-
Notifications
You must be signed in to change notification settings - Fork 392
This issue was moved to a discussion.
You can continue the conversation there. Go to discussion →
Enable promoting informational advisories to vulnerabilities if CVE-aliased #1089
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
I lean toward the last idea of a |
For instance, despite CVE-2019-25010 can only be triggered by actively overriding an undocumented trait function which is clear from its name that it is not meant to be overridden ( |
@Qwaz, nice analysis, and I agree with both points. I think point (2) about CVSS/impact misalignment is particularly important to take seriously (it's the main reason I prefer the As a user: if there is an assigned CVE, I always want to at least know about it when I invoke |
What we were really trying to distinguish with
This is still not a great distinction, however we've received various complaints about alert fatigue and various people felt quite strongly that 2 doesn't amount to an actual security vulnerability. I have no problem promoting |
Converting this to discussions. |
This issue was moved to a discussion.
You can continue the conversation there. Go to discussion →
The following example surprised me: the
traitobject
crate currently only gets flagged bycargo audit
with anunsound
warning (RUSTSEC-2020-0027
), despite also having a critical CVE (CVE-2020-35881).It looks like the aliasing CVE was published many months after the RustSec advisory was issued. The RustSec advisory was eventually updated to link to the CVE (along with many others: #542).
There is a larger (stalled?) discussion (#313) about the RustSec project's operational definition of "security vulnerability". However, for purposes of security automation, I'd like to split off a narrow suggestion: if a CVE alises an informational RustSec advisory, then that advisory should be effectively "promoted" to have type "Vulnerability".
Some ideas for implementing this "effective promotion":
informational
key in the advisory (is this sufficient?)cargo audit
flag that locally enables this effective promotion, via something like--deny cve
.The text was updated successfully, but these errors were encountered: