-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CSAF with purls that have no versions #1162
Comments
According to the spec: https://docs.oasis-open.org/csaf/csaf/v2.0/os/csaf-v2.0-os.html
So, if the section |
from @mprpic "Yes, that's intentional. It is used for components where we are claiming something is affected but not yet fixed. We don't have versions available in that case, so this is the best we can do. I want us to start pinning affectedness to exact versions in OSIM/OSIDB, and adding support for purls in affects is the first step towards that. For now, versionless should be interpreted as all version of that package (in the context of the product the affect is associated with, of course)." |
I'd still say that it's not the right way to provide that information. |
@ctron Care to elaborate what is the right way then? |
I'd say that this is the right content, according to the spec. So maybe on level higher? Or, using
– 3.1.2.3.2 Branches Type - Name under Product Version Range Item 1 |
@ctron Mmm, good point! I think flipping it to So something like this: ~/temp/csaf > diff -u cve-2025-0577.json cve-2025-0577_fixed.json
--- cve-2025-0577.json 2025-01-24 10:45:32.542618884 -0500
+++ cve-2025-0577_fixed.json 2025-01-24 10:45:12.559578065 -0500
@@ -141,8 +141,8 @@
"name": "Red Hat Enterprise Linux 9"
},
{
- "category": "product_version",
- "name": "glibc",
+ "category": "product_version_range",
+ "name": "vers:all/*",
"product": {
"name": "glibc",
"product_id": "glibc", Thoughts? |
@mprpic Yes, we can support this in the code (and it's a preferred way than to implement custom non-standard logic) |
I noticed that Red Hat CSAF advisories contains purls that don't have versions, like
This will not be matched by any SBOM package as the current implementation of
version_matches
function returnfalse
in this case. Changing the function to return true for these cases shows significantly more matched vulnerabilities.We need to investigate if this behaviour is correct and change and test it.
The text was updated successfully, but these errors were encountered: