-
Notifications
You must be signed in to change notification settings - Fork 343
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GHSA-mjmj-j48q-9wg2 is triggering for snakeyaml-engine but CVE is for just "snakeyaml" #1720
Comments
I believe this repository uses Dependency Graph's submissions API. After their CI runs on actions, it appears they are submitting the full dependency tree to Dependency Graph. The behavior we're seeing is consistent with that submission including a vulnerable version of Looking a little deeper, their dependency insights page does indeed show a dependency on |
This looks like a problem with the snapshot detector in use - there are a couple other similar tickets in play. Snapshot submissions are assumed resolved by the submitter, we don't normally validate against the same package mappings and metadata we do for manifest based deps. Last time this came up, I validated the snapshot submission was picking up the wrong mapping here, but as you can see in the manifest, the right There's been some recent work to integrate snapshot and static-manifest data in repo insights that may be in play here? cc @juxtin |
|
Thanks for the thorough explanation, @cnagadya! To confirm, the issue was that |
For some reason the package specification
org.yaml:snakeyaml
is matchingorg.snakeyaml:snakeyaml-engine
which is a completely different codebase.advisory-database/advisories/github-reviewed/2022/12/GHSA-mjmj-j48q-9wg2/GHSA-mjmj-j48q-9wg2.json
Line 21 in 6e5f741
https://github.com/common-workflow-language/cwljava/blob/63e794f42ed28a03a9bb5429b8e503edb320138c/pom.xml#L99
The text was updated successfully, but these errors were encountered: