You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
# See https://docs.tuxcare.com/els-for-os/#cve-status-definition
32
27
NON_AFFECTED_STATUSES= ["Not Vulnerable"]
33
28
AFFECTED_STATUSES= ["Ignored", "Needs Triage", "In Testing", "In Progress", "In Rollout"]
34
29
FIXED_STATUSES= ["Released", "Already Fixed"]
35
30
36
31
VERSION_RANGE_BY_PURL_TYPE= {
37
-
"rpm": RpmVersionRange,
38
-
"deb": DebianVersionRange,
32
+
"rpm": RANGE_CLASS_BY_SCHEMES["rpm"],
33
+
"deb": RANGE_CLASS_BY_SCHEMES["deb"],
39
34
"apk": AlpineLinuxVersionRange,
40
-
"generic": GenericVersionRange,
35
+
"generic": RANGE_CLASS_BY_SCHEMES["generic"],
41
36
}
42
37
43
38
@@ -61,14 +56,17 @@ def fetch(self) -> None:
61
56
self._grouped=self._group_records_by_cve()
62
57
63
58
def_group_records_by_cve(self) ->dict:
59
+
"""
60
+
A single CVE can appear in multiple records across different operating systems, distributions, or package versions. This method groups all records with the same CVE together and skips entries that are invalid or marked as not affected. The result is a dictionary keyed by CVE ID, with each value containing the related records.
0 commit comments