Groups | Search | Server Info | Keyboard shortcuts | Login | Register
Groups > linux.debian.security > #6413
| From | Samuel Henrique <samueloph@debian.org> |
|---|---|
| Newsgroups | linux.debian.security |
| Subject | Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped) |
| Date | 2025-05-10 21:40 +0200 |
| Message-ID | <KKYdb-29FY-17@gated-at.bofh.it> (permalink) |
| References | <KHyoV-hxNz-1@gated-at.bofh.it> |
| Organization | linux.* mail to news gateway |
Hello Salvatore, sorry about the late reply, I was in MiniDebConf Maceió. On Thu, 1 May 2025 at 06:24, Salvatore Bonaccorso <carnil@debian.org> wrote: > Yes the A2 would go in the direction we are thingking, internally we > have said to it a new "nonissue" state, which can apply as well at > suite entry levels (this was not possible with the unimportant severiy > as major drawback). The nonissue (or not-affected-build-artifacts as > you call it, but we can decide on a name once developing) state would > be a new state so we can cover exactly for instance the zlib case, > several curl cases were a feature is not enabled in a given suite, say > bookworm not, but above are. So as a purely example: > > CVE-2024-9681 (When curl is asked to use HSTS, the expiry time for a subdomain might ...) > - curl 8.11.0-1 (bug #1086804) > [bookworm] - curl 7.88.1-10+deb12u9 > [bullseye] - curl <ignored> (curl is not built with HSTS support) > > Would become > > CVE-2024-9681 (When curl is asked to use HSTS, the expiry time for a subdomain might ...) > - curl 8.11.0-1 (bug #1086804) > [bookworm] - curl 7.88.1-10+deb12u9 > [bullseye] - curl <nonissue> (curl is not built with HSTS support) > > Or > > CVE-2023-28339 (OpenDoas through 6.8.2, when TIOCSTI is available, allows privilege es ...) > - doas <removed> > [bullseye] - doas <no-dsa> (Minor issue) > - opendoas <unfixed> (bug #1034185) > [trixie] - opendoas <not-affected> (Addressed via Linux kernel change) > [bookworm] - opendoas <ignored> (Minor issue, will be addressed via kernel change which isn't in 6.1 yet) > > would become > > CVE-2023-28339 (OpenDoas through 6.8.2, when TIOCSTI is available, allows privilege es ...) > - doas <removed> > [bullseye] - doas <no-dsa> (Minor issue) > - opendoas <unfixed> (bug #1034185) > [trixie] - opendoas <nonissue> (Addressed via Linux kernel change) > [bookworm] - opendoas <ignored> (Minor issue, will be addressed via kernel change which isn't in 6.1 yet) > > Similarly we could handle CVE-2016-2568, CVE-2016-2781, CVE-2023-28339 > in better ways than workaround. > > Thos are just examples, and I think you have a more complete list (can > you share the CVEs so we can see how that would map into such a > state?) I'm currently traveling and don't have access to the list I previously checked (will only reach that PC close to June). But I think "nonissue" will work perfectly, at least as long as we also define that <nonissue> will always result in the security-tracker (web UI, json) and OVAL file (or alternatives we might generate in the future) showing the package's binaries as "not-affected". Is this in line with what you discussed? I'm asking because "nonissue" has a broader definition compared to "not-affected-build-artifacts", and if "nonissue" is used for questionable CVEs (e.g.: CVEs for elfutils or without security impact), then we can't end up in a situation where "nonissue" is not evaluated as "not-affected", as this defeats the whole purpose of the solution. Thank you, -- Samuel Henrique <samueloph>
Back to linux.debian.security | Previous | Next — Previous in thread | Next in thread | Find similar
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped) Samuel Henrique <samueloph@debian.org> - 2024-11-28 00:50 +0100
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped) Salvatore Bonaccorso <carnil@debian.org> - 2024-12-01 15:10 +0100
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped) Samuel Henrique <samueloph@debian.org> - 2025-03-02 21:50 +0100
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped) Samuel Henrique <samueloph@debian.org> - 2025-04-13 17:30 +0200
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped) Salvatore Bonaccorso <carnil@debian.org> - 2025-04-13 17:40 +0200
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped) Samuel Henrique <samueloph@debian.org> - 2025-04-13 18:10 +0200
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped) Salvatore Bonaccorso <carnil@debian.org> - 2025-05-01 11:30 +0200
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped) Samuel Henrique <samueloph@debian.org> - 2025-05-10 21:40 +0200
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped) Santiago Ruano Rincón <santiagorr@riseup.net> - 2025-05-16 20:30 +0200
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped) Salvatore Bonaccorso <carnil@debian.org> - 2025-05-18 18:50 +0200
Re: security-tracker: A proposal to significantly reduce reported false-positives (no affected-code shipped) Roberto C. Sánchez <roberto@debian.org> - 2025-06-03 23:30 +0200
csiph-web