Replies: 1 comment
-
Should be done with #888 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Background
Clair uses the OVAL feed provided by Debian for vulnerabilities in Debian-based images. Debian’s OVAL feed lacks severity rating data, which is a problem for ACS. ACS shows customers vulnerability severity ratings, and would much prefer to use the severity ratings from the distribution, itself, opposed to ratings from a third-party source like NVD. The goal is to add the severity rating to Debian vulnerabilities.
Proposal
Clair v2 and ACS Scanner both utilize https://security-tracker.debian.org/tracker/data/json for Debian vulnerabilities (see https://security-tracker.debian.org/tracker/ for more information). We propose to revert the change from this source to OVAL and return to using the original security tracker JSON feed. The JSON feed contains all of the same data about a vulnerability as the OVAL feed plus severity rating (note: both OVAL and JSON sources are missing vulnerability issued time).
Severity Mapping
Debian lists four severity ratings (see here for their meanings):
Based on Red Hat’s severity rating four-point scale, we propose to map the ratings as follows:
Note: this mapping differs from what Clair v2 did and what ACS Scanner does now. At this time, ACS Scanner does the following:
Side Effects
Alternatives
Keep OVAL but Find Urgency Elsewhere
This is not ideal, as we would like to obtain vulnerability data from a single source-of-truth. It is currently unclear if DSAs are assigned a level of urgency, so we’d need to determine the urgency from the related CVEs. However, at that point, it may just be worth changing vulnerability sources to minimize the number of websites queried.
Beta Was this translation helpful? Give feedback.
All reactions