-
Notifications
You must be signed in to change notification settings - Fork 7
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Filter out APKINDEX entries that don't contribute any CVEs #2
Comments
I don't see this feature in the priorities spreadsheet. Who's the PM for this? |
@jspeed-meyers I think it's important that we spend time bikeshedding about which vulnerability scanner would be used as the source of truth instead of discussing the feature request itself |
I was curious what % of packages contribute at least one vulnerability to the final count. By my math, as of today,
Comparing this number to the total number of packages inside the image we get
We can infer that an image containing only vulnerable packages would be ~16% of the size of the current image. |
If we assume that the majority of vulnerabilities (i.e. anything not in Wolfi secdb) are being matched by vulnerability scanners based on the For example, if there is version |
That's an excellent point. @luhring--Can you please weigh in on which scanner's results best approximate "truth"? |
Yet another reason the lack of a PM is troubling. Is the design goal to make the image have as many CVEs as possible and to have as many packages as possible? Or to make the image have as many CVEs per package as possible? Without a thorough PRD, we'll be stuck here forever. YOU PEOPLE CALL THIS A LAUNCH????? @imjasonh -- Please advise. |
Apologies for not discussing this thoroughly enough during the (extensive!) design and approval phase. @jspeed-meyers you're right to feel that this launch was rushed, and that the proper care and diligence wasn't demonstrated, in accordance with the seriousness of this work. I can only hope to do better in future launches. However, as a silver lining, I wonder if we've exposed a loophole which might enable infinite CVEs! If scanners are looking for ("infinite" here is misleading; in reality we're constrained by the limits of epoch numbers -- The question of vuln density then becomes how compactly we can encode and compress the existence of a vulnerable package-version. Clearly this warrants further study. |
Depending on how the given scanner parses the installed DB, you might not need to find unique epoch numbers at all, and could instead repeat a given known vulnerable version's entry as many times as you want. |
But this starts us on a dark path, where to push the CVEs-to-bytes ratio to the limit, you'd simply repeat the DB entry with the highest CVEs-to-bytes value in place of incorporating the entire catalog of packages with their varied and inferior CVEs-to-bytes values. |
Whatever the PRD says is what we should do. |
It appears that at least within grype they are using go-apk-version which does not actually parse the revision into an |
Description
In an effort to further increase the CVEs-to-bytes ratio, we could consider a scanner-informed filter pass that removes DB entries that aren't pulling their weight in CVEs...
The text was updated successfully, but these errors were encountered: