Hi there from Erlang OTP team.
We have been using OSV to do our vulnerability scanning using the REST API.
Some of the reporting seem to be incorrect.
This is the information we send using the https://api.osv.dev/v1/querybatch REST API
{
"queries": [
{
"commit": "37d575ede5ade50ad95b857f22ed7f1be4b1f2df",
"package": { "name": "github.com/microsoft/STL" }
},
{
"commit": "4c0618b0e44f7ef027ebae05d2cc7812048f7c8f",
"package": { "name": "github.com/ulfjack/ryu" }
},
{
"commit": "5fe1940275d04432da841896bac0a66cc2375551",
"package": { "name": "github.com/asmjit/asmjit" }
},
{
"commit": "c9a9e5b10105ad850b6e4d1122c645c67767c341",
"package": { "name": "github.com/openssl/openssl" }
},
{
"commit": "da607da739fa6047df13e66a2af6b8bec7c2a498",
"package": { "name": "github.com/madler/zlib" }
},
{
"commit": "f454e231fe5006dd7ff8f4693fd2b8eb94333429",
"package": { "name": "github.com/PCRE2Project/pcre2" }
},
{
"commit": "f8745da6ff1ad1e7bab384bd1f9d742439278e99",
"package": { "name": "github.com/facebook/zstd" }
},
{
"package": {
"ecosystem": "npm",
"name": "jquery"
},
"version": "4.0.0"
},
{
"package": {
"ecosystem": "npm",
"name": "jquery-migrate"
},
"version": "4.0.2"
},
{
"package": {
"ecosystem": "npm",
"name": "tablesorter"
},
"version": "2.32"
}
]
}
and I would like to focus on pcre2
{
"commit": "f454e231fe5006dd7ff8f4693fd2b8eb94333429",
"package": { "name": "github.com/PCRE2Project/pcre2" }
The response we get for pcre2 is that the following CVEs may affect us (please ignore the Erlang << and other stuff, the strings are the important parts
#{<<"results">> =>
[...
#{<<"vulns">> => ### PCRE2
[#{<<"id">> => <<"CVE-2016-3191">>,
<<"modified">> => <<"2026-04-01T23:41:22.026340Z">>},
#{<<"id">> => <<"CVE-2017-7186">>,
<<"modified">> => <<"2026-04-02T00:14:08.040982Z">>}]},
#{},#{},#{},#{}]}
However, the description for CVE-2016-3191 says that one may be affected if using pcre2 previous to 10.22. The commit we submit is for pcre2 version 10.47, so I am wondering if we are not submitting correctly the information, or if OSV is incorrectly doing the range analysis scanning and reporting.
Thanks for any input.
Hi there from Erlang OTP team.
We have been using OSV to do our vulnerability scanning using the REST API.
Some of the reporting seem to be incorrect.
This is the information we send using the
https://api.osv.dev/v1/querybatchREST APIand I would like to focus on
pcre2The response we get for pcre2 is that the following CVEs may affect us (please ignore the Erlang
<<and other stuff, the strings are the important partsHowever, the description for
CVE-2016-3191says that one may be affected if usingpcre2previous to 10.22. The commit we submit is for pcre2 version 10.47, so I am wondering if we are not submitting correctly the information, or if OSV is incorrectly doing the range analysis scanning and reporting.Thanks for any input.