-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Ignore "withdrawn" vulnerability reports from PyPI's vulnerability service #388
Comments
@woodruffw is it possible to guesstimate when this change (including Warehouse/PyPI server side) comes online? I’ve got a bunch of breaking workflows and I have two options:
Either way, we’ll refactor our workflows as well such that future audit failures don’t break CI anymore and instead just issue a warning. I guess I was a bit too optimistic with my assumption that a CVE either has already received a fix or will receive one quickly. |
My best guess is that I'll have time to address this issue and make a new release later this week. However, as you pointed out, this will not fix the underlying issue, which is a data quality issue that I ultimately don't control. Unfortunately, I have no sense of how long MITRE's CNA will take to respond, or if they'll even bother to. In the mean time, you actually have a third option: you can use the For example, here's how I'm currently ignoring the bogus pytest CVE in one of my repositories: - name: Run pip-audit
uses: trailofbits/[email protected]
with:
virtual-environment: env/
ignore-vulns: |
GHSA-w596-4wvx-j9j6 With that, you'll be able to continue running your workflows while ignoring the current bad report. |
(As much as I don't want folks ignoring CVEs, that example/explanation is good and should probably land in our docs!) |
Yep, completely agreed. I can open a PR for that in a moment. |
#389 has the doc updates. |
pypi/warehouse#12443 will add the |
This will have no effect until pypi/warehouse#12443 is merged. See #388. Signed-off-by: William Woodruff <[email protected]>
#393 adds the code that supports pypi/warehouse#12443. |
Closing since all of the code on the |
Similar to #385, but for the default (PyPI) vulnerability service: we should handle vulnerability reports that are marked as "withdrawn" by ignoring them.
This is going to require a little more investigation/thought, since PyPI's JSON API doesn't expose the full OSV-style schema. Instead, it has a subset:
So, this may be a Warehouse-side change rather than a
pip-audit
one: Warehouse may need to occasionally prune entries from thevulnerabilities
table, depending on whether they're been withdrawn from OSV. Alternatively, Warehouse could naively mirror withwithdrawn
field from OSV, and leave it up to the client to handle it appropriately. In the latter case Warehouse changes would still be required, but they'd be much smaller (similar to what we did in pypi/warehouse#11858).The text was updated successfully, but these errors were encountered: