-
Notifications
You must be signed in to change notification settings - Fork 151
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Function getSeverity will always return severity out of CvssV2 #72
Conversation
My vote would be CVSSv3 as well. At the time of writing that code we still preferred to go with V2 as we didn't have enough data points of user input. But as you can see from these 100+ data points of user input on this poll by @lizrice V3 is more preferred. |
Agreed, let's move to v3 |
Once there is a projected timeframe for completing the move to v3, that would be great to know. Thank you @lizrice ! |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This lgtm! @knqyf263 would you like to have another look?
Merge latest Trivy-DB
ping @knqyf263 :) |
I announced the migration. This PR affects Trivy DB just after being merged, so we're planning to merge this PR on October 19th. |
Hello,
While using Trivy, I noticed in a problem in the severity I was getting.
Looking at CVE-2017-0817, Trivy reported the severity as MEDIUM.
But when looking at NIST, the CvssV3 severity is HIGH, while the old CvssV2 severity is MEDIUM.
This led me to believe that there is a bug in Trivy while composing the vulnerability, after looking at the code and at the CVEs from NVD I found the following:
case d.CvssScore > 0:
will always occur.NIST started using CvssV3 around ~2015, but they also keep using CvssV2.
NIST CVE-2017-0817
I would love to hear from you regarding this PR.
Best,
Gal.