-
-
Notifications
You must be signed in to change notification settings - Fork 596
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
different result for affected projects of aliases #2794
Comments
I think this was a design choice, at least for the first iteration of alias functionality. The current database design around doesn't lend itself very well to easily/efficiently retrieve affected projects including projects affected by aliases. |
A naiv approach would be
And I think that would be quite okay, assuming that V has only one or two aliases. p.s. dependency-track/src/main/java/org/dependencytrack/persistence/VulnerabilityQueryManager.java Line 475 in 25cf930
dependency-track/src/main/java/org/dependencytrack/persistence/VulnerabilityQueryManager.java Lines 490 to 493 in 25cf930
Why no just using Set<Project> for projects right from the start?
|
fixes DependencyTrack#2794 Signed-off-by: Ronny Perinke <23166289+sephiroth-j@users.noreply.github.com>
fixes DependencyTrack#2794 Signed-off-by: Ronny Perinke <23166289+sephiroth-j@users.noreply.github.com>
Current Behavior
If a vulnerability has an alias (e.g. CVE-2023-29197 and GHSA-wxmh-65f7-jcvw), then the backend response of
/api/v1/vulnerability/source/NVD/vuln/CVE-2023-29197/projects
andapi/v1/vulnerability/source/GITHUB/vuln/GHSA-wxmh-65f7-jcvw/projects
will not return the same projects.Steps to Reproduce
Expected Behavior
The projects affected by the alias vulnerabilities should be the same.
Dependency-Track Version
4.8.2
Dependency-Track Distribution
Container Image
Database Server
PostgreSQL
Database Server Version
No response
Browser
Google Chrome
Checklist
The text was updated successfully, but these errors were encountered: