Open carlosthe19916 opened 3 months ago
The CVE will generally be very low value, and perhaps no include actual pURLs or CPEs, so difficult to link to thinks.
One step better would be the Netty project producing GHSAs or OSVs that give more/better details.
The RHT CSAF files purely give statuses within the context of the Red Hat product catalog.
So, ingesting a CSAF from Red Hat will tell you nothing of import about netty if you're using it in a vanilla Spring
app or such.
The user will need to ingest advisories relevant to their usage. If they use Quarkus, then our CSAFs. If they use something else, then they need some other advisories.
And generally, CVEs aren't the final answer, just a starting point that other people build advisories from.
Recent changes to the CVE ingestioning may help determine affected SBOMs, even with RHT CSAF files.
It may be useful to error on the side of returning potential false positives, to at least alert the user to the possibility of the packages being affected. This would be a signal to enable the importers relevant to their SBOM's rather than just the CVE's.
But when you consider in this particular example that the affected package name is vague, it prompts the question of which "netty" packages we should return as "possibly affected"? There are lots of packages with "netty" in their name, and relatively few named "netty", e.g.
Should we return all of them with "netty" in the name or some subset? By what rule[s]?
Hi guys, this is not to report a bug but more a way of asking a question.
Context:
As a result if I hit
GET /api/v1/vulnerability/CVE-2024-29025
then I get a response that indicates that my sbom quarkus-bom-3.2.11.Final-redhat-00001.json has a statusnot_affected
and also a set ofpurls
that indicate which are the packagesfixed | not_affected
. Everything good here.Question:
Finally I hit
GET /api/v1/vulnerability/CVE-2024-29025
then I get the following response:The previous response indicates that there are zero sboms affected by the vulnerability.
Here is the question, is the importing of red hat csaf files the only way of determining sbom statuses and package statuses? If I import my company sboms and then only import all the advisories from the CVE project, is it expected to have some sboms with statuses (affected, not affected, etc)?
I am asking because in my mind, an external company would not decide to import the red hat csaf files and for me, personally, it should be enough (even if not perfect) to import advisories from the CVE project or other open sources not strongly related to red hat advisories. WDYT guys?