fix(scanner/dpkg): Fix false-negative in Debian and Ubuntu (#1646)
* fix(scanner/dpkg): fix dpkg-query and not remove src pkgs * refactor(gost): remove unnecesary field and fix typo * refactor(detector/debian): detect using only SrcPackage
This commit is contained in:
		
							
								
								
									
										390
									
								
								gost/debian.go
									
									
									
									
									
								
							
							
						
						
									
										390
									
								
								gost/debian.go
									
									
									
									
									
								
							@@ -5,8 +5,12 @@ package gost
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"encoding/json"
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"strconv"
 | 
			
		||||
	"strings"
 | 
			
		||||
 | 
			
		||||
	debver "github.com/knqyf263/go-deb-version"
 | 
			
		||||
	"golang.org/x/exp/maps"
 | 
			
		||||
	"golang.org/x/xerrors"
 | 
			
		||||
 | 
			
		||||
	"github.com/future-architect/vuls/logging"
 | 
			
		||||
@@ -20,19 +24,16 @@ type Debian struct {
 | 
			
		||||
	Base
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type packCves struct {
 | 
			
		||||
	packName  string
 | 
			
		||||
	isSrcPack bool
 | 
			
		||||
	cves      []models.CveContent
 | 
			
		||||
	fixes     models.PackageFixStatuses
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (deb Debian) supported(major string) bool {
 | 
			
		||||
	_, ok := map[string]string{
 | 
			
		||||
		"7":  "wheezy",
 | 
			
		||||
		"8":  "jessie",
 | 
			
		||||
		"9":  "stretch",
 | 
			
		||||
		"10": "buster",
 | 
			
		||||
		"11": "bullseye",
 | 
			
		||||
		// "12": "bookworm",
 | 
			
		||||
		// "13": "trixie",
 | 
			
		||||
		// "14": "forky",
 | 
			
		||||
	}[major]
 | 
			
		||||
	return ok
 | 
			
		||||
}
 | 
			
		||||
@@ -45,197 +46,218 @@ func (deb Debian) DetectCVEs(r *models.ScanResult, _ bool) (nCVEs int, err error
 | 
			
		||||
		return 0, nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	// Add linux and set the version of running kernel to search Gost.
 | 
			
		||||
	if r.Container.ContainerID == "" {
 | 
			
		||||
		if r.RunningKernel.Version != "" {
 | 
			
		||||
			newVer := ""
 | 
			
		||||
			if p, ok := r.Packages["linux-image-"+r.RunningKernel.Release]; ok {
 | 
			
		||||
				newVer = p.NewVersion
 | 
			
		||||
			}
 | 
			
		||||
			r.Packages["linux"] = models.Package{
 | 
			
		||||
				Name:       "linux",
 | 
			
		||||
				Version:    r.RunningKernel.Version,
 | 
			
		||||
				NewVersion: newVer,
 | 
			
		||||
			}
 | 
			
		||||
		} else {
 | 
			
		||||
			logging.Log.Warnf("Since the exact kernel version is not available, the vulnerability in the linux package is not detected.")
 | 
			
		||||
		if r.RunningKernel.Release == "" {
 | 
			
		||||
			logging.Log.Warnf("Since the exact kernel release is not available, the vulnerability in the kernel package is not detected.")
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var stashLinuxPackage models.Package
 | 
			
		||||
	if linux, ok := r.Packages["linux"]; ok {
 | 
			
		||||
		stashLinuxPackage = linux
 | 
			
		||||
	}
 | 
			
		||||
	nFixedCVEs, err := deb.detectCVEsWithFixState(r, "resolved")
 | 
			
		||||
	fixedCVEs, err := deb.detectCVEsWithFixState(r, true)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return 0, xerrors.Errorf("Failed to detect fixed CVEs. err: %w", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if stashLinuxPackage.Name != "" {
 | 
			
		||||
		r.Packages["linux"] = stashLinuxPackage
 | 
			
		||||
	}
 | 
			
		||||
	nUnfixedCVEs, err := deb.detectCVEsWithFixState(r, "open")
 | 
			
		||||
	unfixedCVEs, err := deb.detectCVEsWithFixState(r, false)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return 0, xerrors.Errorf("Failed to detect unfixed CVEs. err: %w", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return (nFixedCVEs + nUnfixedCVEs), nil
 | 
			
		||||
	return len(unique(append(fixedCVEs, unfixedCVEs...))), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (deb Debian) detectCVEsWithFixState(r *models.ScanResult, fixStatus string) (nCVEs int, err error) {
 | 
			
		||||
	if fixStatus != "resolved" && fixStatus != "open" {
 | 
			
		||||
		return 0, xerrors.Errorf(`Failed to detectCVEsWithFixState. fixStatus is not allowed except "open" and "resolved"(actual: fixStatus -> %s).`, fixStatus)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	packCvesList := []packCves{}
 | 
			
		||||
func (deb Debian) detectCVEsWithFixState(r *models.ScanResult, fixed bool) ([]string, error) {
 | 
			
		||||
	detects := map[string]cveContent{}
 | 
			
		||||
	if deb.driver == nil {
 | 
			
		||||
		url, err := util.URLPathJoin(deb.baseURL, "debian", major(r.Release), "pkgs")
 | 
			
		||||
		urlPrefix, err := util.URLPathJoin(deb.baseURL, "debian", major(r.Release), "pkgs")
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return 0, xerrors.Errorf("Failed to join URLPath. err: %w", err)
 | 
			
		||||
			return nil, xerrors.Errorf("Failed to join URLPath. err: %w", err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		s := "unfixed-cves"
 | 
			
		||||
		if s == "resolved" {
 | 
			
		||||
			s = "fixed-cves"
 | 
			
		||||
		s := "fixed-cves"
 | 
			
		||||
		if !fixed {
 | 
			
		||||
			s = "unfixed-cves"
 | 
			
		||||
		}
 | 
			
		||||
		responses, err := getCvesWithFixStateViaHTTP(r, url, s)
 | 
			
		||||
		responses, err := getCvesWithFixStateViaHTTP(r, urlPrefix, s)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return 0, xerrors.Errorf("Failed to get CVEs via HTTP. err: %w", err)
 | 
			
		||||
			return nil, xerrors.Errorf("Failed to get CVEs via HTTP. err: %w", err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		for _, res := range responses {
 | 
			
		||||
			debCves := map[string]gostmodels.DebianCVE{}
 | 
			
		||||
			if err := json.Unmarshal([]byte(res.json), &debCves); err != nil {
 | 
			
		||||
				return 0, xerrors.Errorf("Failed to unmarshal json. err: %w", err)
 | 
			
		||||
			}
 | 
			
		||||
			cves := []models.CveContent{}
 | 
			
		||||
			fixes := []models.PackageFixStatus{}
 | 
			
		||||
			for _, debcve := range debCves {
 | 
			
		||||
				cves = append(cves, *deb.ConvertToModel(&debcve))
 | 
			
		||||
				fixes = append(fixes, checkPackageFixStatus(&debcve)...)
 | 
			
		||||
			}
 | 
			
		||||
			packCvesList = append(packCvesList, packCves{
 | 
			
		||||
				packName:  res.request.packName,
 | 
			
		||||
				isSrcPack: res.request.isSrcPack,
 | 
			
		||||
				cves:      cves,
 | 
			
		||||
				fixes:     fixes,
 | 
			
		||||
			})
 | 
			
		||||
		}
 | 
			
		||||
	} else {
 | 
			
		||||
		for _, pack := range r.Packages {
 | 
			
		||||
			cves, fixes, err := deb.getCvesDebianWithfixStatus(fixStatus, major(r.Release), pack.Name)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				return 0, xerrors.Errorf("Failed to get CVEs for Package. err: %w", err)
 | 
			
		||||
			}
 | 
			
		||||
			packCvesList = append(packCvesList, packCves{
 | 
			
		||||
				packName:  pack.Name,
 | 
			
		||||
				isSrcPack: false,
 | 
			
		||||
				cves:      cves,
 | 
			
		||||
				fixes:     fixes,
 | 
			
		||||
			})
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		// SrcPack
 | 
			
		||||
		for _, pack := range r.SrcPackages {
 | 
			
		||||
			cves, fixes, err := deb.getCvesDebianWithfixStatus(fixStatus, major(r.Release), pack.Name)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				return 0, xerrors.Errorf("Failed to get CVEs for SrcPackage. err: %w", err)
 | 
			
		||||
			}
 | 
			
		||||
			packCvesList = append(packCvesList, packCves{
 | 
			
		||||
				packName:  pack.Name,
 | 
			
		||||
				isSrcPack: true,
 | 
			
		||||
				cves:      cves,
 | 
			
		||||
				fixes:     fixes,
 | 
			
		||||
			})
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	delete(r.Packages, "linux")
 | 
			
		||||
 | 
			
		||||
	for _, p := range packCvesList {
 | 
			
		||||
		for i, cve := range p.cves {
 | 
			
		||||
			v, ok := r.ScannedCves[cve.CveID]
 | 
			
		||||
			if ok {
 | 
			
		||||
				if v.CveContents == nil {
 | 
			
		||||
					v.CveContents = models.NewCveContents(cve)
 | 
			
		||||
				} else {
 | 
			
		||||
					v.CveContents[models.DebianSecurityTracker] = []models.CveContent{cve}
 | 
			
		||||
				}
 | 
			
		||||
			} else {
 | 
			
		||||
				v = models.VulnInfo{
 | 
			
		||||
					CveID:       cve.CveID,
 | 
			
		||||
					CveContents: models.NewCveContents(cve),
 | 
			
		||||
				}
 | 
			
		||||
				nCVEs++
 | 
			
		||||
			if !res.request.isSrcPack {
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			if fixStatus == "resolved" {
 | 
			
		||||
				versionRelease := ""
 | 
			
		||||
				if p.isSrcPack {
 | 
			
		||||
					versionRelease = r.SrcPackages[p.packName].Version
 | 
			
		||||
				} else {
 | 
			
		||||
					versionRelease = r.Packages[p.packName].FormatVer()
 | 
			
		||||
				}
 | 
			
		||||
			n := strings.NewReplacer("linux-signed", "linux", "linux-latest", "linux", "-amd64", "", "-arm64", "", "-i386", "").Replace(res.request.packName)
 | 
			
		||||
 | 
			
		||||
				if versionRelease == "" {
 | 
			
		||||
					break
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				affected, err := isGostDefAffected(versionRelease, p.fixes[i].FixedIn)
 | 
			
		||||
				if err != nil {
 | 
			
		||||
					logging.Log.Debugf("Failed to parse versions: %s, Ver: %s, Gost: %s",
 | 
			
		||||
						err, versionRelease, p.fixes[i].FixedIn)
 | 
			
		||||
					continue
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				if !affected {
 | 
			
		||||
					continue
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			names := []string{}
 | 
			
		||||
			if p.isSrcPack {
 | 
			
		||||
				if srcPack, ok := r.SrcPackages[p.packName]; ok {
 | 
			
		||||
					for _, binName := range srcPack.BinaryNames {
 | 
			
		||||
						if _, ok := r.Packages[binName]; ok {
 | 
			
		||||
							names = append(names, binName)
 | 
			
		||||
						}
 | 
			
		||||
			if deb.isKernelSourcePackage(n) {
 | 
			
		||||
				isRunning := false
 | 
			
		||||
				for _, bn := range r.SrcPackages[res.request.packName].BinaryNames {
 | 
			
		||||
					if bn == fmt.Sprintf("linux-image-%s", r.RunningKernel.Release) {
 | 
			
		||||
						isRunning = true
 | 
			
		||||
						break
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
			} else {
 | 
			
		||||
				if p.packName == "linux" {
 | 
			
		||||
					names = append(names, "linux-image-"+r.RunningKernel.Release)
 | 
			
		||||
				} else {
 | 
			
		||||
					names = append(names, p.packName)
 | 
			
		||||
				// To detect vulnerabilities in running kernels only, skip if the kernel is not running.
 | 
			
		||||
				if !isRunning {
 | 
			
		||||
					continue
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			if fixStatus == "resolved" {
 | 
			
		||||
				for _, name := range names {
 | 
			
		||||
					v.AffectedPackages = v.AffectedPackages.Store(models.PackageFixStatus{
 | 
			
		||||
						Name:    name,
 | 
			
		||||
						FixedIn: p.fixes[i].FixedIn,
 | 
			
		||||
					})
 | 
			
		||||
			cs := map[string]gostmodels.DebianCVE{}
 | 
			
		||||
			if err := json.Unmarshal([]byte(res.json), &cs); err != nil {
 | 
			
		||||
				return nil, xerrors.Errorf("Failed to unmarshal json. err: %w", err)
 | 
			
		||||
			}
 | 
			
		||||
			for _, content := range deb.detect(cs, models.SrcPackage{Name: res.request.packName, Version: r.SrcPackages[res.request.packName].Version, BinaryNames: r.SrcPackages[res.request.packName].BinaryNames}, models.Kernel{Release: r.RunningKernel.Release, Version: r.Packages[fmt.Sprintf("linux-image-%s", r.RunningKernel.Release)].Version}) {
 | 
			
		||||
				c, ok := detects[content.cveContent.CveID]
 | 
			
		||||
				if ok {
 | 
			
		||||
					content.fixStatuses = append(content.fixStatuses, c.fixStatuses...)
 | 
			
		||||
				}
 | 
			
		||||
			} else {
 | 
			
		||||
				for _, name := range names {
 | 
			
		||||
					v.AffectedPackages = v.AffectedPackages.Store(models.PackageFixStatus{
 | 
			
		||||
						Name:        name,
 | 
			
		||||
						FixState:    "open",
 | 
			
		||||
						NotFixedYet: true,
 | 
			
		||||
					})
 | 
			
		||||
				detects[content.cveContent.CveID] = content
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	} else {
 | 
			
		||||
		for _, p := range r.SrcPackages {
 | 
			
		||||
			n := strings.NewReplacer("linux-signed", "linux", "linux-latest", "linux", "-amd64", "", "-arm64", "", "-i386", "").Replace(p.Name)
 | 
			
		||||
 | 
			
		||||
			if deb.isKernelSourcePackage(n) {
 | 
			
		||||
				isRunning := false
 | 
			
		||||
				for _, bn := range p.BinaryNames {
 | 
			
		||||
					if bn == fmt.Sprintf("linux-image-%s", r.RunningKernel.Release) {
 | 
			
		||||
						isRunning = true
 | 
			
		||||
						break
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
				// To detect vulnerabilities in running kernels only, skip if the kernel is not running.
 | 
			
		||||
				if !isRunning {
 | 
			
		||||
					continue
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			v.Confidences.AppendIfMissing(models.DebianSecurityTrackerMatch)
 | 
			
		||||
			r.ScannedCves[cve.CveID] = v
 | 
			
		||||
			var f func(string, string) (map[string]gostmodels.DebianCVE, error) = deb.driver.GetFixedCvesDebian
 | 
			
		||||
			if !fixed {
 | 
			
		||||
				f = deb.driver.GetUnfixedCvesDebian
 | 
			
		||||
			}
 | 
			
		||||
			cs, err := f(major(r.Release), n)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				return nil, xerrors.Errorf("Failed to get CVEs. release: %s, src package: %s, err: %w", major(r.Release), p.Name, err)
 | 
			
		||||
			}
 | 
			
		||||
			for _, content := range deb.detect(cs, p, models.Kernel{Release: r.RunningKernel.Release, Version: r.Packages[fmt.Sprintf("linux-image-%s", r.RunningKernel.Release)].Version}) {
 | 
			
		||||
				c, ok := detects[content.cveContent.CveID]
 | 
			
		||||
				if ok {
 | 
			
		||||
					content.fixStatuses = append(content.fixStatuses, c.fixStatuses...)
 | 
			
		||||
				}
 | 
			
		||||
				detects[content.cveContent.CveID] = content
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return nCVEs, nil
 | 
			
