-
Notifications
You must be signed in to change notification settings - Fork 377
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Whitelisting non-vulnerable usages / false positives in advisories #288
Comments
Much appreciated! Just off the top of my head, maybe you'd probably want |
[unaffected_consumers]
clap = ["2"] You might want to force this to go all the way out to the patch level; right now it looks like all of version 2 is unaffected (which is currently correct for clap), but they could add a new non-breaking minor release that is affected. I do like that it's a list though! EDIT @kbknapp beat me to it while I was helping my son! 😀 |
And maybe require attaching a bit of context [unaffected_consumers]
clap = { version = ["2"], reason = "never triggers, only trusted input", discussion = "link to thread" } Where |
I'm not against this proposal. It could eliminate a lot of noise and would be good for many users. However, I really want to know if anything in my tree has vulnerability or some other known issue. Maybe it's not an real issue and it's easy to figure out. But I do want to know there is something somewhere. I have two reasons for this:
|
Exploitability is also far from being clear-cut. For example, Microsoft has famously misjudged their use of MD5 in certificates, which turned out to be far more exploitable than it seemed. I agree that surfacing the presence of vulnerable packages this in some way is a good idea even if certain advisories are suppressed. The presence of suppression in itself can be important. |
What about a new switch? E.g., Alternatively, we could keep the current behavior, and make a new switch that goes the other way: |
|
I just checked the advisory that is linked at https://rustsec.org/advisories/RUSTSEC-2018-0006, and its description for clap-rs/clap#1569 doesn't seem to have been updated yet. Can it be updated? |
Yep, either open a PR to update the advisory or I can try to look at it later this weekend. |
@tarcieri I'm afraid I'm going to have to wait for you to look into it, I'm tracking down a nasty bug in my code involving serde_json right now. |
|
SInce both we cannot address this is in advisory-db today and there is now compherensive tooling issue under rustsec/rustsec We'll close this one in favor of consolidating the attention to: rustsec/rustsec#505 Thanks everyone |
This came up via: clap-rs/clap#1569
The specific case is
clap
is pulling inrust-yaml
which has RUSTSEC-2018-0006. They use the vulnerable API, but not in a way that triggers the vulnerability.I've suggested updating the advisory to note their usage isn't vulnerable, but it'd be nice to be able to specify this programmatically somehow.
Something like:
The text was updated successfully, but these errors were encountered: