Skip to content

Possible commit range misreporting #5192

@kikofernandez

Description

@kikofernandez

Hi there from Erlang OTP team.
We have been using OSV to do our vulnerability scanning using the REST API.
Some of the reporting seem to be incorrect.

This is the information we send using the https://api.osv.dev/v1/querybatch REST API

{
  "queries": [
    {
      "commit": "37d575ede5ade50ad95b857f22ed7f1be4b1f2df",
      "package": { "name": "github.com/microsoft/STL" }
    },
    {
      "commit": "4c0618b0e44f7ef027ebae05d2cc7812048f7c8f",
      "package": { "name": "github.com/ulfjack/ryu" }
    },
    {
      "commit": "5fe1940275d04432da841896bac0a66cc2375551",
      "package": { "name": "github.com/asmjit/asmjit" }
    },
    {
      "commit": "c9a9e5b10105ad850b6e4d1122c645c67767c341",
      "package": { "name": "github.com/openssl/openssl" }
    },
    {
      "commit": "da607da739fa6047df13e66a2af6b8bec7c2a498",
      "package": { "name": "github.com/madler/zlib" }
    },
    {
      "commit": "f454e231fe5006dd7ff8f4693fd2b8eb94333429",
      "package": { "name": "github.com/PCRE2Project/pcre2" }
    },
    {
      "commit": "f8745da6ff1ad1e7bab384bd1f9d742439278e99",
      "package": { "name": "github.com/facebook/zstd" }
    },
    {
      "package": {
        "ecosystem": "npm",
        "name": "jquery"
      },
      "version": "4.0.0"
    },
    {
      "package": {
        "ecosystem": "npm",
        "name": "jquery-migrate"
      },
      "version": "4.0.2"
    },
    {
      "package": {
        "ecosystem": "npm",
        "name": "tablesorter"
      },
      "version": "2.32"
    }
  ]
}

and I would like to focus on pcre2

   {
      "commit": "f454e231fe5006dd7ff8f4693fd2b8eb94333429",
      "package": { "name": "github.com/PCRE2Project/pcre2" }

The response we get for pcre2 is that the following CVEs may affect us (please ignore the Erlang << and other stuff, the strings are the important parts

#{<<"results">> =>
      [...
       #{<<"vulns">> =>  ### PCRE2
             [#{<<"id">> => <<"CVE-2016-3191">>,
                <<"modified">> => <<"2026-04-01T23:41:22.026340Z">>},
              #{<<"id">> => <<"CVE-2017-7186">>,
                <<"modified">> => <<"2026-04-02T00:14:08.040982Z">>}]},
       #{},#{},#{},#{}]}

However, the description for CVE-2016-3191 says that one may be affected if using pcre2 previous to 10.22. The commit we submit is for pcre2 version 10.47, so I am wondering if we are not submitting correctly the information, or if OSV is incorrectly doing the range analysis scanning and reporting.

Thanks for any input.

Metadata

Metadata

Assignees

Labels

bugSomething isn't working

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions