On Tue, Jun 27, 2023 at 2:36 PM Moritz Muehlenhoff <j...@debian.org> wrote:
>
> Package: security-tracker
> Severity: wishlist
>
> "unimportant" issues don't have security impact, but currently they get shown
> as "vulnerable" in red, both in a package overview page, e.g.
> https://security-tracker.debian.org/tracker/source-package/c-ares and 
> CVE-specific pages, e.g.
> https://security-tracker.debian.org/tracker/CVE-2023-31147

Be careful with trying to classify as important (security related) and
unimportant (not security related). It depends on proper
classification, and that does not always happen. Folks missed the
unimportant TTY1 layer bug for years until it became a CVE. CF.,
https://thenewstack.io/design-system-can-update-greg-kroah-hartman-linux-security/
.

I've also seen CVE-worthy bugs go without a CVE because someone could
not get the form on mitre.org to submit. At release time the Changelog
just said, "fixed bug XXX. This probably should have gotten a CVE."

And finally, many developers just fix important bugs without giving
them much thought. Fix it, check-in, move onto the next bug. No time
to analyze impact. In the past, I've cleared some memory problems and
wondered if someone could exploit them.

> This is a little misleading, since those packages are not actually vulnerable.
> It would be nice if such "unimportant" issues it would instead display
> "unfixed (no/negligible security impact)" instead. And instead of red maybe
> in grey.

Grey or orange might make a good choice to differentiate them from
important or security updates. Grey almost feels like "disabled" and
you won't be acting on it. Maybe orange would be the better choice.

Jeff

Reply via email to