# HG changeset patch # User Benoît Allard # Date 1412755033 -7200 # Node ID 76cba17794ab7a4351293858054adc363745a35c # Parent 8ffd3ec96f7cc0f4903bcc3e7ebc6a70530a6273 Add Descriptions to the Remediation fields diff -r 8ffd3ec96f7c -r 76cba17794ab farol/templates/vulnerability/edit_remediation.j2 --- a/farol/templates/vulnerability/edit_remediation.j2 Wed Oct 08 09:28:23 2014 +0200 +++ b/farol/templates/vulnerability/edit_remediation.j2 Wed Oct 08 09:57:13 2014 +0200 @@ -24,19 +24,40 @@ -#} {% extends "base.j2" %} -{% from "macros.j2" import selectinput, textinput, textarea, selectinput2 %} +{% from "macros.j2" import selectinput, textinput, textarea, selectinput2, examples %} {% block title %}Edit Remediation{% endblock %} {% set active = 'vulnerability' %} {% block content %} +

The Remediation container holds specific details on how to handle (and presumably, fix) a vulnerability.

+

A Remediation container can be tied to one or more specific products by referencing these products using either the Product ID or Group ID child elements. If the Remediation is meant to be general or nonspecific for all products, the Product ID and Group ID child elements should be omitted.

-{{ selectinput('type', "Type", types, type) }} -{{ textinput('date', "Date", now.isoformat(), date, type="datetime") }} -{{ textarea('description', "Description", '', description, 5, required=True) }} -{{ textarea('entitlement', "Entitlement", '', entitlement, 5) }} -{{ textinput('url', "URL", 'https://...', url, type="url") }} +{% call selectinput('type', "Type", types, type) %} +

The Type attribute is required and can be one of the following:

+
+
Workaround:
Workaround contains information about a configuration or specific deployment scenario that can be used to avoid exposure to the vulnerability. There may be none, one, or more workarounds available. This is typically the “first line of defense” against a new vulnerability before a mitigation or vendor fix has been issued or even discovered.
+
Mitigation:
Mitigation contains information about a configuration or deployment scenario that helps to reduce the risk of the vulnerability but that does not resolve the vulnerability on the affected product. Mitigations may include using devices or access controls external to the affected product. Mitigations may or may not be issued by the original author of the affected product, and they may or may not be officially sanctioned by the document producer.
+
Vendor Fix:
Vendor Fix contains information about an official fix that is issued by the original author of the affected product. Unless otherwise noted, it is assumed that this fix fully resolves the vulnerability.
+
None Available:
Currently there is no fix available. Description should contain details about why there is no fix.
+
Will Not Fix:
There is no fix for the vulnerability and there never will be one. This is often the case when a product has been orphaned, end-of-lifed, or otherwise deprecated. Description should contain details about why there will be no fix issued.
+
+{% endcall %} +{% call textinput('date', "Date", now.isoformat(), date, type="datetime") %} +

Date is the date Remedy was last updated, if omitted it is deemed to be unknown, unimportant, or irrelevant. All dateTime values in CVRF require a time, and we recommend the inclusion of a time zone as well (ICASI endorses the use of GMT or “Zulu time”). If a time zone is excluded, Zulu should be assumed.

+{% endcall %} +{% call textarea('description', "Description", '', description, 5, required=True) %} +

The Description element will contain a thorough human-readable discussion of the Remediation.

+{% endcall %} +{% call textarea('entitlement', "Entitlement", '', entitlement, 5) %} +

Entitlement contains any possible vendor-defined constraints for obtaining fixed software or hardware that fully resolves the vulnerability. This element will often contain information about service contracts or service-level agreements that is directed toward customers of large vendors.

+{{ examples(['Cisco customers with service contracts that entitle them to regular software updates should obtain security fixes through their usual update channels, generally from the Cisco website. Cisco recommends contacting the TAC only with specific and imminent problems or questions.
As a special customer service, and to improve the overall security of the Internet, Cisco may offer customers free of charge software updates to address security problems. If Cisco has offered a free software update to address a specific issue, noncontract customers who are eligible for the update may obtain it by contacting the Cisco TAC using any of the means described in the Contact Summary section of this document. To verify their entitlement, individuals who contact the TAC should have available the URL of the Cisco document that is offering the upgrade.
All aspects of this process are subject to change without notice and on a case-by-case basis. No particular level of response is guaranteed for any specific issue or class of issues.']) }} +{% endcall %} +{% call textinput('url', "URL", 'https://...', url, type="url") %} +

URL is the optional URL to the Remediation.

+{% endcall %} + {{ selectinput2('products', "Products", products, productids, multiple=True) }} {% if groups %} {{ selectinput2('groups', "Groups", groups, groupids, multiple=True)}}