<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>OSV Blog</title>
    <link>http://osv.dev/blog/</link>
    <description>Recent content on OSV Blog</description>
    <generator>Hugo -- gohugo.io</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 13 Jan 2026 00:00:00 +0000</lastBuildDate><atom:link href="http://osv.dev/blog/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>The Year in Review</title>
      <link>http://osv.dev/blog/posts/2025-in-review/</link>
      <pubDate>Tue, 13 Jan 2026 00:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/2025-in-review/</guid>
      <description>&lt;p&gt;2025 has been an eventful year for OSV, marked by significant expansion, infrastructure improvements, and continued community growth across all our projects.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>API Latency Improvements and Revised SLOs</title>
      <link>http://osv.dev/blog/posts/api-latency-improvements-and-revised-slos/</link>
      <pubDate>Tue, 14 Oct 2025 11:00:00 +1100</pubDate>
      
      <guid>http://osv.dev/blog/posts/api-latency-improvements-and-revised-slos/</guid>
      <description>&lt;p&gt;As more vulnerabilities are published to OSV.dev, we want to ensure our API remains fast and reliable for our users. To support this, we&amp;rsquo;ve rolled out a new database indexing strategy, resulting in API queries that are now up to 5x faster.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Supporting the upstream field in OSV</title>
      <link>http://osv.dev/blog/posts/supporting-upstream-field/</link>
      <pubDate>Wed, 23 Jul 2025 16:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/supporting-upstream-field/</guid>
      <description>Linux distributions often maintain their own advisories to announce fixes based on source CVEs and operate security trackers to monitor unfixed vulnerabilities. For example, Debian and Ubuntu use Debian Security Advisories (DSAs) and Ubuntu Security Notices (USNs), respectively. This is necessary because Linux distributions apply and backport patches, which means the impact and required fixes for a single upstream CVE can differ significantly across various distributions.
OSV.dev ingests data from various sources, which complicates Linux system scanning.</description>
    </item>
    
    <item>
      <title>OSV-Scanner v2.0.0-beta1 is ready!</title>
      <link>http://osv.dev/blog/posts/osv-scanner-v2-beta1-is-ready/</link>
      <pubDate>Wed, 29 Jan 2025 00:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/osv-scanner-v2-beta1-is-ready/</guid>
      <description>Today we’re excited to announce that the first beta of OSV-Scanner V2 is ready! The team has been hard at work in the past months to revamp OSV-Scanner under the hood (transitioning to OSV-Scalibr, which we announced earlier this month) and building several new significant features.
This beta release does not introduce any breaking CLI changes - existing OSV-Scanner can use the tool in exactly the same way. The beta period is expected to last approximately one month.</description>
    </item>
    
    <item>
      <title>The Year in Review</title>
      <link>http://osv.dev/blog/posts/2024-in-review/</link>
      <pubDate>Mon, 13 Jan 2025 04:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/2024-in-review/</guid>
      <description>&lt;p&gt;2024 has been an &lt;em&gt;even more&lt;/em&gt; eventful year for OSV.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>API Queries for More Linux Distributions</title>
      <link>http://osv.dev/blog/posts/announcing-api-queries-for-more-linux-distros/</link>
      <pubDate>Tue, 22 Oct 2024 00:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/announcing-api-queries-for-more-linux-distros/</guid>
      <description>&lt;p&gt;We&amp;rsquo;re excited to announce that OSV.dev&amp;rsquo;s API now allows you to query all our supported Linux distributions! From now on, any new Linux distribution adopting the OSV Schema will be instantly available for querying as soon as it&amp;rsquo;s imported by OSV.dev!&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>OSV&#39;s approach to data quality</title>
      <link>http://osv.dev/blog/posts/announcing-data-quality-initiatives/</link>
      <pubDate>Mon, 30 Sep 2024 09:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/announcing-data-quality-initiatives/</guid>
      <description>&lt;p&gt;OSV&amp;rsquo;s mission is to enable developers to reduce security risk arising from known
vulnerabilities in open source components they use.&lt;/p&gt;
&lt;p&gt;Part of the strategy to accomplish that mission is to provide a comprehensive,
accurate and timely database of known vulnerabilities covering both language
ecosystems and OS package distributions.&lt;/p&gt;
&lt;p&gt;Today, OSV.dev&amp;rsquo;s coverage is fast approaching 30 ecosystems, while also
importing records from almost as many disparate &amp;ldquo;&lt;a href=&#34;https://ossf.github.io/osv-schema/#id-modified-fields&#34;&gt;home databases&lt;/a&gt;&amp;rdquo;.
As this number of federated data sources continues to grow, so does the prospect
of OSV records being expressed in ways that are detrimental to them being
effectively utilized in aggregate.&lt;/p&gt;
&lt;p&gt;To ensure the accuracy and usability of OSV.dev&amp;rsquo;s data at scale we have
initiated a program of work to prevent future regression in data quality as the
ecosystem of data contributions continues to grow.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Chainguard adds OSV feed</title>
      <link>http://osv.dev/blog/posts/announcing-chainguard/</link>
      <pubDate>Tue, 02 Jul 2024 06:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/announcing-chainguard/</guid>
      <description>&lt;p&gt;Chainguard has recently started &lt;a href=&#34;http://www.chainguard.dev/unchained/chainguard-enhances-security-with-osv-advisory-feed&#34;&gt;publishing their security advisories in OSV&lt;/a&gt;, and these are now feeding into the OSV.dev database. This expands OSV.dev’s coverage of Linux distributions, by including security advisories for &lt;a href=&#34;https://www.chainguard.dev/unchained/introducing-wolfi-the-first-linux-un-distro&#34;&gt;Wolfi&lt;/a&gt;.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Announcing Transitive Dependency Support for Maven pom.xml in OSV-Scanner</title>
      <link>http://osv.dev/blog/posts/announcing-transitive-dependency-support-for-maven-pomxml-in-osv-scanner/</link>
      <pubDate>Thu, 20 Jun 2024 00:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/announcing-transitive-dependency-support-for-maven-pomxml-in-osv-scanner/</guid>
      <description>&lt;p&gt;We are excited to announce that OSV-Scanner now supports transitive dependency scanning for Maven pom.xml.&lt;/p&gt;
&lt;p&gt;This highly requested &lt;a href=&#34;https://github.com/google/osv-scanner/issues/35&#34;&gt;feature&lt;/a&gt; empowers you to detect vulnerabilities in both your direct and indirect dependencies in the Maven ecosystem, giving you a complete picture of your Maven-based project&amp;rsquo;s known vulnerable dependencies. With this feature, OSV-Scanner fixes one out of two ecosystems/formats when it comes to transitive scanning capabilities.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Supporting Debian Security Tracker data</title>
      <link>http://osv.dev/blog/posts/supporting-debian-security-tracker-data/</link>
      <pubDate>Tue, 18 Jun 2024 00:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/supporting-debian-security-tracker-data/</guid>
      <description>OSV.dev aims to be a comprehensive database for all known vulnerabilities in open source ecosystems. One of the more recent areas of focus is Linux distributions, which are important in the context of container image scanning. To enable comprehensive scanning support for Debian based container images, we&amp;rsquo;ve integrated more vulnerability data from Debian Security Tracker into our OSV database.
A sample CVE entry with Debian information.
What is Debian Security Tracker?</description>
    </item>
    
    <item>
      <title>Announcing Guided Remediation in OSV-Scanner</title>
      <link>http://osv.dev/blog/posts/announcing-guided-remediation-in-osv-scanner/</link>
      <pubDate>Tue, 02 Apr 2024 00:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/announcing-guided-remediation-in-osv-scanner/</guid>
      <description>&lt;p&gt;Addressing vulnerabilities in project dependencies can often be overwhelming for software developers. OSV-Scanner&amp;rsquo;s new &lt;a href=&#34;https://google.github.io/osv-scanner/experimental/guided-remediation/&#34;&gt;Guided Remediation feature&lt;/a&gt; aims to simplify this process by prioritizing and fixing the vulnerabilities that matter most in your projects.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>CURL joins OSV thanks to new REST API Contribution Support</title>
      <link>http://osv.dev/blog/posts/announcing-curl-via-rest/</link>
      <pubDate>Wed, 14 Feb 2024 22:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/announcing-curl-via-rest/</guid>
      <description>&lt;p&gt;As part of OSV’s strategy to be a comprehensive, accurate and timely database of known vulnerabilities, we&amp;rsquo;re excited to announce that we now support &lt;a href=&#34;https://osv.dev/list?ecosystem=GIT&amp;amp;q=curl&#34;&gt;CURL advisories in the OSV database&lt;/a&gt;, thanks to REST API contribution support. CURL has been providing vulnerability records in the OSV format for a while, but they haven’t been able to be imported until now.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>The Year in Review</title>
      <link>http://osv.dev/blog/posts/2023-in-review/</link>
      <pubDate>Mon, 11 Dec 2023 04:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/2023-in-review/</guid>
      <description>&lt;p&gt;2023 has been a &lt;em&gt;very&lt;/em&gt; eventful year for OSV.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Introducing license scanning with OSV-Scanner</title>
      <link>http://osv.dev/blog/posts/introducing-license-scanning-with-osv-scanner/</link>
      <pubDate>Tue, 05 Dec 2023 01:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/introducing-license-scanning-with-osv-scanner/</guid>
      <description>OSV-Scanner’s primary goal is to help developers match project dependencies to known vulnerabilities. But vulnerability information is not the only metric used to determine packages (and versions) to include in a project. Understanding which licenses your dependencies use can help you decide whether to include a particular package in your project. Packages can also be relicensed, which means that license checking is important not only at ingestion, but as part of long-term dependency maintenance and management.</description>
    </item>
    
    <item>
      <title>Introducing broad C/C&#43;&#43; vulnerability management support</title>
      <link>http://osv.dev/blog/posts/introducing-broad-c-c&#43;&#43;-support/</link>
      <pubDate>Mon, 06 Nov 2023 17:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/introducing-broad-c-c&#43;&#43;-support/</guid>
      <description>&lt;p&gt;OSV is committed to bringing our users comprehensive, accurate and timely open source vulnerability information. Over the last year, we’ve released a number of new features in pursuit of this goal including:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href=&#34;https://google.github.io/osv-scanner/experimental/#scanning-with-call-analysis&#34;&gt;OSV-Scanner’s call graph analysis for Go and Rust&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Adding six new ecosystems to the database&lt;/li&gt;
&lt;li&gt;&lt;a href=&#34;https://osv.dev/blog/posts/using-the-determineversion-api/&#34;&gt;The determineversion API&lt;/a&gt;, which expanded access to C/C++ vulnerabilities for OSS-Fuzz projects&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Today we are announcing that OSV advisories now include vulnerable commit ranges. &lt;strong&gt;Vulnerable commit ranges, along with the previously announced experimental determineversion API, will enable vulnerability management for software with C and C++ dependencies, which has been one of the last gaps in coverage in OSV.dev’s database. Additionally OSV-Scanner is now compatible with C and C++ projects.&lt;/strong&gt;&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Using the determineversion API to find C/C&#43;&#43; vulnerabilities</title>
      <link>http://osv.dev/blog/posts/using-the-determineversion-api/</link>
      <pubDate>Thu, 20 Jul 2023 11:00:00 +1000</pubDate>
      
