-
Notifications
You must be signed in to change notification settings - Fork 193
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
No affected versions reported by the API #3054
Comments
Hi @4b75726169736859, this is because we don't get affected versions from the upstream source. The upstream source can provide us with either affected versions or an affected range, or both (such as in Ubuntu). We ingested Debian data ourselves, so we have some version enumeration function to calculate all affected versions based on the affected range. This is difficult to maintain and scale to more ecosystems. So, we have improved our API queries to match vulnerabilities against the affected range. If you are using our API version query, it will return all vulnerabilities for that version.
|
Thank you for your quick response. What interests me here is the ability to perform vulnerability checks offline. I have a large number of packages to verify, and the goal is to conduct regular vulnerability monitoring for my IT infrastructure. I want to perform these checks offline for two main reasons:
In the example you provided with API requests, you were able to retrieve vulnerabilities associated with a specific package version. I was wondering:
If yes, could you guide me through your approach or methodology ? Thank you. |
If you are building your own offline vulnerability matching system, you might be interested in osv-scanner, especially the local offline mode, which uses our exported zip files as the local database and does all matching locally. You can either use osv-scanner directly (check out our osv-scanner documentation), or take a look at our source code for ideas on how to implement your own version. The main parts of the code that are likely of interest to you is the We are currently in the process of open sourcing that by moving it to osv-scalibr, see: google/osv-scalibr#316 See https://github.com/google/osv-scanner/blob/main/internal/clients/clientimpl/localmatcher/localmatcher.go for how we do offline matching with semantic and the exported zips. We are currently doing a big refactor for osv-scanner v2, so the code might move around a bit. |
Great, thank you very much! I have everything I need to move forward with my project! |
Hello, I don’t understand why I can’t find affected versions for RedHat or Rocky vulnerabilities when querying the API or downloading the datasources for RedHat and Rocky. However, I do find the affected versions in the datasources for Debian vulnerabilities.
I’m basing my search on a package name and version to look for vulnerabilities related to a specific version in the datasources, and this makes things much more complicated.
Is this normal? I’m not sure how I should proceed.
Thank you, have a great day!
The text was updated successfully, but these errors were encountered: