Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Dealing with junk CVEs #1281

Closed
pombredanne opened this issue Aug 28, 2023 · 11 comments · Fixed by #1232
Closed

Dealing with junk CVEs #1281

pombredanne opened this issue Aug 28, 2023 · 11 comments · Fixed by #1232
Assignees

Comments

@pombredanne
Copy link
Member

See https://daniel.haxx.se/blog/2023/08/26/cve-2020-19909-is-everything-that-is-wrong-with-cves/
We need to find a way to ensure we can filter and tag junk CVEs like this quickly, especially on popular packages like cURL where the junk will be a cause of major churn.

@pombredanne
Copy link
Member Author

We need to design a status with multiple values such as rejected or disputed or else.

@armijnhemel
Copy link
Contributor

@armijnhemel
Copy link
Contributor

https://lwn.net/Articles/944209/ <-- currently subscribers only, but will be public in a few weeks. Well worth the read.

@armijnhemel
Copy link
Contributor

@DennisClark
Copy link
Member

DennisClark commented Sep 14, 2023

Consider. Security Status values include:

  • Reported: Initial status of a new vulnerability.
  • Published: The reported vulnerability is confirmed to be real.
  • Disputed: There is no community consensus regarding the state of the vulnerability and there could be an ongoing discussion.
  • Rejected: The reported vulnerability is not real.

Note that these proposed status values do not attempt to address the reconciliation of different Severity levels suggested/reported by various sources. If that is a requirement also, we may need to refine these status values further. But the primary goal is to identify real Vulnerabilities that I need to care about and investigate vs reported Vulnerabilities that are not substantiated.

@TG1999
Copy link
Contributor

TG1999 commented Sep 18, 2023

@DennisClark what should be the criteria for a vulnerability status to be published? As I understand once we import a VCID from an advisory source we add a status Reported when should it change to Published?

@DennisClark
Copy link
Member

After further thought: instead of Published we should have this:

Confirmed : A vulnerability that was formerly Disputed has been confirmed to be a real problem.

If it's not possible to determine that kind of state change from the advisories, then I guess we really don't need Confirmed, and the other 3 should be sufficient.

@TG1999
Copy link
Contributor

TG1999 commented Sep 19, 2023

As discussed in today's VCIO call taking reference from https://nvd.nist.gov/vuln/vulnerability-status, we will use Reserved, Published, Disputed and Rejected

@TG1999
Copy link
Contributor

TG1999 commented Oct 3, 2023

We are considering PUBLISHED, DISPUTED, and INVALID statuses for vulnerabilities. These should also be tracked in History and logged.

@DennisClark
Copy link
Member

DennisClark commented Oct 4, 2023

Let's use use Published, Disputed and Invalid please.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

5 participants