-
Notifications
You must be signed in to change notification settings - Fork 176
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Integrate with vulnerability databases #15
Comments
Maybe you can get inspiration how to implement this from https://github.com/flyingcircusio/vulnix#theory-of-operation? |
It has nothing to do with inspiration, there's just a pile of technical problems. Apart from just parsing nvd, we
|
...in order to count vulnerabilities for these properly (#15)
|
For the record, I've spotted an incorrect CVE information which leads to false positive. Here's a CVE which makes latest OpenVPN version look vulnerable, while in fact it refers to OpenVPN Access Server and should have CPE I've mailed to [email protected] and hope it'll get fixed soon - in fact I expect more corrections to follow as people spot them, and it's important to establish communication to NVD allowing to fix them quickly and make NVD itself more useful and reliable. Update: it was fixed, but I've got no reply. Other similar problems will be listed in repology/repology-rules#367 |
Mark vulnerable package versions
The plan:
cpe_name
(is useless without vendor)Match incoming packages against vulnerable version ranges in the databaseForce project update on new CPE for it (by resetting its hash)It turned out to be viable to bulk update vulnerable status on all packagesno it didn't, as we can't update binding tables properly this way to be able to do filtering based on vulnerable propertyImplement stub for handling patched vulnerabilty information from repositories(discussed in False positive CVEs reports for patched packages #1045cpe_vendor
/cpe_product
The text was updated successfully, but these errors were encountered: