Skip to content

Commit 44a7c1a

Browse files
committed
internal/{genericosv,report}: add YAML field unknown_aliases
Adds a structured field, "unknown_aliases", to store aliases other than GHSAs and CVEs. We don't yet publish these to OSV, but this opens the possibility to do this in the future. Change-Id: Iab2f63bd15241c9d72f73bda33889f65874e9dc0 Reviewed-on: https://go-review.googlesource.com/c/vulndb/+/576997 LUCI-TryBot-Result: Go LUCI <golang-scoped@luci-project-accounts.iam.gserviceaccount.com> Reviewed-by: Zvonimir Pavlinovic <zpavlinovic@google.com>
1 parent af4720b commit 44a7c1a

File tree

5 files changed

+11
-6
lines changed

5 files changed

+11
-6
lines changed

data/reports/GO-2024-2643.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -31,10 +31,10 @@ cves:
3131
- CVE-2023-50726
3232
ghsas:
3333
- GHSA-g623-jcgg-mhmm
34+
unknown_aliases:
35+
- BIT-argo-cd-2023-50726
3436
credits:
3537
- '@crenshaw-dev'
3638
references:
3739
- fix: https://github.com/argoproj/argo-cd/commit/3b8f673f06c2d228e01cbc830e5cb57cef008978
3840
- web: https://argo-cd.readthedocs.io/en/latest/operator-manual/rbac
39-
notes:
40-
- create: found alias BIT-argo-cd-2023-50726 that is not a GHSA or CVE

data/reports/GO-2024-2646.yaml

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -29,11 +29,12 @@ cves:
2929
- CVE-2024-28175
3030
ghsas:
3131
- GHSA-jwv5-8mqv-g387
32+
unknown_aliases:
33+
- BIT-argo-cd-2024-28175
3234
credits:
3335
- '@Ry0taK, @agaudreault, and @crenshaw-dev'
3436
references:
3537
- advisory: https://github.com/argoproj/argo-cd/security/advisories/GHSA-jwv5-8mqv-g387
3638
- fix: https://github.com/argoproj/argo-cd/commit/479b5544b57dc9ef767d49f7003f39602c480b71
3739
notes:
38-
- create: found alias BIT-argo-cd-2024-28175 that is not a GHSA or CVE
3940
- Fix is in typescript code.

data/reports/GO-2024-2683.yaml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,10 +25,10 @@ cves:
2525
- CVE-2021-41803
2626
ghsas:
2727
- GHSA-hr3v-8cp3-68rf
28+
unknown_aliases:
29+
- BIT-consul-2021-41803
2830
credits:
2931
- anonymous4ACL24
3032
references:
3133
- web: https://discuss.hashicorp.com/t/hcsec-2022-19-consul-auto-config-jwt-authorization-missing-input-validation/44627
3234
- fix: https://github.com/hashicorp/consul/pull/14577/commits/2c881259ce10e308ff03afc968c4165998fd7fee
33-
notes:
34-
- create: found alias BIT-consul-2021-41803 that is not a GHSA or CVE

internal/genericosv/report.go

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ func (osv *Entry) ToReport(goID string, pc *proxy.Client) *report.Report {
3636
case ghsa.IsGHSA(alias):
3737
r.GHSAs = append(r.GHSAs, alias)
3838
default:
39-
r.AddNote(report.NoteTypeCreate, "found alias %s that is not a GHSA or CVE", alias)
39+
r.UnknownAliases = append(r.UnknownAliases, alias)
4040
}
4141
}
4242
addAlias(osv.ID)

internal/report/report.go

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -217,6 +217,10 @@ type Report struct {
217217
// the above CVEs.
218218
GHSAs []string `yaml:",omitempty"`
219219

220+
// Aliases from other databases that we don't (yet) know about.
221+
// Not published to OSV.
222+
UnknownAliases []string `yaml:"unknown_aliases,omitempty"`
223+
220224
// Related is a list of identifiers (e.g. CVEs or GHSAs)
221225
// that are related to, but are not direct aliases of, this report.
222226
Related []string `yaml:",omitempty"`

0 commit comments

Comments
 (0)