-
Notifications
You must be signed in to change notification settings - Fork 233
feat(vulnfeeds): Enable git resolution for affected versions field CVEList #3951
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
This reverts commit c56e9d5.
years = flag.String("years", "2022,2023,2024,2025", "A comma-separated list of years to process.") | ||
workers = flag.Int("workers", 30, "The number of concurrent workers to use for processing CVEs.") | ||
cnas = flag.String("cnas", "Linux", "A comma-separated list of CNAs to process.") | ||
cnas = flag.String("cnas", "Linux,GitHub_M", "A comma-separated list of CNAs to process.") |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
The EEF CNA is reporting GIT Versions. Can we be added to this list? Example CVE: https://cna.erlef.org/cves/cve-2025-48042.html
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Hey @maennchen, thanks for your enthusiasm with the CVE5 conversion! I tried running the converter with EEF scoped vulns and unfortunately in its current state it's not able to convert EEF vulns effectively, as the data layout differs from the more common expressions I've seen across Linux/GitHub_M/MITRE vulns. Looking a little more into it, it looks like the vulns are generated using Vulnogram, in which case, I'll consider adding an extension to handle Vulnogram generated vulns in a future PR :).
For a more timely ingestion of EEF vulns into OSV, we would highly appreciate Erlang publishing natively in the OSV format for us to ingest (also removes the layer of abstraction from going through the CVE Program to publish changes, and waiting for us to ingest those vulns).
Breaking #3951 into smaller PRs. Metrics being global caused some concurrency issues in the output of the metrics file.
This PR:
database_specific
and stores failed version conversions in theaffected
database_specific