-
Notifications
You must be signed in to change notification settings - Fork 27
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
wishlist: machine readable current vulnerabilities report tailored per repo #137
Comments
Sure, I do already have this in mind for the site (see #135), it would be easy to implement new API endpoints along the way. Some more info for CVEs need to be stored, but that not a problem. |
I'd like to cycle back to this. For Ravenports, though, if we got the list of current vulnerabilities, we can track which CVE's were patched and filter those out. So if want Repology to list patched CVEs for the parser we can do that, but it's not a dealbreaker since we can filter on the other side. |
Hi Dmitry,
For my part, if Ravenports patches the CVE I can add this information the repology.json file so you could implement the ability to adjust vulnerability reports with reported patching of CVEs. I think that was on your wish list ... |
Well I do not plan to work on this in near future. |
well, ok, I'll work on a solution that doesn't involve repology then. |
Hi Dmitry,
You might already have something like this in mind but just in case, let me lay out the background then the actual request.
So Ravenport currently uses a patched version of FreeBSD's pkg(8) for package management. It's been given us problems especially on Linux so I'm in the process of rewriting it (in Ada but that isn't relevant). One feature I had eliminated from both the patched pkg and the new implementation is the vulnerabilities report features because I didn't have that vulnerabilities xml file nor the manpower to generate one. But repology might be the solution to this.
If there was an URL on the repology website that would produce a report say in json format that listed all the active CVEs on the supported version in ravenports, our package manager could read that and have that vulnerability information I didn't think we could have.
I don't think it needs to include obsolete CVEs.
SO for example, the last I checked, ravenports had 52 packages marked as vulnerable. So this proposed report would list those 52, the active CVEs for each, and perhaps a one line title/summary for each cve).
Do you think that would be possible? I would imagine several other repository owners would find that useful somehow.
John
The text was updated successfully, but these errors were encountered: