Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

"vulnerable" should not be green #156

Open
jonasstein opened this issue Nov 12, 2020 · 8 comments
Open

"vulnerable" should not be green #156

jonasstein opened this issue Nov 12, 2020 · 8 comments
Labels

Comments

@jonasstein
Copy link

green should be used for good/safe situations.

https://repology.org/projects/?maintainer=desktop-misc%40gentoo.org&inrepo=gentoo&problematic=1
2020-11-12_screenshot_0c8fda3e

vulnerable▲ - version is potentially vulnerable as there are related CVEs.

I suggest white on red.

@AMDmi3 AMDmi3 transferred this issue from repology/repology-rules Nov 12, 2020
@AMDmi3
Copy link
Member

AMDmi3 commented Nov 13, 2020

I take it as you've misunderstood the legend. Vulnerable status is denoted by the yellow warning sign, not the background color. The color indicates version status (up to date/outdated).

@AMDmi3 AMDmi3 added the ux label Nov 13, 2020
@KOLANICH
Copy link

Vulnerable status is denoted by the yellow warning sign

Why not a scull and bones emoji?

@AMDmi3 AMDmi3 closed this as completed Oct 4, 2021
@jonasstein
Copy link
Author

jonasstein commented Oct 4, 2021

@AMDmi3 OK, I understand. However the impression is misleading, because the green dominates and the yellow triangle is so tiny. I still suggest to change it to a more significant symbol like a large UTF8 ⚠, or

2021-10-04_screenshot_3f7853a4

instead of

2021-10-04_screenshot_35dec796

(sorry for the delay)

@AMDmi3 AMDmi3 reopened this Nov 14, 2021
@AMDmi3
Copy link
Member

AMDmi3 commented Nov 14, 2021

This looks reasonable.

@FedericoCeratto
Copy link

The background color is the most visually striking element. It can appear alarming on badges.
I suggest using a red background exclusively for vulnerable packages and not for "outdated" versions.

@AMDmi3
Copy link
Member

AMDmi3 commented Mar 21, 2023

I suggest using a red background exclusively for vulnerable packages and not for "outdated" versions.

Definitely no. Vulnerabilities are not the main topic of Repology, and also NVD quality and coverage is lacking, making it not suitable for primary package classification. However, vulnerabilities correlate pretty well with software freshness, and in most cases when new CVE is published, (only) the latest software version is not susceptible to it. So even for this purpose, it's still sensible to rely solely on freshness, and that also works for all cases not covered by NVD, such as not (yet) known vulnerabilities, not published vulnerabilities, vulnerabilities not yet analyzed and properly filled in NVD, CVES not matched with projects and CVES with incorrect versions not suitable for matching.

@FedericoCeratto
Copy link

vulnerabilities correlate pretty well with software freshness

This is not true in general. Security-oriented distributions develop and distribute security updates for stable and LTS releases of the distribution.
Over time, if more vulnerabilities are discovered, published and fixed the level of security of "legacy" software improves.
On the other hand, feature releases from upstream might provide security fixes but also contain newly created vulnerabilities.
(At risk of stating the obvious: vulnerabilities can be discovered at any time but can only be created by new releases)

@AMDmi3
Copy link
Member

AMDmi3 commented Mar 22, 2023

It's a mere speculation and opposite arguments of the same level of groundlessness may be given.

There are clear problematic scenarios with what you call "security-oriented distributions" approach:

  • When a CVE is published, in most cases there's already an upstream release which has it fixed. Distributions which keep up to date with upstream are thus safe, while "security-oriented distributions" are exposed to vulnerability from the moment it's published until they patch it, if they patch it.
  • When a vulnerability is silently fixed upstream, users of latest release are again safe, while "security-oriented distributions" may not get the fix at all.
  • All the hypothetical newly introduced vulnerabilities will eventually get to "security-oriented distributions" as they don't stay on ancient versions forever.

On the other side of the scale is the assumption that security is improved if the new code is withheld from users for [some] period to allow freshly introduced vulnerabilities to be fixed. The truthfulness of that hypothesis depends on actual vulnerability longevity, frequency, time to discover, time to publish, percentage of published vulnerabilities, time to fix in the distro, coverage of patched vulnerabilities and many other factors, and dynamics thereof over time and project maturity. Unfortunately I haven't seen any comprehensive studies on this subject, and without these I cannot consider the named approach sensible. To be fair, the term "security-oriented distribution" is not even correct here. You are speaking of "stable distribution", with primary goal not directly related to security (but of course it has to keep it's "stable" package base patched), and not necessarily at all being "more secure" as the result.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

4 participants