Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Function getSeverity will always return severity out of CvssV2 #72

Merged
merged 6 commits into from
Oct 19, 2020
Merged

Function getSeverity will always return severity out of CvssV2 #72

merged 6 commits into from
Oct 19, 2020

Conversation

GalDevel
Copy link
Contributor

Hello,

While using Trivy, I noticed in a problem in the severity I was getting.
Looking at CVE-2017-0817, Trivy reported the severity as MEDIUM.
But when looking at NIST, the CvssV3 severity is HIGH, while the old CvssV2 severity is MEDIUM.

This led me to believe that there is a bug in Trivy while composing the vulnerability, after looking at the code and at the CVEs from NVD I found the following:

I would love to hear from you regarding this PR.

Best,
Gal.

@knqyf263
Copy link
Collaborator

Trivy prioritizes CVSSv2 on purpose. I think CVSSv3 always scores too high. But there is room for further consideration. If many users prefer CVSSv3, we can switch it. cc: @lizrice and @simar7

@simar7
Copy link
Member

simar7 commented Sep 23, 2020

Trivy prioritizes CVSSv2 on purpose. I think CVSSv3 always scores too high. But there is room for further consideration. If many users prefer CVSSv3, we can switch it. cc: @lizrice and @simar7

My vote would be CVSSv3 as well. At the time of writing that code we still preferred to go with V2 as we didn't have enough data points of user input. But as you can see from these 100+ data points of user input on this poll by @lizrice V3 is more preferred.

@simar7 simar7 self-requested a review September 23, 2020 18:06
@lizrice
Copy link
Contributor

lizrice commented Oct 2, 2020

Agreed, let's move to v3

@stevegileno
Copy link

Once there is a projected timeframe for completing the move to v3, that would be great to know. Thank you @lizrice !

Copy link
Member

@simar7 simar7 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This lgtm! @knqyf263 would you like to have another look?

@simar7 simar7 requested a review from knqyf263 October 2, 2020 21:04
@simar7
Copy link
Member

simar7 commented Oct 9, 2020

ping @knqyf263 :)

@knqyf263
Copy link
Collaborator

I announced the migration. This PR affects Trivy DB just after being merged, so we're planning to merge this PR on October 19th.
aquasecurity/trivy#678

@knqyf263 knqyf263 merged commit 2131c02 into aquasecurity:master Oct 19, 2020
@GalDevel GalDevel deleted the severity-fix branch October 19, 2020 10:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants