-
Notifications
You must be signed in to change notification settings - Fork 40
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
3.2.3.12.1 Vulnerabilities Property - Remediations - Category #665
Comments
@thomas-proell Do you already have a suggest for the TC? |
@tschmidtb51 Which suggest do you think about? Concrete text proposal or a pull request? |
Currently, I don't think in terms of a PR. The issue you opened describes the current situation and your perception of it.
Please state as suggestion, one or more options how to solve the issue. E.g. this could be:
- Adding documentation around the topic
- Adding a test (e.g. preventing impossible situations of "none_available" and "vendor_fix")
- Splitting fields
- ...
Thanks!
|
The longer we discuss this here, the more interesting it gets. The current version is mixing many different aspects of a remediation that should be seperated. I will come with a concrete improvement suggestion. |
Here’s a concrete suggestion to be discussed. Currently, we have the following remediations:
Some people were requesting things similar to:
There are different issues here: 1.Status of vendor response ( For (1) - the status of the vendor response - I suggest to handle I also suggest to add other status reports in the vendor's vulnerability response (“ “ This leaves the remediation section (2) actual vendor response with the following choices:
3.2.3.12 Vulnerability Property - Remediations
The value The value The value The value The value The value
Changes in likelihood or impact define the degree to which the remediation changes the likelihood or impact of successful exploitation. Valid values are:
As the terms “workaround”, “mitigation”, “fix” are not used the same way around the globe, the mapping what they described in the old format must be found by each team for their own definitions. In Siemens we would map our old values: |
@thomas-proell After reading the suggestion again, I feel that #662 is not fully represented - but I might be missing something. #662, when included as remediation category has a text field that is able to convey information like "Fix should be expected next Monday" (very good description as you never have to deliver 😉) or "Fix will be included in Q4 2024 release". Such additional information seems to be missing once its get pushed into flags. |
@thomas-proell Please also state how your suggestion addresses #563 (resp. how this would be represented in your suggestion). |
I concur with Thomas Schmidt's assessment on proposed solution for #662 because the vulnerability flag does not have a description field to convey information about when and how the fix will be provided. |
I see two different approaches which collide here:
Both approaches are valid for different senarios. CSAF 2.0 is a compromize of these and we cannot change it fundamentally to fulfill either scenario without breaking the other in CSAF 2.1. |
@thomas-proell thanks for offering an opportunity to share more details as to our request. It is indeed multi-faceted and based on 2 perspectives : 1- Practical: Vendors will have the need at times to communicate about a known vulnerability in their product(s) ahead of delivering the remediation. This is done to be transparent with Customers and an acknowledged necessity to increase the bond of trust between Customers and their vendors. Therefore, for a Vendor to be able to publish a CSAF payload with a "Fix_Planned" field and value simply serves this purpose. Dell Security Advisories rely on this strategy every time for one product at least, example to be discussed if necessary (see revision table): dsa-2023-156-dell-bsafe-ssl-j-7-1-1-security-update 2- Industry Guidelines: FIRST.org lists at least one scenario with examples where this option of communicating a vulnerability ahead of delivering the remediation is needed: Use Case 3: Public disclosure of limited vulnerability information prior to remediation ; see practical examples with offering an advanced warning or expected cadence. Thanks again for your time and attention. |
I close this as the suggestion I proposed does not work. |
@thomas-proell Help us understand how this request is completed in the way you are describing, as: I am looking forward to engage with you and trying to understand your perspective too. You are referencing CSAF 2.1; i have no clue as to what this entails, meaning i can not meaningfully engage with you in a leveled-field & productive conversation either. Let me know if you can engage in a meeting to help me understand your perspective please as there could be much to gain for us all and the project. Cc: @mreedergithub , @tschmidtb51 |
I mistakenly closed it as "completed". I realized my mistake, re-opened it and closed it as "not planned" a few minutes later. Reason is: The proposal I had would not fully fix the current inconsistencies. Also they do not fulfill the quality expectations. To really fix this, we need more groundbreaking work, which is probably a candidate for CSAF 3.0. |
Thanks @thomas-proell ; is there a specific conversation about CSAF 3.0 that is already started ? if yes, can i join please ? |
I am not aware of CSAF 3.0 discussion in OASIS yet. Internally we talk about APIs instead of file formats, but this is still TBD.
Thomas
From: jdstefaniak ***@***.***>
Sent: Tuesday, June 25, 2024 11:22 PM
To: oasis-tcs/csaf ***@***.***>
Cc: Proell, Thomas (CYS DEF PCERT PVR) ***@***.***>; Mention ***@***.***>
Subject: Re: [oasis-tcs/csaf] 3.2.3.12.1 Vulnerabilities Property - Remediations - Category (Issue #665)
Thanks @thomas-proell<https://github.com/thomas-proell> ; is there a specific conversation about CSAF 3.0 that is already started ? if yes, can i join please ?
-
Reply to this email directly, view it on GitHub<#665 (comment)>, or unsubscribe<https://github.com/notifications/unsubscribe-auth/APS5P3RBH47U53NPKRWPPOLZJHNQLAVCNFSM6AAAAAA7ZCBVTGVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDCOBZHE4TCOBTGM>.
You are receiving this because you were mentioned.Message ID: ***@***.***>
|
I think the
|
Currently there are these categories:
These are of two different natures. 1st the existing vendor respose:
The second is not existing vendor response but a view into future:
Both only make sense when "vendor_fix" is not available.
The text was updated successfully, but these errors were encountered: