Skip to content

Commit 23001d2

Browse files
committed
Migrate debian importer to importer-improver model
Signed-off-by: Tushar Goel <tushar.goel.dav@gmail.com>
1 parent f563c64 commit 23001d2

File tree

11 files changed

+951
-138
lines changed

11 files changed

+951
-138
lines changed

requirements.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -107,7 +107,7 @@ toml==0.10.2
107107
tomli==2.0.1
108108
traitlets==5.1.1
109109
typing_extensions==4.1.1
110-
univers==30.4.0
110+
univers==30.5.1
111111
urllib3==1.26.9
112112
wcwidth==0.2.5
113113
websocket-client==0.59.0

vulnerabilities/importer.py

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,9 @@ def get_fixed_purl(self):
150150
return fixed_purl
151151

152152
@classmethod
153-
def merge(cls, affected_packages: Iterable):
153+
def merge(
154+
cls, affected_packages: Iterable
155+
) -> Tuple[PackageURL, List[VersionRange], List[Version]]:
154156
"""
155157
Return a tuple with all attributes of AffectedPackage as a set
156158
for all values in the given iterable of AffectedPackage

vulnerabilities/importers/__init__.py

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -20,6 +20,7 @@
2020
# VulnerableCode is a free software code scanning tool from nexB Inc. and others.
2121
# Visit https://github.com/nexB/vulnerablecode/ for support and download.
2222
from vulnerabilities.importers import alpine_linux
23+
from vulnerabilities.importers import debian
2324
from vulnerabilities.importers import github
2425
from vulnerabilities.importers import nginx
2526
from vulnerabilities.importers import nvd
@@ -31,6 +32,7 @@
3132
github.GitHubAPIImporter,
3233
nvd.NVDImporter,
3334
openssl.OpensslImporter,
35+
debian.DebianImporter,
3436
]
3537

3638
IMPORTERS_REGISTRY = {x.qualified_name: x for x in IMPORTERS_REGISTRY}

vulnerabilities/importers/debian.py

Lines changed: 121 additions & 52 deletions
Original file line numberDiff line numberDiff line change
@@ -21,115 +21,184 @@
2121
# VulnerableCode is a free software tool from nexB Inc. and others.
2222
# Visit https://github.com/nexB/vulnerablecode/ for support and download.
2323

24-
import dataclasses
24+
import logging
2525
from typing import Any
26+
from typing import Iterable
2627
from typing import List
2728
from typing import Mapping
28-
from typing import Set
2929

3030
import requests
31-
from dateutil import parser as dateparser
31+
from django.db.models.query import QuerySet
3232
from packageurl import PackageURL
33+
from univers.version_range import DebianVersionRange
34+
from univers.versions import DebianVersion
3335

36+
from vulnerabilities.helpers import AffectedPackage as LegacyAffectedPackage
37+
from vulnerabilities.helpers import get_item
3438
from vulnerabilities.helpers import nearest_patched_package
3539
from vulnerabilities.importer import AdvisoryData
40+
from vulnerabilities.importer import AffectedPackage
3641
from vulnerabilities.importer import Importer
3742
from vulnerabilities.importer import Reference
43+
from vulnerabilities.importer import UnMergeablePackageError
44+
from vulnerabilities.improver import MAX_CONFIDENCE
45+
from vulnerabilities.improver import Improver
46+
from vulnerabilities.improver import Inference
47+
from vulnerabilities.models import Advisory
3848

49+
logger = logging.getLogger(__name__)
3950

40-
class DebianImporter(Importer):
41-
def __enter__(self):
42-
if self.response_is_new():
43-
self._api_response = self._fetch()
51+
IGNORABLE_VERSIONS = {"3.8.20-4."}
4452

45-
else:
46-
self._api_response = {}
4753

48-
def updated_advisories(self) -> Set[AdvisoryData]:
49-
advisories = []
54+
class DebianImporter(Importer):
5055

51-
for pkg_name, records in self._api_response.items():
52-
advisories.extend(self._parse(pkg_name, records))
56+
spdx_license_expression = "MIT"
57+
license_url = "https://www.debian.org/license"
5358

54-
return self.batch_advisories(advisories)
59+
api_url = "https://security-tracker.debian.org/tracker/data/json"
5560

56-
def _fetch(self) -> Mapping[str, Any]:
57-
return requests.get(self.config.debian_tracker_url).json()
61+
def get_response(self):
62+
return requests.get(self.api_url).json()
5863

59-
def _parse(self, pkg_name: str, records: Mapping[str, Any]) -> List[AdvisoryData]:
60-
advisories = []
61-
ignored_versions = {"3.8.20-4."}
64+
def advisory_data(self) -> Iterable[AdvisoryData]:
65+
response = self.get_response()
66+
for pkg_name, records in response.items():
67+
yield from self.parse(pkg_name, records)
6268

69+
def parse(
70+
self, pkg_name: str, records: Mapping[str, Any], ignored_versions=IGNORABLE_VERSIONS
71+
) -> Iterable[AdvisoryData]:
6372
for cve_id, record in records.items():
64-
impacted_purls, resolved_purls = [], []
73+
affected_versions, fixed_versions = [], []
6574
if not cve_id.startswith("CVE"):
75+
logger.error(f"Invalid CVE ID: {cve_id} in {record} in package {pkg_name}")
6676
continue
6777

6878
# vulnerabilities starting with something else may not be public yet
6979
# see for instance https://web.archive.org/web/20201215213725/https://security-tracker.debian.org/tracker/TEMP-0000000-A2EB44
7080
# TODO: this would need to be revisited though to ensure we are not missing out on anything
7181

7282
for release_name, release_record in record["releases"].items():
73-
if not release_record.get("repositories", {}).get(release_name):
74-
continue
83+
version = get_item(release_record, "repositories", release_name)
7584

76-
version = release_record["repositories"][release_name]
85+
if not version:
86+
logger.error(
87+
f"Version not found for {release_name} in {record} in package {pkg_name}"
88+
)
89+
continue
7790

7891
if version in ignored_versions:
92+
logger.error(f"Ignoring version {version} in {record} in package {pkg_name}")
7993
continue
8094

8195
purl = PackageURL(
8296
name=pkg_name,
8397
type="deb",
8498
namespace="debian",
85-
version=version,
8699
qualifiers={"distro": release_name},
87100
)
88101

89102
if release_record.get("status", "") == "resolved":
90-
resolved_purls.append(purl)
103+
fixed_versions.append(version)
91104
else:
92-
impacted_purls.append(purl)
105+
affected_versions.append(version)
93106

94107
if (
95108
"fixed_version" in release_record
96109
and release_record["fixed_version"] not in ignored_versions
97110
):
98-
resolved_purls.append(
99-
PackageURL(
100-
name=pkg_name,
101-
type="deb",
102-
namespace="debian",
103-
version=release_record["fixed_version"],
104-
qualifiers={"distro": release_name},
105-
)
106-
)
111+
fixed_versions.append(release_record["fixed_version"])
107112

108113
references = []
109114
debianbug = record.get("debianbug")
110115
if debianbug:
111116
bug_url = f"https://bugs.debian.org/cgi-bin/bugreport.cgi?bug={debianbug}"
112-
references.append(Reference(url=bug_url, reference_id=debianbug))
113-
advisories.append(
114-
AdvisoryData(
115-
vulnerability_id=cve_id,
116-
affected_packages=nearest_patched_package(impacted_purls, resolved_purls),
117-
summary=record.get("description", ""),
118-
references=references,
117+
references.append(Reference(url=bug_url, reference_id=str(debianbug)))
118+
affected_versions = list(dict.fromkeys(affected_versions))
119+
fixed_versions = list(dict.fromkeys(fixed_versions))
120+
affected_version_range = (
121+
DebianVersionRange.from_versions(affected_versions) if affected_versions else None
122+
)
123+
affected_packages = []
124+
for fixed_version in fixed_versions:
125+
affected_packages.append(
126+
AffectedPackage(
127+
package=purl,
128+
affected_version_range=affected_version_range,
129+
fixed_version=DebianVersion(fixed_version),
130+
)
119131
)
132+
yield AdvisoryData(
133+
aliases=[cve_id],
134+
summary=record.get("description", ""),
135+
affected_packages=affected_packages,
136+
references=references,
120137
)
121138

