-
Notifications
You must be signed in to change notification settings - Fork 89
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Update aliases & related definitions #193
Conversation
Signed-off-by: Michael Kedar <michaelkedar@google.com>
Thanks, this looks good. I'll just add @chrisbloom7 for a review of the wording here. The context to this is we've noticed certain sources (mainly Linux distros) use aliases to link to together different vulnerabilities in a single advisory. This complicates things when it comes to VEX/ignore files if we want to consider aliased vulnerabilities to be the same. |
I still find it confusing that Debian advisories removed CVE references from
even though to my understanding that's precisely what the Debian advisories tell you; a list of all CVEs affecting specific package(s) and when they were resolved. |
Thanks for the feedback. The intention of
May we understand your programmatic use case for Debian a bit more, and why this might be problematic for you? |
The VEX example makes sense, I can see the reasoning behind it and it seems correct. However, while I don't really have too much of an issue, it could be worked around for DSA and the like, the wording makes it seem like you can't really depend on For DSA then all vulnerabilities in the
and even
would perhaps imply this not always to be the case? E.g. I hope that makes sense, I may completely be missing something though. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Documentation changes look great, thanks for taking the time to clarify it @michaelkedar. Approving without weighing in on the Debian discussion to unblock shipping if you all decide it's good to go.
It sounds like you're looking for a way to definitively know which CVEs are addressed by e.g. a DSA? Can you speak a bit more about the end use case if so, from the perspective of vulnerability scanners / consumers of Debian? I'll merge this PR as is, but if there are remaining gaps I think that would be better suited for another new field instead. |
It does make sense, and that was my initial assumption. But since CVEs were moved from aliases to related, there is no other way for an automated system to map DSAs to CVEs. It seems a bit strange to me that there is an advisory which tells you a package is vulnerable, and even enumerates vulnerable versions, but doesn't expose the CVE(s) which are part of it. E.g. We can say |
Clarify the intended use cases for the
aliases
andrelated
field to align with our intended use cases.