repology-webapp icon indicating copy to clipboard operation
repology-webapp copied to clipboard

"vulnerable" should not be green

Open jonasstein opened this issue 4 years ago • 8 comments

green should be used for good/safe situations.

https://repology.org/projects/?maintainer=desktop-misc%40gentoo.org&inrepo=gentoo&problematic=1 2020-11-12_screenshot_0c8fda3e

vulnerable▲ - version is potentially vulnerable as there are related CVEs.

I suggest white on red.

jonasstein avatar Nov 12 '20 20:11 jonasstein

I take it as you've misunderstood the legend. Vulnerable status is denoted by the yellow warning sign, not the background color. The color indicates version status (up to date/outdated).

AMDmi3 avatar Nov 13 '20 12:11 AMDmi3

Vulnerable status is denoted by the yellow warning sign

Why not a scull and bones emoji?

KOLANICH avatar Nov 15 '20 15:11 KOLANICH

@AMDmi3 OK, I understand. However the impression is misleading, because the green dominates and the yellow triangle is so tiny. I still suggest to change it to a more significant symbol like a large UTF8 ⚠, or

2021-10-04_screenshot_3f7853a4

instead of

2021-10-04_screenshot_35dec796

(sorry for the delay)

jonasstein avatar Oct 04 '21 20:10 jonasstein

This looks reasonable.

AMDmi3 avatar Nov 14 '21 21:11 AMDmi3

The background color is the most visually striking element. It can appear alarming on badges. I suggest using a red background exclusively for vulnerable packages and not for "outdated" versions.

FedericoCeratto avatar Mar 17 '23 10:03 FedericoCeratto

I suggest using a red background exclusively for vulnerable packages and not for "outdated" versions.

Definitely no. Vulnerabilities are not the main topic of Repology, and also NVD quality and coverage is lacking, making it not suitable for primary package classification. However, vulnerabilities correlate pretty well with software freshness, and in most cases when new CVE is published, (only) the latest software version is not susceptible to it. So even for this purpose, it's still sensible to rely solely on freshness, and that also works for all cases not covered by NVD, such as not (yet) known vulnerabilities, not published vulnerabilities, vulnerabilities not yet analyzed and properly filled in NVD, CVES not matched with projects and CVES with incorrect versions not suitable for matching.

AMDmi3 avatar Mar 21 '23 19:03 AMDmi3

vulnerabilities correlate pretty well with software freshness

This is not true in general. Security-oriented distributions develop and distribute security updates for stable and LTS releases of the distribution. Over time, if more vulnerabilities are discovered, published and fixed the level of security of "legacy" software improves. On the other hand, feature releases from upstream might provide security fixes but also contain newly created vulnerabilities. (At risk of stating the obvious: vulnerabilities can be discovered at any time but can only be created by new releases)

FedericoCeratto avatar Mar 21 '23 21:03 FedericoCeratto

It's a mere speculation and opposite arguments of the same level of groundlessness may be given.

There are clear problematic scenarios with what you call "security-oriented distributions" approach:

  • When a CVE is published, in most cases there's already an upstream release which has it fixed. Distributions which keep up to date with upstream are thus safe, while "security-oriented distributions" are exposed to vulnerability from the moment it's published until they patch it, if they patch it.
  • When a vulnerability is silently fixed upstream, users of latest release are again safe, while "security-oriented distributions" may not get the fix at all.
  • All the hypothetical newly introduced vulnerabilities will eventually get to "security-oriented distributions" as they don't stay on ancient versions forever.

On the other side of the scale is the assumption that security is improved if the new code is withheld from users for [some] period to allow freshly introduced vulnerabilities to be fixed. The truthfulness of that hypothesis depends on actual vulnerability longevity, frequency, time to discover, time to publish, percentage of published vulnerabilities, time to fix in the distro, coverage of patched vulnerabilities and many other factors, and dynamics thereof over time and project maturity. Unfortunately I haven't seen any comprehensive studies on this subject, and without these I cannot consider the named approach sensible. To be fair, the term "security-oriented distribution" is not even correct here. You are speaking of "stable distribution", with primary goal not directly related to security (but of course it has to keep it's "stable" package base patched), and not necessarily at all being "more secure" as the result.

AMDmi3 avatar Mar 22 '23 17:03 AMDmi3