Hello everyone,

I'll merge my replies to Moritz and Salvatore into a single email.

Moritz,

On Tue, 29 Oct 2024 at 19:15, Moritz Mühlenhoff <j...@inutil.org> wrote:
> I'm also in favour of changing the tracking. The current procedure addresses a
> fringe use case (supporting rebuilds of source packages) in an incomplete 
> manner
> and leaves too much room for confusion.

Right, so as a part of this change, we need to make sure we always allow older
releases to still be marked as affected or any other status.

I assume all the code that needs to be updated for this lives under the
security-tracker package, right?

Salvatore,

On Tue, 29 Oct 2024 at 19:43, Salvatore Bonaccorso <car...@debian.org> wrote:
> As mentioned in an earlier message: What I would love to see is to
> actually have a substate which makes the situation clear, and still
> beeing technically correct. I was envisioning something which would be
> a substate like we have for the substate of no-dsa (ignored,
> postponed).

This sounds like the solution proposal A2, quoting it:
> ## A2) Add a new mutually exclusive state to the set:
"not-affected-build-artifacts"

Would this be aligned to what you're looking for?

> Can it be that in this case the "unimportant" part of the CVE was
> ignored?

It did show up as unimportant in my report, but it was still marked as
affecting.

>In this case even if it would have been still unfixed, it was
> marked from the beginning as unimportant. What I have seen often here
> was that scannings were not taking into account that the whole CVE was
> classified unimportant.

I've realized that by the time I sent my email it had already been updated in
the tracker to not-affected (I used scan results from roughly 1 week before the
email), happy coincidence but we were claiming to be affected for 5 years until
then.

This CVE is now marked as fixed in our tracker as the upstream version we ship
mitigated that (even though Debian was never really affected). So a new scan
today for oldstable/stable will have this as a fixed CVE and there's no
false-positive, at least for oldstable and newer.

It is still marked as affecting buster and older releases and so users might
think they are fixing something through the upgrade:
https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/abda8e71a6c2e45c8219c9fb86792fb4da2468cb

Freexian's security tracker to show that buster and olders are still affected
per the current process:
https://deb.freexian.com/extended-lts/tracker/CVE-2019-19882

Thank you for the feedback so far!

--
Samuel Henrique <samueloph>

Reply via email to