|
21 | 21 | # VulnerableCode is a free software tool from nexB Inc. and others. |
22 | 22 | # Visit https://github.com/nexB/vulnerablecode/ for support and download. |
23 | 23 |
|
24 | | -import dataclasses |
| 24 | +import logging |
25 | 25 | from typing import Any |
| 26 | +from typing import Iterable |
26 | 27 | from typing import List |
27 | 28 | from typing import Mapping |
28 | | -from typing import Set |
29 | 29 |
|
30 | 30 | import requests |
31 | | -from dateutil import parser as dateparser |
| 31 | +from django.db.models.query import QuerySet |
32 | 32 | from packageurl import PackageURL |
| 33 | +from univers.version_range import DebianVersionRange |
| 34 | +from univers.versions import DebianVersion |
33 | 35 |
|
| 36 | +from vulnerabilities.helpers import AffectedPackage as LegacyAffectedPackage |
| 37 | +from vulnerabilities.helpers import dedupe |
| 38 | +from vulnerabilities.helpers import get_affected_packages_by_patched_package |
| 39 | +from vulnerabilities.helpers import get_item |
34 | 40 | from vulnerabilities.helpers import nearest_patched_package |
35 | 41 | from vulnerabilities.importer import AdvisoryData |
| 42 | +from vulnerabilities.importer import AffectedPackage |
36 | 43 | from vulnerabilities.importer import Importer |
37 | 44 | from vulnerabilities.importer import Reference |
| 45 | +from vulnerabilities.importer import UnMergeablePackageError |
| 46 | +from vulnerabilities.improver import MAX_CONFIDENCE |
| 47 | +from vulnerabilities.improver import Improver |
| 48 | +from vulnerabilities.improver import Inference |
| 49 | +from vulnerabilities.models import Advisory |
38 | 50 |
|
| 51 | +logger = logging.getLogger(__name__) |
39 | 52 |
|
40 | | -class DebianImporter(Importer): |
41 | | - def __enter__(self): |
42 | | - if self.response_is_new(): |
43 | | - self._api_response = self._fetch() |
44 | | - |
45 | | - else: |
46 | | - self._api_response = {} |
47 | | - |
48 | | - def updated_advisories(self) -> Set[AdvisoryData]: |
49 | | - advisories = [] |
50 | | - |
51 | | - for pkg_name, records in self._api_response.items(): |
52 | | - advisories.extend(self._parse(pkg_name, records)) |
53 | | - |
54 | | - return self.batch_advisories(advisories) |
55 | | - |
56 | | - def _fetch(self) -> Mapping[str, Any]: |
57 | | - return requests.get(self.config.debian_tracker_url).json() |
58 | 53 |
|
59 | | - def _parse(self, pkg_name: str, records: Mapping[str, Any]) -> List[AdvisoryData]: |
60 | | - advisories = [] |
61 | | - ignored_versions = {"3.8.20-4."} |
| 54 | +class DebianImporter(Importer): |
62 | 55 |
|
| 56 | + spdx_license_expression = "MIT" |
| 57 | + license_url = "https://www.debian.org/license" |
| 58 | + notice = """ |
| 59 | + From: Tushar Goel <tgoel@nexb.com> |
| 60 | + Date: Thu, May 12, 2022 at 11:42 PM +00:00 |
| 61 | + Subject: Usage of Debian Security Data in VulnerableCode |
| 62 | + To: <team@security.debian.org> |
| 63 | +
|
| 64 | + Hey, |
| 65 | +
|
| 66 | + We would like to integrate the debian security data in vulnerablecode |
| 67 | + [1][2] which is a FOSS db of FOSS vulnerability data. We were not able |
| 68 | + to know under which license the debian security data comes. We would |
| 69 | + be grateful to have your acknowledgement over usage of the debian |
| 70 | + security data in vulnerablecode and have some kind of licensing |
| 71 | + declaration from your side. |
| 72 | +
|
| 73 | + [1] - https://github.com/nexB/vulnerablecode |
| 74 | + [2] - https://github.com/nexB/vulnerablecode/pull/723 |
| 75 | + """ |
| 76 | + |
| 77 | + api_url = "https://security-tracker.debian.org/tracker/data/json" |
| 78 | + |
| 79 | + def get_response(self): |
| 80 | + response = requests.get(self.api_url) |
| 81 | + if response.status_code == 200: |
| 82 | + return response.json() |
| 83 | + raise Exception( |
| 84 | + f"Failed to fetch data from {self.api_url!r} with status code: {response.status_code!r}" |
| 85 | + ) |
| 86 | + |
| 87 | + def advisory_data(self) -> Iterable[AdvisoryData]: |
| 88 | + response = self.get_response() |
| 89 | + for pkg_name, records in response.items(): |
| 90 | + yield from self.parse(pkg_name, records) |
| 91 | + |
| 92 | + def parse(self, pkg_name: str, records: Mapping[str, Any]) -> Iterable[AdvisoryData]: |
63 | 93 | for cve_id, record in records.items(): |
64 | | - impacted_purls, resolved_purls = [], [] |
| 94 | + affected_versions = [] |
| 95 | + fixed_versions = [] |
65 | 96 | if not cve_id.startswith("CVE"): |
| 97 | + logger.error(f"Invalid CVE ID: {cve_id} in {record} in package {pkg_name}") |
66 | 98 | continue |
67 | 99 |
|
68 | 100 | # vulnerabilities starting with something else may not be public yet |
69 | 101 | # see for instance https://web.archive.org/web/20201215213725/https://security-tracker.debian.org/tracker/TEMP-0000000-A2EB44 |
70 | 102 | # TODO: this would need to be revisited though to ensure we are not missing out on anything |
| 103 | + # https://github.com/nexB/vulnerablecode/issues/730 |
71 | 104 |
|
72 | | - for release_name, release_record in record["releases"].items(): |
73 | | - if not release_record.get("repositories", {}).get(release_name): |
74 | | - continue |
75 | | - |
76 | | - version = release_record["repositories"][release_name] |
| 105 | + releases = record["releases"].items() |
| 106 | + for release_name, release_record in releases: |
| 107 | + version = get_item(release_record, "repositories", release_name) |
77 | 108 |
|
78 | | - if version in ignored_versions: |
| 109 | + if not version: |
| 110 | + logger.error( |
| 111 | + f"Version not found for {release_name} in {record} in package {pkg_name}" |
| 112 | + ) |
79 | 113 | continue |
80 | 114 |
|
81 | 115 | purl = PackageURL( |
82 | 116 | name=pkg_name, |
83 | 117 | type="deb", |
84 | 118 | namespace="debian", |
85 | | - version=version, |
86 | 119 | qualifiers={"distro": release_name}, |
87 | 120 | ) |
88 | 121 |
|
89 | 122 | if release_record.get("status", "") == "resolved": |
90 | | - resolved_purls.append(purl) |
| 123 | + fixed_versions.append(version) |
91 | 124 | else: |
92 | | - impacted_purls.append(purl) |
93 | | - |
94 | | - if ( |
95 | | - "fixed_version" in release_record |
96 | | - and release_record["fixed_version"] not in ignored_versions |
97 | | - ): |
98 | | - resolved_purls.append( |
99 | | - PackageURL( |
100 | | - name=pkg_name, |
101 | | - type="deb", |
102 | | - namespace="debian", |
103 | | - version=release_record["fixed_version"], |
104 | | - qualifiers={"distro": release_name}, |
105 | | - ) |
106 | | - ) |
| 125 | + affected_versions.append(version) |
| 126 | + |
| 127 | + if "fixed_version" in release_record: |
| 128 | + fixed_versions.append(release_record["fixed_version"]) |
107 | 129 |
|
108 | 130 | references = [] |
109 | 131 | debianbug = record.get("debianbug") |
110 | 132 | if debianbug: |
111 | 133 | bug_url = f"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug={debianbug}" |
112 | | - references.append(Reference(url=bug_url, reference_id=debianbug)) |
113 | | - advisories.append( |
114 | | - AdvisoryData( |
115 | | - vulnerability_id=cve_id, |
116 | | - affected_packages=nearest_patched_package(impacted_purls, resolved_purls), |
117 | | - summary=record.get("description", ""), |
118 | | - references=references, |
| 134 | + references.append(Reference(url=bug_url, reference_id=str(debianbug))) |
| 135 | + affected_versions = dedupe(affected_versions) |
| 136 | + fixed_versions = dedupe(fixed_versions) |
| 137 | + if affected_versions: |
| 138 | + affected_version_range = DebianVersionRange.from_versions(affected_versions) |
| 139 | + else: |
| 140 | + affected_version_range = None |
