Skip to content

Commit 28d6807

Browse files
committed
news: something about the new vuln reporting system
1 parent ec2b8c7 commit 28d6807

File tree

1 file changed

+32
-0
lines changed

1 file changed

+32
-0
lines changed

web/news.md

Lines changed: 32 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -5,6 +5,38 @@ summary: Important events happening.
55

66
This page lists important changes or issues affecting MSYS2 users. We also post them to [Twitter](https://twitter.com/msys2org) and [Mastodon](https://fosstodon.org/@msys2org), including some not-so-important things :)
77

8+
### 2024-04-02 - Automated Vulnerability Reporting System
9+
10+
The [package index](https://packages.msys2.org/security) now has some
11+
rudimentary support for detecting and displaying
12+
[CVEs](https://en.wikipedia.org/wiki/Common_Vulnerabilities_and_Exposures) and
13+
other vulnerability reports for the packages included in MSYS2.
14+
15+
We piggyback on existing security scanner tools by using the metadata in the
16+
package recipes to create a dummy
17+
[SBOM](https://www.ntia.gov/page/software-bill-materials) file and then feed the
18+
scan results to our website. This gives us some insight into which
19+
packages have potential vulnerabilities or which updates should be prioritized.
20+
For more information on the process see [Vulnerability
21+
Reporting](./dev/vulnerabilities.md).
22+
23+
Some caveats:
24+
25+
* Only about half of our packages have the necessary metadata to be scanned at
26+
all. This is mainly because packages that have never had a CVE assigned also
27+
don't have a [CPE](https://nvd.nist.gov/products/cpe) to link to, and partly
28+
because it's just incomplete on our end.
29+
* The CVE system is currently [not fully
30+
operational](https://nvd.nist.gov/general/news/nvd-program-transition-announcement),
31+
and for the past few weeks most of the incoming CVEs have not been processed
32+
at all. This means that newer CVEs are likely not linked to our packages.
33+
Since we use [grype](https://github.com/anchore/grype) for scanning we do get
34+
some new data from their [nvd-data-overrides
35+
effort](https://github.com/anchore/nvd-data-overrides) though.
36+
* Note that we will not try to reduce the number of reported vulnerabilities to
37+
zero. We will mainly use them to prioritize updates and be better informed
38+
about the security status of our packages.
39+
840
### 2024-02-21 - Note to the remaining Windows 7 / 8.0 users
941

1042
Note to Windows 7 / 8.0 users: While we stopped supporting these systems over a year

0 commit comments

Comments
 (0)