Hello,

I got a response from trivy,
https://github.com/aquasecurity/trivy/discussions/6722#discussioncomment-9518531

> Helllo @superlazyname <https://github.com/superlazyname>
> Thanks for your report!

> As you can see - we marked this vulnerability as "Status": "will_not_fix",
.
> We use will_not_fix for vulnerabilities with ignored State.
> We can't parse State description, because it deoesn't have format.

> [bookworm] - zlib (contrib/minizip not built and producing binary
packages)

> It seems that debian chose wrong state. not_affected looks more correct.
------------------------------

> Trivy supports VEX
<https://aquasecurity.github.io/trivy/v0.51/docs/supply-chain/vex/>.
> You can create VEX file to ignore this CVE.

> Regards, Dmitriy

I'll call out these particular points,

> We can't parse State description, because it doesn't have format.

> It seems that debian chose wrong state. not_affected looks more correct.

It sounds like this is some kind of incompatibility between how trivy
conceptualizes CVEs vs how Debian conceptualizes CVEs, plus a terminology
problem on the meaning of "ignored" (won't fix vs is not affected)

- Would you consider marking the vulnerability as "not_affected" instead of
"ignored"? Or does the Debian CVE tracking system not support that?

- I would agree that " [bookworm] - zlib (contrib/minizip not built and
producing binary packages)" doesn't have a standard format, but is there no
other viable way for a scanner to pick up on the CVE being ignored?

- Do you have docs to show what method should be used to properly handle
this issue being marked as "ignored"? Do you have any sample code / script
snippets you can share with me? Maybe I can submit a PR?

Maybe there is some way for trivy to notice that the issue is "ignored" and
then, for only Debian, interpret that as not_affected.

- John

On Sat, May 18, 2024 at 5:03 AM Salvatore Bonaccorso <car...@debian.org>
wrote:

> Hi John,
>
> On Fri, May 17, 2024 at 04:01:56PM -0400, John Waffle wrote:
> > This report came from a free tool, trivy, I filed a Github discussion
> about
> > it here: https://github.com/aquasecurity/trivy/discussions/6722
>
> Thanks a lot for bringing that upstream.
>
> So to add some additional datapoint: The issue araises here by maybe
> thinking zlib refers to the binary package produced. It is correct,
> for the binary package zlib then indeed you would not be vulnerable.
>
> Let me as well elaborate on the "ingored". This comes as the binary
> packages built from the *vulnerable* source, there is no point to
> force an update in bookworm and older.
>
> I hope this all get a better picture now on the CVE. If you still have
> questions feel free to ask.
>
> Regards,
> Salvatore
>

Reply via email to