		||||
	for _, content := range detects {
 | 
			
		||||
		v, ok := r.ScannedCves[content.cveContent.CveID]
 | 
			
		||||
		if ok {
 | 
			
		||||
			if v.CveContents == nil {
 | 
			
		||||
				v.CveContents = models.NewCveContents(content.cveContent)
 | 
			
		||||
			} else {
 | 
			
		||||
				v.CveContents[models.DebianSecurityTracker] = []models.CveContent{content.cveContent}
 | 
			
		||||
			}
 | 
			
		||||
			v.Confidences.AppendIfMissing(models.DebianSecurityTrackerMatch)
 | 
			
		||||
		} else {
 | 
			
		||||
			v = models.VulnInfo{
 | 
			
		||||
				CveID:       content.cveContent.CveID,
 | 
			
		||||
				CveContents: models.NewCveContents(content.cveContent),
 | 
			
		||||
				Confidences: models.Confidences{models.DebianSecurityTrackerMatch},
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		for _, s := range content.fixStatuses {
 | 
			
		||||
			v.AffectedPackages = v.AffectedPackages.Store(s)
 | 
			
		||||
		}
 | 
			
		||||
		r.ScannedCves[content.cveContent.CveID] = v
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return maps.Keys(detects), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func isGostDefAffected(versionRelease, gostVersion string) (affected bool, err error) {
 | 
			
		||||
func (deb Debian) isKernelSourcePackage(pkgname string) bool {
 | 
			
		||||
	switch ss := strings.Split(pkgname, "-"); len(ss) {
 | 
			
		||||
	case 1:
 | 
			
		||||
		return pkgname == "linux"
 | 
			
		||||
	case 2:
 | 
			
		||||
		if ss[0] != "liunx" {
 | 
			
		||||
			return false
 | 
			
		||||
		}
 | 
			
		||||
		switch ss[1] {
 | 
			
		||||
		case "grsec":
 | 
			
		||||
			return true
 | 
			
		||||
		default:
 | 
			
		||||
			_, err := strconv.ParseFloat(ss[1], 64)
 | 
			
		||||
			return err == nil
 | 
			
		||||
		}
 | 
			
		||||
	default:
 | 
			
		||||
		return false
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (deb Debian) detect(cves map[string]gostmodels.DebianCVE, srcPkg models.SrcPackage, runningKernel models.Kernel) []cveContent {
 | 
			
		||||
	n := strings.NewReplacer("linux-signed", "linux", "linux-latest", "linux", "-amd64", "", "-arm64", "", "-i386", "").Replace(srcPkg.Name)
 | 
			
		||||
 | 
			
		||||
	var contents []cveContent
 | 
			
		||||
	for _, cve := range cves {
 | 
			
		||||
		c := cveContent{
 | 
			
		||||
			cveContent: *(Debian{}).ConvertToModel(&cve),
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		for _, p := range cve.Package {
 | 
			
		||||
			for _, r := range p.Release {
 | 
			
		||||
				switch r.Status {
 | 
			
		||||
				case "open", "undetermined":
 | 
			
		||||
					for _, bn := range srcPkg.BinaryNames {
 | 
			
		||||
						if deb.isKernelSourcePackage(n) && bn != fmt.Sprintf("linux-image-%s", runningKernel.Release) {
 | 
			
		||||
							continue
 | 
			
		||||
						}
 | 
			
		||||
						c.fixStatuses = append(c.fixStatuses, models.PackageFixStatus{
 | 
			
		||||
							Name:        bn,
 | 
			
		||||
							FixState:    r.Status,
 | 
			
		||||
							NotFixedYet: true,
 | 
			
		||||
						})
 | 
			
		||||
					}
 | 
			
		||||
				case "resolved":
 | 
			
		||||
					installedVersion := srcPkg.Version
 | 
			
		||||
					patchedVersion := r.FixedVersion
 | 
			
		||||
 | 
			
		||||
					if deb.isKernelSourcePackage(n) {
 | 
			
		||||
						installedVersion = runningKernel.Version
 | 
			
		||||
					}
 | 
			
		||||
 | 
			
		||||
					affected, err := deb.isGostDefAffected(installedVersion, patchedVersion)
 | 
			
