feat(seal): Add support for Seal Security#364
Conversation
Add support for Seal Security vulnerability advisory
|
@SealSagish i found one problem with "affected": [
{
"package": {
"ecosystem": "redhat:8",
"name": "seal-cups"
},
"ranges": [
{
"type": "ECOSYSTEM",
"events": [
{
"fixed": "1:2.3.3op2-16.el9+sp2"
},
{
"introduced": "1:2.3.3op2-16.el9"
}
]
}
],
"database_specific": {
"type": "RPM"
}
},events are in reverse order (and we get error in trivy-db parsing). can you take a look? |
Flatten advisory FS to remove ecosystem separation
|
For example, if the ecosystem is Red Hat, it must be In that case, wouldn’t it make more sense to define a custom ecosystem like |
Fix CR Comments
|
As for the ecosystems, I think changing the advisory to adhere the OSV conventions will be a better choice here. I don't see much benefit to adding the
I lean towards the second option myself. What do you think? |
|
There are two problems with the second way:
Instead of handling the case with CPE and creating multiple PRs, @knqyf263 suggested to create one new |
|
Yes, as @DmitriyLewen mentioned, the current OSV specification may not fit Seal Security’s use case (Red Hat is one such example). Moreover, proposing undefined ecosystems such as CBL-Mariner to the OSV community through PRs takes time. If you define your own format without properly aligning with the existing one (e.g., On the other hand, if it is Seal’s own ecosystem, you are free to decide the format. In fact, a company called Echo has already added theirs to OSV. |
|
We talked internally and decided to create proprietary ecosystems in the advisory We plan on changing that to a single ecosystem - Similarly, debian/ubuntu and alpine linux will get the |
|
Great! |
* dsa * Update test data according to new advisory ecosystems
|
Hey @DmitriyLewen, I updated our advisory and the test data to contain the new ecosystems as discussed |
|
what is the license of that data? |
|
The advisory data is MIT license |
|
Hi @DmitriyLewen. Do you have an estimate of when we can continue with the review? |
|
@SealSagish This PR looks good to me UPD: |
|
Hello @SealSagish Is this expected? |
This is expected, as of now all our EL8 libraries are fully sealed (no vulns). In the future, as new vulnerabilities will be discovered for those and other seal built libraries, it will be added automatically. |
Signed |
DmitriyLewen
left a comment
There was a problem hiding this comment.
@SealSagish left 2 small comment.
Can you take a look?
Co-authored-by: DmitriyLewen <91113035+DmitriyLewen@users.noreply.github.com>
|
@SealSagish can you fix linter errors? |
|
I'm currently reviewing PRs. Please wait a moment. |
No description provided.