks like they only updated the description and didn't adjust the
>>> rest of the version references
>>>
>>> https://nvd.nist.gov/vuln/detail/CVE-2010-0751#match-5471142
>>>
>>> On Tue, Jul 21, 2020 at 1:46 PM Thomas Petazzoni <
>>> thomas.petazzoni@bootlin.com> wrote:
>>>
>>>> On Tue, 21 Jul 2020 20:05:55 +0200
>>>> guillaume.bressaix@gmail.com wrote:
>>>>
>>>> > From: "Guillaume W. Bres" <guillaume.bressaix@gmail.com>
>>>> >
>>>> > Thanks to Matthew W. & Thomas, the NVD database has been updated
>>>> > and CVE-2010-0751 is now declared fixed, see
>>>> > https://security-tracker.debian.org/tracker/CVE-2010-0751
>>>> >
>>>> > Signed-off-by: Guillaume W. Bres <guillaume.bressaix@gmail.com>
>>>>
>>>> Are you sure it has already been fixed ?
>>>>
>>>> https://nvd.nist.gov/vuln/detail/CVE-2010-0751 still marks 1.24 as
>>>> affected as far as I can see.
>>>>
>>>> Thomas
>>>> --
>>>> Thomas Petazzoni, CTO, Bootlin
>>>> Embedded Linux and Kernel engineering
>>>> https://bootlin.com
>>>> _______________________________________________
>>>> buildroot mailing list
>>>> buildroot@busybox.net
>>>> http://lists.busybox.net/mailman/listinfo/buildroot
>>>>
>>> _______________________________________________
>> buildroot mailing list
>> buildroot@busybox.net
>> http://lists.busybox.net/mailman/listinfo/buildroot
>>
>
Thomas Petazzoni Aug. 5, 2020, 7:48 p.m. UTC | #6
Hello,

On Wed, 5 Aug 2020 11:18:24 -0500
Matthew Weber <matthew.weber@collins.com> wrote:

> It has been fixed but I had to update the wiki notes because there are two
> steps.  The first is a CVE description update by the Mitre/CVE team and the
> second is a CPE assignment update by the dictionary team.  I checked the
> NVD link that Thomas provided and it looks correct to me.

Thanks for following up on this. However, what the Wiki page says is
not very clear to me as it doesn't really seem to match what you're
saying here with the two steps process that is needed.

Thomas
Matthew Weber Aug. 5, 2020, 9:43 p.m. UTC | #7
Thomas,


On Wed, Aug 5, 2020 at 2:51 PM Thomas Petazzoni
<thomas.petazzoni@bootlin.com> wrote:
>
> Hello,
>
> On Wed, 5 Aug 2020 11:18:24 -0500
> Matthew Weber <matthew.weber@collins.com> wrote:
>
> > It has been fixed but I had to update the wiki notes because there are two
> > steps.  The first is a CVE description update by the Mitre/CVE team and the
> > second is a CPE assignment update by the dictionary team.  I checked the
> > NVD link that Thomas provided and it looks correct to me.
>
> Thanks for following up on this. However, what the Wiki page says is
> not very clear to me as it doesn't really seem to match what you're
> saying here with the two steps process that is needed.
>

Hopefully this is a little better
https://elinux.org/Buildroot:Security_Vulnerability_Management#Managing_CPE_entries
diff mbox series

Patch

diff --git a/package/libnids/libnids.mk b/package/libnids/libnids.mk
index fb3df318b4..4a67215242 100644
--- a/package/libnids/libnids.mk
+++ b/package/libnids/libnids.mk
@@ -12,10 +12,6 @@  LIBNIDS_INSTALL_STAGING = YES
 LIBNIDS_DEPENDENCIES = host-pkgconf libpcap
 LIBNIDS_AUTORECONF = YES
 
-# CVE-2010-0751 was fixed in libnids v1.24 but the NVD database is not
-# aware of the fix, ignore it until this is updated
-LIBNIDS_IGNORE_CVES += CVE-2010-0751
-
 # disable libnet if not available
 # Tests in configure.in expect --with-libnet=$build_dir
 # not an installation patch like in our context.