-
Notifications
You must be signed in to change notification settings - Fork 596
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
possible false positives: unicorn package, qnx SDK package #2336
Comments
if there is anything I can do to assist with this I will be happy to help As I consider this software to be a real asset. Thanks to the team for this tool. |
Thanks for the FP issue @jurassicLizard - much appreciated. I've confirmed it here too:
We'll take a look. |
Thanks for the report. There are couple of things going on here, I want to break them all apart into different parts. Missing PURLLet's start with the scan results @popey noted above. If you look at the "TYPE" column, they are all
That data will return the correct results. Supplying purl data in the CycloneDX SBOM will greatly improve the results as we will use the version details provided by GitHub's vulnerability data to match python packages, which is superior to the NVD data. Incorrect CPEThe other part of this report is the CPE data for the findings (all the findings). You provide CPE information in the SBOM. When Grype has no other data, it will rely on CPE data in NVD to matching. CPE data in NVD has a lot of problems (as we can see in the results). If we look at the uvicorn CVE, we see
Which is why we are seeing the false positive. This is also why you're seeing the qnx_software_development_platform results. The CPE data in NVD needs to be fixed. Now, all that said We have the ability to update this data, Anchore maintains curated data in this repo https://github.com/anchore/cve-data-enrichment None of the CVEs in question are logged there today which means Grype is using the data directly from NVD. How to submit a PR to that repo is not well documented. I am going to work with @popey over the next few days to start writing this down. Part of that process will be updating the CVE IDs from your demo SBOM. I'll reply here when we submit the PR. |
@popey @joshbressers Thank you all for the very detailed explanations. And the extremely fast response. Very good tip with the purl, unfortunately i have little influence over the SBOMs i work with as i would need an intermediate converter to add purl and figure out the namespace and such things for 1000s of packages. But will do my best to improve my BOMs for better results. Will make sure to log any further false positives the way you have shown in the CVE enrichment repo. looking forward to the PR. Thank you all. I appreciate your time and effort. |
I see one of the CVEs has already been added : anchore/cve-data-enrichment@9d32bcb Kudos and eagerly awaiting the documentation of the individual properties of these jsons so I can start contributing and improving the data whenever such cases arise. |
What happened:
Some false positives detected
What you expected to happen:
How to reproduce it (as minimally and precisely as possible):
grype sbom:out.json
in the directory where out.json is downloadedwith uvicorn false positive and the
Anything else we need to know?:
N/A
Environment:
grype version
:cat /etc/os-release
or similar):The text was updated successfully, but these errors were encountered: