|
21 | 21 | # VulnerableCode is a free software tool from nexB Inc. and others. |
22 | 22 | # Visit https://github.com/nexB/vulnerablecode/ for support and download. |
23 | 23 |
|
24 | | -import dataclasses |
| 24 | +import logging |
25 | 25 | from typing import Any |
| 26 | +from typing import Iterable |
26 | 27 | from typing import List |
27 | 28 | from typing import Mapping |
28 | | -from typing import Set |
29 | 29 |
|
30 | 30 | import requests |
31 | | -from dateutil import parser as dateparser |
| 31 | +from django.db.models.query import QuerySet |
32 | 32 | from packageurl import PackageURL |
| 33 | +from univers.version_range import DebianVersionRange |
| 34 | +from univers.versions import DebianVersion |
33 | 35 |
|
| 36 | +from vulnerabilities.helpers import AffectedPackage as LegacyAffectedPackage |
| 37 | +from vulnerabilities.helpers import get_affected_packages_by_patched_package |
| 38 | +from vulnerabilities.helpers import get_item |
34 | 39 | from vulnerabilities.helpers import nearest_patched_package |
35 | 40 | from vulnerabilities.importer import AdvisoryData |
| 41 | +from vulnerabilities.importer import AffectedPackage |
36 | 42 | from vulnerabilities.importer import Importer |
37 | 43 | from vulnerabilities.importer import Reference |
| 44 | +from vulnerabilities.importer import UnMergeablePackageError |
| 45 | +from vulnerabilities.improver import MAX_CONFIDENCE |
| 46 | +from vulnerabilities.improver import Improver |
| 47 | +from vulnerabilities.improver import Inference |
| 48 | +from vulnerabilities.models import Advisory |
38 | 49 |
|
| 50 | +logger = logging.getLogger(__name__) |
39 | 51 |
|
40 | | -class DebianImporter(Importer): |
41 | | - def __enter__(self): |
42 | | - if self.response_is_new(): |
43 | | - self._api_response = self._fetch() |
| 52 | +IGNORABLE_VERSIONS = {"3.8.20-4."} |
44 | 53 |
|
45 | | - else: |
46 | | - self._api_response = {} |
47 | 54 |
|
48 | | - def updated_advisories(self) -> Set[AdvisoryData]: |
49 | | - advisories = [] |
| 55 | +class DebianImporter(Importer): |
50 | 56 |
|
51 | | - for pkg_name, records in self._api_response.items(): |
52 | | - advisories.extend(self._parse(pkg_name, records)) |
| 57 | + spdx_license_expression = "MIT" |
| 58 | + license_url = "https://www.debian.org/license" |
53 | 59 |
|
54 | | - return self.batch_advisories(advisories) |
| 60 | + api_url = "https://security-tracker.debian.org/tracker/data/json" |
55 | 61 |
|
56 | | - def _fetch(self) -> Mapping[str, Any]: |
57 | | - return requests.get(self.config.debian_tracker_url).json() |
| 62 | + def get_response(self): |
| 63 | + response = requests.get(self.api_url) |
| 64 | + if response.status_code == 200: |
| 65 | + return response.json() |
| 66 | + raise Exception( |
| 67 | + f"Failed to fetch data from {self.api_url!r} with status code: {response.status_code!r}" |
| 68 | + ) |
58 | 69 |
|
59 | | - def _parse(self, pkg_name: str, records: Mapping[str, Any]) -> List[AdvisoryData]: |
60 | | - advisories = [] |
61 | | - ignored_versions = {"3.8.20-4."} |
| 70 | + def advisory_data(self) -> Iterable[AdvisoryData]: |
| 71 | + response = self.get_response() |
| 72 | + for pkg_name, records in response.items(): |
| 73 | + yield from self.parse(pkg_name, records) |
62 | 74 |
|
| 75 | + def parse( |
| 76 | + self, pkg_name: str, records: Mapping[str, Any], ignored_versions=IGNORABLE_VERSIONS |
| 77 | + ) -> Iterable[AdvisoryData]: |
63 | 78 | for cve_id, record in records.items(): |
