-
Notifications
You must be signed in to change notification settings - Fork 47
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerabilities without CVE and informational #90
Comments
Interesting idea. Do you have a proposal how this would look in terms of the data? |
Maybe something like this. The prefix |
@h3xstream Makes sense. I assume that the internal structure of those files would be the same as the cve versions, but missing the cve info (for obvious reasons 😄). Few more questions to round out the idea:
|
@ashcrow I would migrate those to cve folder if there is a definite fix. |
I like the idea. There will be quite a few changes required in the API and client libraries to support these warnings. I guess we can leave it out of the API and client in the short term. |
In theory I like having the ability to extend this to cover weaknesses (CWEs) and or unclassified bugs with a security impact as well. There are a few concerns here however;
I think propagation of these to the hosted service and other victims client is out of scope for this issue. If this is required to be consumed by a client or service we should probably raise respective issues as the need arises. The main changes required, would be in the validation scripts. To summarise I think the being able to do this will be definitely a good thing. However, this would be something that would require a bit more formalisation. |
With references and a proper description it should be easy to manage. Good references would include : commit log, release note, paper and conference material.
Same as the CVE except for the field |
Hi! JFYI, there is OVE initiative: http://www.openwall.com/ove/ IMHO, CVSS is important metric but it is hard to estimate it if you are not in context of a specific issue... |
Some vulnerabilities do not have CVE .. It can sometimes be a pain to request CVE for low severity bugs if the project/library doesn't handle it. For example,
common-io
2.5 has some minor improvements with path that contains NULL bytes.It would be nice to have informational "vulnerabilities" (more like simple notifications) attached to libraries that can be risky in certain context.
One example is unsafe deserialization libraries could be alert to the user. https://github.com/mbechler/marshalsec
The text was updated successfully, but these errors were encountered: