summaryrefslogtreecommitdiffstats
path: root/check-external/update.sh
Commit message (Collapse)AuthorAgeFilesLines
* check-external: update: Disable fetching from Red Hat BugzillaSalvatore Bonaccorso2023-11-201-2/+4
| | | | Signed-off-by: Salvatore Bonaccorso <carnil@debian.org>
* check-external: update: Gather CVE from the Red Hat Security Data API endpointSalvatore Bonaccorso2023-11-201-3/+4
| | | | | | | | | | As the bugzilla query cannot reliably deliver CVE information anymore and the metadata export has been discontinued switch to gather the Red Hat known CVEs from the Red Hat Security Data API endpoint instread. Link: https://www.redhat.com/en/blog/future-red-hat-security-data Link: https://access.redhat.com/documentation/en-us/red_hat_security_data_api/1.0/html/red_hat_security_data_api/index Signed-off-by: Salvatore Bonaccorso <carnil@debian.org>
* Disable another discontinued data source from Red HatSalvatore Bonaccorso2023-11-091-3/+6
| | | | | | | | | | Red Hat does not provide anymore CVE metadata from Bugzilla in xml form for further parsing. Disable it now. A future update might fetch data from te alterantive new sources. Link: https://www.redhat.com/en/blog/future-red-hat-security-data Signed-off-by: Salvatore Bonaccorso <carnil@debian.org>
* external-check: Handle vendor entries with additional vendor security prefixSalvatore Bonaccorso2023-04-101-1/+1
| | | | | | | | | | | | | | | | | | | | | | Additionally to the vendored entries addressed in d8b81d2818b3 ("external-check: Handle vendor prefixed entries") some entries might be of the form "UBUNTU:Ubuntu security $CVE", and the external check update will bail out as: [...] <td>UBUNTU:Ubuntu Security CVE-2020-11935</td> UBUNTU.list contains garbage (see above), aborting Allow the expression to contain additionall an additional text beweend the vendor prefix and the CVE. Maybe we should simply match anything beween a opening HTML tag, the CVE and a closing tag, filtering out the CVE as better solution. The idea behind this change is to really poinpoint any vendor entry in the respective source-$vendor.html list. Link: https://lists.debian.org/debian-security-tracker/2023/04/msg00003.html Signed-off-by: Salvatore Bonaccorso <carnil@debian.org>
* external-check: Handle vendor prefixed entriesSalvatore Bonaccorso2020-11-181-1/+1
| | | | | | | | | | | | | | | | | | When the source-$VENDOR.html lists contain a vendor prefixed CVE entry the external check update command will bail out: [...] <td>DEBIAN:CVE-2019-1010022</td> <td>DEBIAN:CVE-2019-1010023</td> <td>DEBIAN:CVE-2019-1010024</td> <td>DEBIAN:CVE-2019-1010025</td> DEBIAN.list contains garbage (see above), aborting Allow the expression to contain a VENDOR: prefix and strip it out as well. Link: https://lists.debian.org/debian-security-tracker/2020/11/msg00014.html Signed-off-by: Salvatore Bonaccorso <carnil@debian.org>
* Remove duplicates from the mitre-based listsRaphael Geissert2016-09-141-1/+1
| | | | git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@44582 e39458fd-73e7-0310-bf30-c45bca0a0e42
* Add another bugzilla-based sourceRaphael Geissert2016-09-141-1/+4
| | | | git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@44581 e39458fd-73e7-0310-bf30-c45bca0a0e42
* bugzilla's results may contain more than one CVE per lineRaphael Geissert2016-09-141-1/+1
| | | | | | | | Use perl for easier looping and to have more readable code git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@44580 e39458fd-73e7-0310-bf30-c45bca0a0e42
* Add check for Red Hat source using Red Hat bugzillaSalvatore Bonaccorso2016-04-241-0/+6
| | | | git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@41113 e39458fd-73e7-0310-bf30-c45bca0a0e42
* One Red Hat external check discontinuedSalvatore Bonaccorso2016-04-241-9/+11
| | | | git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@41112 e39458fd-73e7-0310-bf30-c45bca0a0e42
* https for links to the GNU license list.Paul Wise2016-03-011-1/+1
| | | | git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@40100 e39458fd-73e7-0310-bf30-c45bca0a0e42
* Workaround changes done on ↵Salvatore Bonaccorso2015-10-011-1/+1
| | | | | | | | | https://www.redhat.com/security/data/cve/cve-$year.html Now not anymore a file which we can download only if it has newer timestamp, so download on every cronjob run. git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@36935 e39458fd-73e7-0310-bf30-c45bca0a0e42
* Prepare the external check scripts for the new formatRaphael Geissert2013-12-051-3/+3
| | | | git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@24591 e39458fd-73e7-0310-bf30-c45bca0a0e42
* Abort if there's garbage in the cve listsRaphael Geissert2012-04-151-0/+9
| | | | git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@18951 e39458fd-73e7-0310-bf30-c45bca0a0e42
* Correctly handle CVE ids in descriptionsRaphael Geissert2012-02-251-1/+1
| | | | git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@18540 e39458fd-73e7-0310-bf30-c45bca0a0e42
* Add support for other CVE sourcesRaphael Geissert2010-12-141-4/+18
| | | | | | | Example: ./lookup -s UBUNTU git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@15704 e39458fd-73e7-0310-bf30-c45bca0a0e42
* Add some scripts to check our CVE list against Red Hat'sRaphael Geissert2010-12-141-0/+30
Try with: cd check-external && ./update.sh && ./lookup.sh CVE-2010 git-svn-id: svn+ssh://svn.debian.org/svn/secure-testing@15701 e39458fd-73e7-0310-bf30-c45bca0a0e42

© 2014-2024 Faster IT GmbH | imprint | privacy policy