64 | | - impacted_purls, resolved_purls = [], [] |
| 79 | + affected_versions, fixed_versions = [], [] |
65 | 80 | if not cve_id.startswith("CVE"): |
| 81 | + logger.error(f"Invalid CVE ID: {cve_id} in {record} in package {pkg_name}") |
66 | 82 | continue |
67 | 83 |
|
68 | 84 | # vulnerabilities starting with something else may not be public yet |
69 | 85 | # see for instance https://web.archive.org/web/20201215213725/https://security-tracker.debian.org/tracker/TEMP-0000000-A2EB44 |
70 | 86 | # TODO: this would need to be revisited though to ensure we are not missing out on anything |
71 | 87 |
|
72 | 88 | for release_name, release_record in record["releases"].items(): |
73 | | - if not release_record.get("repositories", {}).get(release_name): |
74 | | - continue |
| 89 | + version = get_item(release_record, "repositories", release_name) |
75 | 90 |
|
76 | | - version = release_record["repositories"][release_name] |
| 91 | + if not version: |
| 92 | + logger.error( |
| 93 | + f"Version not found for {release_name} in {record} in package {pkg_name}" |
| 94 | + ) |
| 95 | + continue |
77 | 96 |
|
78 | 97 | if version in ignored_versions: |
| 98 | + logger.error(f"Ignoring version {version} in {record} in package {pkg_name}") |
79 | 99 | continue |
80 | 100 |
|
81 | 101 | purl = PackageURL( |
82 | 102 | name=pkg_name, |
83 | 103 | type="deb", |
84 | 104 | namespace="debian", |
85 | | - version=version, |
86 | 105 | qualifiers={"distro": release_name}, |
87 | 106 | ) |
88 | 107 |
|
89 | 108 | if release_record.get("status", "") == "resolved": |
90 | | - resolved_purls.append(purl) |
| 109 | + fixed_versions.append(version) |
91 | 110 | else: |
92 | | - impacted_purls.append(purl) |
| 111 | + affected_versions.append(version) |
93 | 112 |
|
94 | 113 | if ( |
95 | 114 | "fixed_version" in release_record |
96 | 115 | and release_record["fixed_version"] not in ignored_versions |
97 | 116 | ): |
98 | | - resolved_purls.append( |
99 | | - PackageURL( |
100 | | - name=pkg_name, |
101 | | - type="deb", |
102 | | - namespace="debian", |
103 | | - version=release_record["fixed_version"], |
104 | | - qualifiers={"distro": release_name}, |
105 | | - ) |
106 | | - ) |
| 117 | + fixed_versions.append(release_record["fixed_version"]) |
107 | 118 |
|
108 | 119 | references = [] |
109 | 120 | debianbug = record.get("debianbug") |
110 | 121 | if debianbug: |
111 | 122 | bug_url = f"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug={debianbug}" |
112 | | - references.append(Reference(url=bug_url, reference_id=debianbug)) |
113 | | - advisories.append( |
114 | | - AdvisoryData( |
115 | | - vulnerability_id=cve_id, |
116 | | - affected_packages=nearest_patched_package(impacted_purls, resolved_purls), |
117 | | - summary=record.get("description", ""), |
118 | | - references=references, |
| 123 | + references.append(Reference(url=bug_url, reference_id=str(debianbug))) |
| 124 | + affected_versions = list(dict.fromkeys(affected_versions)) |
| 125 | + fixed_versions = list(dict.fromkeys(fixed_versions)) |
| 126 | + affected_version_range = ( |
| 127 | + DebianVersionRange.from_versions(affected_versions) if affected_versions else None |
| 128 | + ) |
| 129 | + affected_packages = [] |
| 130 | + for fixed_version in fixed_versions: |
| 131 | + affected_packages.append( |
| 132 | + AffectedPackage( |
| 133 | + package=purl, |
| 134 | + affected_version_range=affected_version_range, |
| 135 | + fixed_version=DebianVersion(fixed_version), |
| 136 | + ) |
119 | 137 | ) |
| 138 | + yield AdvisoryData( |
| 139 | + aliases=[cve_id], |
| 140 | + summary=record.get("description", ""), |
| 141 | + affected_packages=affected_packages, |
| 142 | + references=references, |
120 | 143 | ) |
121 | 144 |
|
122 | | - return advisories |
123 | 145 |
|
124 | | - def response_is_new(self): |
| 146 | +class DebianBasicImprover(Improver): |
| 147 | + @property |
| 148 | + def interesting_advisories(self) -> QuerySet: |
| 149 | + return Advisory.objects.filter(created_by=DebianImporter.qualified_name) |
| 150 | + |
| 151 | + def get_inferences(self, advisory_data: AdvisoryData) -> Iterable[Inference]: |
125 | 152 | """ |
126 | | - Return True if a request response is for new data likely changed or |
127 | | - updated since we last checked. |
| 153 | + Yield Inferences for the given advisory data |
128 | 154 | """ |
129 | | - head = requests.head(self.config.debian_tracker_url) |
130 | | - date_str = head.headers.get("last-modified") |
131 | | - last_modified_date = dateparser.parse(date_str) |
132 | | - if self.config.last_run_date: |
133 | | - return self.config.last_run_date < last_modified_date |
| 155 | + if not advisory_data.affected_packages: |
| 156 | + return iter([]) |
| 157 | + try: |
| 158 | + purl, affected_version_ranges, fixed_versions = AffectedPackage.merge( |
| 159 | + advisory_data.affected_packages |
| 160 | + ) |
| 161 | + except UnMergeablePackageError: |
| 162 | + logger.error(f"Cannot merge with different purls {advisory_data.affected_packages!r}") |
| 163 | + return iter([]) |
| 164 | + |
| 165 | + pkg_type = purl.type |
| 166 | + pkg_namespace = purl.namespace |
| 167 | + pkg_name = purl.name |
| 168 | + pkg_qualifiers = purl.qualifiers |
| 169 | + fixed_purls = [ |
| 170 | + PackageURL( |
| 171 | + type=pkg_type, |
| 172 | + namespace=pkg_namespace, |
| 173 | + name=pkg_name, |
| 174 | + version=str(version), |
| 175 | + qualifiers=pkg_qualifiers, |
| 176 | + ) |
| 177 | + for version in fixed_versions |
| 178 | + ] |
| 179 | + if not affected_version_ranges: |
| 180 | + for fixed_purl in fixed_purls: |
| 181 | + yield Inference.from_advisory_data( |
| 182 | + advisory_data, |
| 183 | + confidence=MAX_CONFIDENCE, # We are getting all valid versions to get this inference |
| 184 | + affected_purls=[], |
| 185 | + fixed_purl=fixed_purl, |
| 186 | + ) |
| 187 | + else: |
| 188 | + aff_versions = set() |
| 189 | + for affected_version_range in affected_version_ranges: |
| 190 | + for constraint in affected_version_range.constraints: |
| 191 | + aff_versions.add(constraint.version.string) |
| 192 | + affected_purls = [ |
| 193 | + PackageURL( |
| 194 | + type=pkg_type, |
| 195 | + namespace=pkg_namespace, |
| 196 | + name=pkg_name, |
| 197 | + version=version, |
| 198 | + qualifiers=pkg_qualifiers, |
| 199 | + ) |
| 200 | + for version in aff_versions |
| 201 | + ] |
| 202 | + affected_packages: List[LegacyAffectedPackage] = nearest_patched_package( |
| 203 | + vulnerable_packages=affected_purls, resolved_packages=fixed_purls |
| 204 | + ) |
134 | 205 |
|
135 | | - return True |
| 206 | + for (fixed_package, affected_packages,) in get_affected_packages_by_patched_package( |
| 207 | + affected_packages=affected_packages |
| 208 | + ).items(): |
| 209 | + yield Inference.from_advisory_data( |
| 210 | + advisory_data, |
| 211 | + confidence=MAX_CONFIDENCE, # We are getting all valid versions to get this inference |
| 212 | + affected_purls=affected_packages, |
| 213 | + fixed_purl=fixed_package, |
| 214 | + ) |
0 commit comments