122-
return advisories
123139

124-
def response_is_new(self):
140+
class DebianBasicImprover(Improver):
141+
@property
142+
def interesting_advisories(self) -> QuerySet:
143+
return Advisory.objects.filter(created_by=DebianImporter.qualified_name)
144+
145+
def get_inferences(self, advisory_data: AdvisoryData) -> Iterable[Inference]:
125146
"""
126-
Return True if a request response is for new data likely changed or
127-
updated since we last checked.
147+
Yield Inferences for the given advisory data
128148
"""
129-
head = requests.head(self.config.debian_tracker_url)
130-
date_str = head.headers.get("last-modified")
131-
last_modified_date = dateparser.parse(date_str)
132-
if self.config.last_run_date:
133-
return self.config.last_run_date < last_modified_date
149+
if not advisory_data.affected_packages:
150+
return
151+
try:
152+
purl, affected_version_ranges, fixed_versions = AffectedPackage.merge(
153+
advisory_data.affected_packages
154+
)
155+
except UnMergeablePackageError:
156+
logger.error(f"Cannot merge with different purls {advisory_data.affected_packages!r}")
157+
return iter([])
158+
159+
pkg_type = purl.type
160+
pkg_namespace = purl.namespace
161+
pkg_name = purl.name
162+
fixed_purls = [
163+
PackageURL(type=pkg_type, namespace=pkg_namespace, name=pkg_name, version=str(version))
164+
for version in fixed_versions
165+
]
166+
if not affected_version_ranges:
167+
for fixed_purl in fixed_purls:
168+
yield Inference.from_advisory_data(
169+
advisory_data,
170+
confidence=MAX_CONFIDENCE, # We are getting all valid versions to get this inference
171+
affected_purls=[],
172+
fixed_purl=fixed_purl,
173+
)
174+
else:
175+
aff_versions = set()
176+
for affected_version_range in affected_version_ranges:
177+
for constraint in affected_version_range.constraints:
178+
aff_versions.add(constraint.version.string)
179+
affected_purls = [
180+
PackageURL(type=pkg_type, namespace=pkg_namespace, name=pkg_name, version=version)
181+
for version in aff_versions
182+
]
183+
affected_packages: List[LegacyAffectedPackage] = nearest_patched_package(
184+
vulnerable_packages=affected_purls, resolved_packages=fixed_purls
185+
)
186+
187+
unique_patched_packages_with_affected_packages = {}
188+
for package in affected_packages:
189+
if package.patched_package not in unique_patched_packages_with_affected_packages:
190+
unique_patched_packages_with_affected_packages[package.patched_package] = []
191+
unique_patched_packages_with_affected_packages[package.patched_package].append(
192+
package.vulnerable_package
193+
)
134194

135-
return True
195+
for (
196+
fixed_package,
197+
affected_packages,
198+
) in unique_patched_packages_with_affected_packages.items():
199+
yield Inference.from_advisory_data(
200+
advisory_data,
201+
confidence=MAX_CONFIDENCE, # We are getting all valid versions to get this inference
202+
affected_purls=affected_packages,
203+
fixed_purl=fixed_package,
204+
)

vulnerabilities/improvers/__init__.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -28,6 +28,7 @@
2828
default.DefaultImprover,
2929
importers.nginx.NginxBasicImprover,
3030
importers.github.GitHubBasicImprover,
31+
importers.debian.DebianBasicImprover,
3132
]
3233

3334
IMPROVERS_REGISTRY = {x.qualified_name: x for x in IMPROVERS_REGISTRY}

vulnerabilities/templates/vulnerabilities.html

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ <h1 class="title">
3636
</tr>
3737
{% for vulnerability in vulnerabilities %}
3838
<tr>
39-
<td><a href="{% url 'vulnerability_view' vulnerability.pk %}">{{vulnerability.vulcoid}}</a></td>
39+
<td><a href="{% url 'vulnerability_view' vulnerability.pk %}">{{vulnerability.vulnerability_id}}</a></td>
4040
<td>{{vulnerability.vulnerable_package_count}}</td>
4141
<td>{{vulnerability.patched_package_count}}</td>
4242
</tr>

vulnerabilities/tests/conftest.py

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -46,7 +46,6 @@ def no_rmtree(monkeypatch):
4646
"test_archlinux.py",
4747
"test_data_source.py",
4848
"test_debian_oval.py",
49-
"test_debian.py",
5049
"test_elixir_security.py",
5150
"test_gentoo.py",
5251
"test_importer_yielder.py",

0 commit comments

Comments
 (0)