CIQ CVE Remediation - Frequently Asked Questions
Introduction
This article is a great reference for customers looking to learn more about how CIQ evaluates and remediates security vulnerabilities.
FAQ
What CVE’s are addressed by CIQ Bridge and CIQ LTS?
For both Bridge and LTS subscriptions, CIQ focuses on resolving CVEs with CVSS scores of 7 and above. CIQ also considers customer impact and environmental factors.CIQ evaluates CVE’s taking into account the OS, the build environment and other Linux vendor scores to determine the applicability of the CVE to our distribution. CIQ prioritizes CVE’s based on CVSS score, package exposure, popularity, confidence in the potential fixes (vs. risk of them introducing bugs), and customer requests.
What does the CVSS Score mean?
CIQ evaluates scores from NIST CVSS 3.x Scoring System, MITRE and other OS Vendors to evaluate and rank vulnerabilities in a standardized and repeatable way. These scores are used as inputs for CIQ to determine the appropriate impact of the CVE to our distribution.
Are there SLA’s for CVE remediation?
CIQ does not provide SLA’s for any CVE remediation. They are prioritized based on the criteria discussed above.
Where can I see the status of a given CVE?
All fixes can be found in the CSAF files provided by the public CIQ Advisories Repository. CVE fixes are also published in the Mountain Portal. For any other status updates, please reach out to your Customer Success Manager or open a Support ticket.
How do CSAF files relate to the output of my scanning tool?
Scanners use CSAF files and data from OS vendors to determine if a CVE is fixed based on the version of the RPM. Scanner vendors are responsible for processing Rocky Linux and CIQ CSAF files and advisories to determine if a fix has been released for a given CVE. If your scanner is not ingesting the CSAF files from Rocky/CIQ LTS it will produce false positives.
How do CVE’s relate to Security Advisories?
Security advisories can contain one or more CVE’s. CIQ evaluates CVEs individually and not Security Advisories. CVE’s will be fixed based on the criteria mentioned above.