Skip to content

Add Resolved In Version from NVD to vulnerable software #11666

@zhumo

Description

@zhumo

This issue's remaining effort can be completed in ≤1 sprint. It will be valuable even if nothing else ships.

It is planned and ready to implement. It is on the proper kanban board.

Goal

User story
As a user of the Fleet vulnerability dashboard on the vulnerability list page,
I want to see a new column which shows which version of a software item no longer has this particular vulnerability
so that I can recommend this version to my end-users and quickly address the issue.

Changes

/fleet/software API will include a new field resolved_in_version

Sample:

{
    "id": 101,
    "name": "macos",
    "version" "12.1"
    "vulnerabilities": [
        {
            "cve": "CVE-2023-23499",
            "details_link": "https://nvd.nist.gov/vuln/detail/CVE-2023-23499",
            "cvss_score": 5.9,
            "epss_probability": 0.00205,
            "cisa_known_exploit": false,
            "cve_published": "2022-12-23T00:15:00Z",
            "resolved_in_version": "12.6.3"
        }
    ],
}

This issue's estimation includes completing:

ℹ️  Please read this issue carefully and understand it. Pay special attention to UI wireframes, especially "dev notes".

Context

Tactics

  • In the UI, API, and webhooks, include the "From (including)" and "Up to (excluding)" information that is
  • Here, safe is defined as: the first higher version of the software that has no vulnerabilities. If there are no higher versions without vulnerabilities, then select the first lower version of the software with no vulnerabilities. If neither above are true, then display some message saying so.

Metadata

Metadata

Labels

#g-endpoint-opsEndpoint ops product group:productProduct Design department (shows up on 🦢 Drafting board)customer-faltonastoryA user story defining an entire feature

Type

No type

Projects

No projects

Milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions