Skip to content

Conversation

@Yan-Yan98
Copy link

Linux kernel scanning support
Add code extractor and tests for Linux kernel signature
generation.
Expand git_commit class to support fetching kernel sources.
Using the offline scanner and created signatures, one can
scan the kernel source tree.

Support for malformed cve files
In order to support osv.dev as vulnerability file source,
fix urls are added from the "References" field where the
vulnerability file does not offer this information in the
"Affected" OSV entry.

Fail_on_missing_field flag
Add flag "fail_on_missing_field" that controls behaviour
when encountering malformed vulnerabilities.
If set to false, the error is logged but does not abort the run.
This is helpful when running the signature generator for
many cves where we do not want to loose all progress.

Other small improvements (typo, more logs, memore usage).

@google-cla
Copy link

google-cla bot commented Dec 17, 2025

Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

View this failed invocation of the CLA check for more information.

For the most up to date status, view the checks section at the bottom of the pull request.

Add code extractor and tests for Linux kernel signature
generation.
Expand git_commit class to support fetching kernel sources.
Using the offline scanner and created signatures, one can
scan the kernel source tree.
@Yan-Yan98 Yan-Yan98 force-pushed the adapt-for-linux-upstream branch from 1c37c41 to 64a0432 Compare December 18, 2025 00:16
@doryiii doryiii self-assigned this Dec 18, 2025
@Yan-Yan98
Copy link
Author

Regarding the failing check: I requested access to our company internal Google CLA group. I will rerun the check once I got an answer regarding my request.

In order to support osv.dev as vulnerability file source,
fix urls are added from the "References" field where the
vulnerability file does not offer this information in the
"Affected" OSV entry.
Add flag "fail_on_missing_field" that controls behaviour
when encountering malformed vulnerabilities.
If set to false, the error is logged but does not abort the run.
This is helpful when running the signature generator for
many CVEs where we do not want to lose all progress.

Other small improvements (typo, more logs, memory usage).
@Yan-Yan98 Yan-Yan98 force-pushed the adapt-for-linux-upstream branch from 64a0432 to 2631611 Compare January 14, 2026 09:36
@doryiii
Copy link
Collaborator

doryiii commented Jan 16, 2026

Thanks. I'm taking care of some family emergency, but will take a look right when I get back.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants