
Run spellcheck job and correct errors. Fix malformed table Change-Id: I15d30123ce246adcbdde5d0c9b05e3ff4a69abc0 Signed-off-by: Ron Stone <ronald.stone@windriver.com>
2.0 KiB
2.0 KiB
CVE Maintenance
partner
starlingx
On a monthly basis, the master development branch of StarlingX is
scanned for CVEs using the third party tool Vulscan
to
provide an unbiased view of vulnerabilities. The generated reports are
reviewed by the Security team. For 's which meet StarlingX's CVE Fix
Criteria Policy as documented below, fixes are provided in the StarlingX
master branch.
Note
There are no scans executed or fixes implemented on the released versions / branches on StarlingX.
For the current Debian-based versions of StarlingX:
- v3.x base scores and base metrics are used in the fix criteria
- The
Fix Criteria Policy
is:- Main Fix Criteria
- v3.x Base score >= 7.0
- Base Metrics has the following:
- Attack Vector: Network
- Attack Complexity: Low
- Privileges Required: None or Low
- Availability Impact: High or Low
- User Interaction: None
- A correction is available upstream
- OR, visibility is HIGH and a correction is available upstream
- Main Fix Criteria
In the past, for older CentOS-based versions of StarlingX:
- v2 base scores and base vectors were used in the fix criteria
- The
Fix Criteria Policy
was:- Main Fix Criteria
- v2 Base score >= 7.0
- Base Vector has the following:
- Access Vector: Network
- Access Complexity: Low
- Authentication: None or Single
- Availability Impact: Partial/Complete
- A correction was available upstream
- OR, visibility was HIGH and a correction was available upstream
- Main Fix Criteria