| 141 | + affected_packages = [] |
| 142 | + for fixed_version in fixed_versions: |
| 143 | + affected_packages.append( |
| 144 | + AffectedPackage( |
| 145 | + package=purl, |
| 146 | + affected_version_range=affected_version_range, |
| 147 | + fixed_version=DebianVersion(fixed_version), |
| 148 | + ) |
119 | 149 | ) |
| 150 | + yield AdvisoryData( |
| 151 | + aliases=[cve_id], |
| 152 | + summary=record.get("description", ""), |
| 153 | + affected_packages=affected_packages, |
| 154 | + references=references, |
120 | 155 | ) |
121 | 156 |
|
122 | | - return advisories |
123 | 157 |
|
124 | | - def response_is_new(self): |
| 158 | +class DebianBasicImprover(Improver): |
| 159 | + @property |
| 160 | + def interesting_advisories(self) -> QuerySet: |
| 161 | + return Advisory.objects.filter(created_by=DebianImporter.qualified_name) |
| 162 | + |
| 163 | + def get_inferences(self, advisory_data: AdvisoryData) -> Iterable[Inference]: |
125 | 164 | """ |
126 | | - Return True if a request response is for new data likely changed or |
127 | | - updated since we last checked. |
| 165 | + Yield Inferences for the given advisory data |
128 | 166 | """ |
129 | | - head = requests.head(self.config.debian_tracker_url) |
130 | | - date_str = head.headers.get("last-modified") |
131 | | - last_modified_date = dateparser.parse(date_str) |
132 | | - if self.config.last_run_date: |
133 | | - return self.config.last_run_date < last_modified_date |
| 167 | + if not advisory_data.affected_packages: |
| 168 | + return |
| 169 | + try: |
| 170 | + purl, affected_version_ranges, fixed_versions = AffectedPackage.merge( |
| 171 | + advisory_data.affected_packages |
| 172 | + ) |
| 173 | + except UnMergeablePackageError: |
| 174 | + logger.error(f"Cannot merge with different purls {advisory_data.affected_packages!r}") |
| 175 | + return |
| 176 | + |
| 177 | + pkg_type = purl.type |
| 178 | + pkg_namespace = purl.namespace |
| 179 | + pkg_name = purl.name |
| 180 | + pkg_qualifiers = purl.qualifiers |
| 181 | + fixed_purls = [ |
| 182 | + PackageURL( |
| 183 | + type=pkg_type, |
| 184 | + namespace=pkg_namespace, |
| 185 | + name=pkg_name, |
| 186 | + version=str(version), |
| 187 | + qualifiers=pkg_qualifiers, |
| 188 | + ) |
| 189 | + for version in fixed_versions |
| 190 | + ] |
| 191 | + if not affected_version_ranges: |
| 192 | + for fixed_purl in fixed_purls: |
| 193 | + yield Inference.from_advisory_data( |
| 194 | + advisory_data, # We are getting all valid versions to get this inference |
| 195 | + confidence=MAX_CONFIDENCE, |
| 196 | + affected_purls=[], |
| 197 | + fixed_purl=fixed_purl, |
| 198 | + ) |
| 199 | + else: |
| 200 | + aff_versions = set() |
| 201 | + for affected_version_range in affected_version_ranges: |
| 202 | + for constraint in affected_version_range.constraints: |
| 203 | + aff_versions.add(constraint.version.string) |
| 204 | + affected_purls = [ |
| 205 | + PackageURL( |
| 206 | + type=pkg_type, |
| 207 | + namespace=pkg_namespace, |
| 208 | + name=pkg_name, |
| 209 | + version=version, |
| 210 | + qualifiers=pkg_qualifiers, |
| 211 | + ) |
| 212 | + for version in aff_versions |
| 213 | + ] |
| 214 | + affected_packages: List[LegacyAffectedPackage] = nearest_patched_package( |
| 215 | + vulnerable_packages=affected_purls, resolved_packages=fixed_purls |
| 216 | + ) |
134 | 217 |
|
135 | | - return True |
| 218 | + for (fixed_package, affected_packages,) in get_affected_packages_by_patched_package( |
| 219 | + affected_packages=affected_packages |
| 220 | + ).items(): |
| 221 | + yield Inference.from_advisory_data( |
| 222 | + advisory_data, |
| 223 | + confidence=MAX_CONFIDENCE, # We are getting all valid versions to get this inference |
| 224 | + affected_purls=affected_packages, |
| 225 | + fixed_purl=fixed_package, |
| 226 | + ) |
0 commit comments