      <guid>http://osv.dev/blog/posts/using-the-determineversion-api/</guid>
      <description>&lt;p&gt;With the increasing incidence of software supply chain attacks, it is more important than ever for developers to understand the known vulnerabilities in their open source dependencies, regardless of the ecosystem of origin. The determineversion API is OSV&amp;rsquo;s newest tool that will help C/C++ developers match their dependencies to known vulnerabilities.&lt;/p&gt;
&lt;p&gt;Within the C/C++ ecosystem it is difficult to match dependencies to vulnerabilities for a few reasons:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;C/C++ does not have a centralized package manager like npm or pyPI&lt;/li&gt;
&lt;li&gt;Software projects typically pull in C/C++ by submodules or vendoring&lt;/li&gt;
&lt;li&gt;Source code identifiers (e.g. git hashes) are the best way to identify libraries, but vulnerabilities are typically associated to versions, not git hashes&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;OSV has had C/C++ vulnerability data from OSS-Fuzz keyed on git hashes from day 1. However, a remaining challenge for C/C++ users is being able to accurately identify the closest upstream git hash of their C/C++ dependencies in order to make use of this vulnerability data. The OSV team is committed to bridging the gap between what C/C++ users need and the constraints of the ecosystem and the determineversion API is part of our plan for comprehensive C/C++ support.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>AlmaLinux and Rocky Linux join OSV</title>
      <link>http://osv.dev/blog/posts/almalinux-and-rocky-linux-join-osv/</link>
      <pubDate>Mon, 08 May 2023 16:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/almalinux-and-rocky-linux-join-osv/</guid>
      <description>&lt;p&gt;Two new Linux distributions have been added to the OSV database. With the addition of &lt;a href=&#34;https://almalinux.org/&#34;&gt;AlmaLinux&lt;/a&gt; and &lt;a href=&#34;https://rockylinux.org/&#34;&gt;Rocky Linux&lt;/a&gt;, the OSV database is now made up of advisories from 18 sources, including language ecosystems and Linux distributions.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Announcing OSV&#39;s Service Level Objectives</title>
      <link>http://osv.dev/blog/posts/announcing-osv-service-level-objectives/</link>
      <pubDate>Mon, 27 Mar 2023 22:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/announcing-osv-service-level-objectives/</guid>
      <description>&lt;p&gt;We are excited to announce that OSV has published our new service level objectives (SLOs).&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Automating and Scaling Vex Generation</title>
      <link>http://osv.dev/blog/posts/automating-and-scaling-vex-generation/</link>
      <pubDate>Sun, 05 Mar 2023 01:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/automating-and-scaling-vex-generation/</guid>
      <description>&lt;p&gt;If you&amp;rsquo;ve recently been in the space of vulnerability management and the discussions around the White House &lt;a href=&#34;https://bidenwhitehouse.archives.gov/briefing-room/presidential-actions/2021/05/12/executive-order-on-improving-the-nations-cybersecurity/&#34;&gt;Executive Order on Improving the Nation&amp;rsquo;s Cybersecurity (EO)&lt;/a&gt;, you&amp;rsquo;re probably familiar with concepts such as Software Bill of Materials (SBOM) and Vulnerability Exploitability eXchange (VEX).&lt;/p&gt;
&lt;p&gt;A VEX document/statement—a form of a security advisory that indicates whether a product or products are affected by a known vulnerability or vulnerabilities—provides a great starting point in prioritizing vulnerability response and automating risk evaluation of software, especially for software consumers. There has already been a lot of coverage on consuming and using VEX for vulnerability management. However, there has not been much conversation around the generation of VEX documents. For producers, the process of creating a VEX statement today is largely a manual and cost-intensive process.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Renovate adds OSV database check</title>
      <link>http://osv.dev/blog/posts/renovate_announcement/</link>
      <pubDate>Mon, 27 Feb 2023 21:00:00 +0000</pubDate>
      
      <guid>http://osv.dev/blog/posts/renovate_announcement/</guid>
      <description>&lt;p&gt;We are pleased to announce that Renovate has incorporated an OSV database check as an experimental feature.&lt;/p&gt;</description>
    </item>
    
    <item>
      <title>Welcome to the OSV blog</title>
      <link>http://osv.dev/blog/posts/welcome-to-the-osv-blog/</link>
      <pubDate>Mon, 28 Nov 2022 14:27:06 +1100</pubDate>
      
      <guid>http://osv.dev/blog/posts/welcome-to-the-osv-blog/</guid>
      <description>&lt;p&gt;We&amp;rsquo;re excited to launch our own OSV blog, where we&amp;rsquo;ll be posting project news
and technical blog posts related to vulnerability management.&lt;/p&gt;</description>
    </item>
    
  </channel>
</rss>
