Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
fix: remove alias mechanism from osv (intel#4187)
OSV database sometimes has entries such as https://osv.dev/vulnerability/PYSEC-2020-209 with no severity field but an alias to an other OSV entry which has one: https://osv.dev/vulnerability/CVE-2020-14365 Since its addition in commit 09417a2, cve-bin-tool will create an entry for CVE-2020-14635 but this entry will not contain any score which is obviously wrong so drop this alias mechanism. Moreover, this alias mechanism combined with the fact that OSV updated many "old" entries (such as https://osv.dev/vulnerability/CVE-2017-1000099 updated in May 2024) raises the following issue with libcurl 7.54.1 with 19 UNKNOWN CVEs: ╭─────────────────╮ │ NewFound CVEs │ ╰─────────────────╯ ┏━━━━━━━━┳━━━━━━━━━┳━━━━━━━━━┳━━━━━━━━━━━━━━━━━━┳━━━━━━━━┳━━━━━━━━━━┳━━━━━━━━━━━━━━━━━━━━━━┓ ┃ Vendor ┃ Product ┃ Version ┃ CVE Number ┃ Source ┃ Severity ┃ Score (CVSS Version) ┃ ┡━━━━━━━━╇━━━━━━━━━╇━━━━━━━━━╇━━━━━━━━━━━━━━━━━━╇━━━━━━━━╇━━━━━━━━━━╇━━━━━━━━━━━━━━━━━━━━━━┩ │ haxx │ libcurl │ 7.54.1 │ CVE-2017-1000099 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2017-1000100 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2017-1000254 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2017-1000257 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2017-8816 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2017-8817 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2018-1000005 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2018-14618 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2018-16890 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2019-3822 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2019-3823 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2019-5436 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2020-8231 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2020-8285 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2020-8286 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2021-22876 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2021-22924 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2023-27535 │ NVD │ MEDIUM │ 5.9 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2023-27536 │ NVD │ MEDIUM │ 5.9 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2023-27538 │ OSV │ UNKNOWN │ unknown │ │ haxx │ libcurl │ 7.54.1 │ CVE-2023-38546 │ OSV │ UNKNOWN │ unknown │ └────────┴─────────┴─────────┴──────────────────┴────────┴──────────┴──────────────────────┘ After this change, the correct result is retrieved from NVD: ╭─────────────────╮ │ NewFound CVEs │ ╰─────────────────╯ ┏━━━━━━━━┳━━━━━━━━━┳━━━━━━━━━┳━━━━━━━━━━━━━━━━━━┳━━━━━━━━┳━━━━━━━━━━┳━━━━━━━━━━━━━━━━━━━━━━┓ ┃ Vendor ┃ Product ┃ Version ┃ CVE Number ┃ Source ┃ Severity ┃ Score (CVSS Version) ┃ ┡━━━━━━━━╇━━━━━━━━━╇━━━━━━━━━╇━━━━━━━━━━━━━━━━━━╇━━━━━━━━╇━━━━━━━━━━╇━━━━━━━━━━━━━━━━━━━━━━┩ │ haxx │ libcurl │ 7.54.1 │ CVE-2017-1000099 │ NVD │ MEDIUM │ 6.5 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2017-1000100 │ NVD │ MEDIUM │ 6.5 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2017-1000254 │ NVD │ HIGH │ 7.5 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2017-1000257 │ NVD │ CRITICAL │ 9.1 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2017-8816 │ NVD │ CRITICAL │ 9.8 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2017-8817 │ NVD │ CRITICAL │ 9.8 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2018-1000005 │ NVD │ CRITICAL │ 9.1 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2018-14618 │ NVD │ CRITICAL │ 9.8 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2018-16890 │ NVD │ HIGH │ 7.5 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2019-3822 │ NVD │ CRITICAL │ 9.8 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2019-3823 │ NVD │ HIGH │ 7.5 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2019-5436 │ NVD │ HIGH │ 7.8 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2020-8231 │ NVD │ HIGH │ 7.5 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2020-8285 │ NVD │ HIGH │ 7.5 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2020-8286 │ NVD │ HIGH │ 7.5 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2021-22876 │ NVD │ MEDIUM │ 5.3 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2021-22924 │ NVD │ LOW │ 3.7 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2023-27535 │ NVD │ MEDIUM │ 5.9 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2023-27536 │ NVD │ MEDIUM │ 5.9 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2023-27538 │ NVD │ MEDIUM │ 5.5 (v3) │ │ haxx │ libcurl │ 7.54.1 │ CVE-2023-38546 │ NVD │ LOW │ 3.7 (v3) │ └────────┴─────────┴─────────┴──────────────────┴────────┴──────────┴──────────────────────┘ This alias mechanism is probably the root cause of intel#3721 Signed-off-by: Fabrice Fontaine <[email protected]>
- Loading branch information