oss-sec mailing list archives

Re: Thousands of vulnerabilities, almost no CVEs: OSS-Fuzz


From: Alexander Potapenko <glider () google com>
Date: Mon, 24 Jun 2019 18:27:30 +0200

On Mon, Jun 24, 2019 at 5:44 PM Bob Friesenhahn
<bfriesen () simple dallas tx us> wrote:

On Mon, 24 Jun 2019, Dmitry Vyukov wrote:

So what are community thoughts on automatic CVE assignment?
That would definitely get some attention to these bugs by vendors
(because that's open CVEs in their products then). And this should be
implementable because both OSS-Fuzz and syzbot are automated enough
already. However I afraid that these CVEs may be as automatically
sorted into a trashcan then :)

An excess of CVEs would cause CVEs to be not very meaningful any more.

Most oss-fuzz issue detections are not CVE worthy.  For example, a
one-byte read "heap overflow" is not likely to cause any actual harm
but oss-fuzz would classify it as "heap overflow".
There's enough information in the report though to assign the severity
score depending on the access size, its type (read or write) the call
stack etc.
OSS-Fuzz deliberately doesn't do that now, but such scoring can be
done to prune the list of potential CVE candidates.
Bob
--
Bob Friesenhahn
bfriesen () simple dallas tx us, http://www.simplesystems.org/users/bfriesen/
GraphicsMagick Maintainer,    http://www.GraphicsMagick.org/
Public Key,     http://www.simplesystems.org/users/bfriesen/public-key.txt



-- 
Alexander Potapenko
Software Engineer

Google Germany GmbH
Erika-Mann-Straße, 33
80636 München

Geschäftsführer: Paul Manicle, Halimah DeLaine Prado
Registergericht und -nummer: Hamburg, HRB 86891
Sitz der Gesellschaft: Hamburg


Current thread: