-
Notifications
You must be signed in to change notification settings - Fork 16
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
fix(redhat): parse package_state
for unfixed vulns
#116
base: main
Are you sure you want to change the base?
fix(redhat): parse package_state
for unfixed vulns
#116
Conversation
@knqyf263 @simar7 @itaysk But there is problem with columns. I think we need to choose one logic for advisories now. And later, maybe think about changing the column names. I am open to suggestions 👍 |
Thanks @DmitriyLewen for investigation. Do we want to keep this section maintained in the first place? There are a lot of vendors. Even if we show Ubuntu and Red Hat for CVE-2024-12705, it won't be correct. All other vendors providing BIND9, such as Oracle, Debian, Alma Linux, Rocky Linux and Azure Linux, are probably affected. |
I'm not sure if it's worth removing redhat and ubuntu advisories:
|
I meant this section, "Affected Software". Does it look bad if we remove the section? The other sections, such as description and mitigation, will remain. |
I don't know if we can answer this question reliably without knowing how product uses this information (if at all). cc @itaysk Personally, I would support removing this section as well because as @DmitriyLewen already pointed out this information isn't standardized across distros. It's quite possible that we would have to add others and they will not be a good match with existing columns. It's also not quite reliable IMO as many times there's not enough information published by the vendor regarding |
I looked at the vulnerability pages again with a "fresh head". You are probably right and this section should be removed because it rather raises more questions and confusion than provides information for users. |
Actually, @simar7 is correct. We need to check with the product team. They might be using this section heavily. Another option is to show only information from organizations that are not software vendors (e.g., NVD). NVD is supposed to show upstream software names (BIND9 in this example). However, NVD is now delayed and doesn't enrich vulnerabilities. If we really need to show affected software, we can take such information from vulnrichment maintained by CISA. |
Description
RedHat uses
affected_release
andpackage_state
for packages.We currently only analyze the
affected_release
array.That's why we only show fixed vulnerabilities (see aquasecurity/trivy#8337).
We need to analyze
package_state
to show unpatched vulnerabilities.Example (https://avd.aquasec.com/nvd/2024/cve-2024-12705/):

Before:
After:
