-
Notifications
You must be signed in to change notification settings - Fork 86
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ovalutil: collect further links #1022
Comments
Raised a PR for review |
Perhaps it would be worth updating goval-parser with some fresher data for the tests? I'd be happy to make some updates if the team thinks it would be appropriate. |
Probably worth updating, feel free to update the test files and open a PR, thanks! |
@crozzy I've riased a PR to add update ubuntu data, not urgent. |
Background
Package: https://github.com/quay/claircore/blob/main/pkg/ovalutil/links.go
It would appear there is an opportunity to get further vulnerability information from the Oval files returned from ubuntu and other sources.
There is extra links that can be extracted from the
advisory.cve
href. In the current case, the only link that would be extracted here would behttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-36190
. As nodef.Advisory.Refs
exists, sadly the link in the<cve/>
element is not extracted.Example definition.
Solution
Proposed solution would be to leverage the information in the
<cve/>
element to get further links for all distros that parse an Oval XML files so long as the oval.Definition contains the CVE as an accessible field.It looks like it does support the CVE field goval-parser Advisory type with the current
Cves []Cve 'xml:"cve"'
.The text was updated successfully, but these errors were encountered: