-
Notifications
You must be signed in to change notification settings - Fork 506
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
false positive: name collision for python arrow vs rust arrow #3193
Comments
Running this shows unknown vendor, but only after looking into the CVE number we know that this is from Rust and not python. In our current implementation of both purl and mismatch, we only handle invalid relations associated with vendors and as this returns unknown vendor, I don't think we can tackle this with purl or mismatch. Triage maybe our only option here ? |
@inosmeet @mastersans @terriko If we have don't have a purl or a vendor to be able to determine the type of component, then triage is the only way we can distinguish between the rust and python components. Suggest that this is included in the triage documentation as a use case. FUTURE idea might be to separate components with an unknown vendor and no purl as CANDIDATE vulnerabilities. This is in effect adding a confidence factor to the vulnerability identification - 100% is we have a vendor/package/version match, less if we have no vendor etc) and then maybe add the confidence indicator as a command line parameter. |
This is going to be a pretty common scenario, and I think we need a fix that bypasses the need for triage because it'll save a huge amount of work for our users. Two quick options:
Of the two, That said... @inosmeet has what, a week left to finish docs and final write-up? I this this is doable but I don't want to add it to your workload this late in the game, and I don't think I'm getting it into the 3.4 pre-release. How would you feel about me (or someone else) adding purl mismatch capability after you finish your wrap up for the year, targeting either 3.4 final release or a 3.4.1 point release? |
I'll try to look into it after I get in the docs and final draft report. |
Yeah, it might have to happen at some sort of filtering level in with the triage if you don't pull the purls from the OSV stuff until then. |
But I still think storing it with the mismatches is the right choice, even if it might have to be looked up elsewhere! |
Moving this to future, since I don't think it's happening in the 3.4 timeframe. |
Apparently there is a Rust package called arrow which has some issues associated with it in OSV, such as https://rustsec.org/advisories/RUSTSEC-2021-0117.html
There is also a python package called arrow which one of our dependencies uses: https://pypi.org/project/arrow/
As a result, we're getting OSV issues for the wrong package. This is similar to #3179 and #3152 and should likely be resolved by cve-bin-tool itself as discussed in #3180
The text was updated successfully, but these errors were encountered: