fix(get-cves): Store cpe update values and use to correctly fetch cves#5523
fix(get-cves): Store cpe update values and use to correctly fetch cves#5523
Conversation
Signed-off-by: Tom Marks <thomas.marks@palindrometech.com>
12f868b to
cfe397d
Compare
|
@ffontaine could you cast an eye over the general solution in this draft PR and provide some preliminary feedback? I've run this against the binary that caused me too find this bug, and it is reporting all expected CVEs. My biggest outstanding question is if Things to note:
Cheers, Tom |
|
Sorry for the late answer, here is a first round of comments:
|
|
@ffontaine thanks for those pointers. I'll take a look at the OSV data and highlighted functions, and update this fix accordingly. |
I also think correcting the CPE decoding functions is the best approach here. Indeed the CPE's "update" is practically a part of the "version" in cve-bin-tool's terminology + this will require no changes to the DB format, which is a significant simplification. Now, OTMH there may be some complications in range construction/comparisons that need to be worked out, but still this minimizes change while achieving the goal, and arguably in a more logically consistent way. |
Draft outline of bugfix addressing #5517
updatevalue from Cpe 2.3 URITodo:
ORwhere condition in SQL (if possible)curl_source.pygad_source.pyosv_source.pypurl2cpe_source.pyredhat_source.pyrsd_source.py