-
-
Notifications
You must be signed in to change notification settings - Fork 221
Attempt to automatically generate unaffected_versions:
#676
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
* Generate `unaffected_versions` based on the inverse of the first `vulnerableVersionRange`, iff `vulnerableVersionRange` starts with `> ` or `>= `.
@jasnow for your review. |
FYI: Only focused on "gems" advisories: Within a single vulnerabilities entry, here is the categories of inputs (<, <=, >=, =, commas,
Across multiple vulnerabilities entries, are they sort so ".first" works all the time? How do you want examples of above? GHSA URL, GHSA json, ruby-advisory-db path/filename, sync script output? |
After I fixed typo, I tested the new versions on the daily GHSA sync files.
|
Another example:
|
Today feedback: https://gist.github.com/jasnow/ef53343a290b568bf65cf6d273e443a0 |
|
I hope these responses are helpful.
After running the sync script, how do we flag this project to review the documentation to verify that there is no releases between 1.3.1 and 1.4.0.
After running the sync script, how do we flag this project to review the above blog to come to your conclusion.
Made a note for my personal reference.
Waiting on fix.
Waiting on fix. |
Tried advisories with [beta, pre, rc, alpha] with operators, such as [~>, >=, <]. FYI: All of these tests are based on real examples (nothing fake). |
I have now added sorting by the first (lower bound) version. Try and see if that resolves the sorting issue.
Typically vulnerabilities do not disappear and then re-appear, so we will have to trust any gaps in the version numbers are due to minor version bumps (
I believe the code generated the correct
|
Does your comment change if the jump is between 1.3.1 and 1.4.0 for CVE-2009-4492? |
FYI: My assumption was that this work in for issue 537 (GitHub Action) so the |
Last night changes fixed two "out of order" vulnerableVersionRange"s listed above ("Waiting on fix"). Therefore if the requirement of this PR is to implement Ruby code to convert GHSA "unaffected_versions"-related data in GHSA format into ruby-advisory-db data format, then I think this PR has done that. Caverts:
Hope this helps. |
Generate
unaffected_versions
based on the inverse of the firstvulnerableVersionRange
, iffvulnerableVersionRange
starts with>
or>=
.