		||||
					if err != nil {
 | 
			
		||||
						logging.Log.Debugf("Failed to parse versions: %s, Ver: %s, Gost: %s", err, installedVersion, patchedVersion)
 | 
			
		||||
						continue
 | 
			
		||||
					}
 | 
			
		||||
 | 
			
		||||
					if affected {
 | 
			
		||||
						for _, bn := range srcPkg.BinaryNames {
 | 
			
		||||
							if deb.isKernelSourcePackage(n) && bn != fmt.Sprintf("linux-image-%s", runningKernel.Release) {
 | 
			
		||||
								continue
 | 
			
		||||
							}
 | 
			
		||||
							c.fixStatuses = append(c.fixStatuses, models.PackageFixStatus{
 | 
			
		||||
								Name:    bn,
 | 
			
		||||
								FixedIn: patchedVersion,
 | 
			
		||||
							})
 | 
			
		||||
						}
 | 
			
		||||
					}
 | 
			
		||||
				default:
 | 
			
		||||
					logging.Log.Debugf("Failed to check vulnerable CVE. err: unknown status: %s", r.Status)
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		if len(c.fixStatuses) > 0 {
 | 
			
		||||
			contents = append(contents, c)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	return contents
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (deb Debian) isGostDefAffected(versionRelease, gostVersion string) (affected bool, err error) {
 | 
			
		||||
	vera, err := debver.NewVersion(versionRelease)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return false, xerrors.Errorf("Failed to parse version. version: %s, err: %w", versionRelease, err)
 | 
			
		||||
@@ -247,27 +269,6 @@ func isGostDefAffected(versionRelease, gostVersion string) (affected bool, err e
 | 
			
		||||
	return vera.LessThan(verb), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (deb Debian) getCvesDebianWithfixStatus(fixStatus, release, pkgName string) ([]models.CveContent, []models.PackageFixStatus, error) {
 | 
			
		||||
	var f func(string, string) (map[string]gostmodels.DebianCVE, error)
 | 
			
		||||
	if fixStatus == "resolved" {
 | 
			
		||||
		f = deb.driver.GetFixedCvesDebian
 | 
			
		||||
	} else {
 | 
			
		||||
		f = deb.driver.GetUnfixedCvesDebian
 | 
			
		||||
	}
 | 
			
		||||
	debCves, err := f(release, pkgName)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return nil, nil, xerrors.Errorf("Failed to get CVEs. fixStatus: %s, release: %s, src package: %s, err: %w", fixStatus, release, pkgName, err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	cves := []models.CveContent{}
 | 
			
		||||
	fixes := []models.PackageFixStatus{}
 | 
			
		||||
	for _, devbCve := range debCves {
 | 
			
		||||
		cves = append(cves, *deb.ConvertToModel(&devbCve))
 | 
			
		||||
		fixes = append(fixes, checkPackageFixStatus(&devbCve)...)
 | 
			
		||||
	}
 | 
			
		||||
	return cves, fixes, nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ConvertToModel converts gost model to vuls model
 | 
			
		||||
func (deb Debian) ConvertToModel(cve *gostmodels.DebianCVE) *models.CveContent {
 | 
			
		||||
	severity := ""
 | 
			
		||||
@@ -277,34 +278,17 @@ func (deb Debian) ConvertToModel(cve *gostmodels.DebianCVE) *models.CveContent {
 | 
			
		||||
			break
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	var optinal map[string]string
 | 
			
		||||
	if cve.Scope != "" {
 | 
			
		||||
		optinal = map[string]string{"attack range": cve.Scope}
 | 
			
		||||
	}
 | 
			
		||||
	return &models.CveContent{
 | 
			
		||||
		Type:          models.DebianSecurityTracker,
 | 
			
		||||
		CveID:         cve.CveID,
 | 
			
		||||
		Summary:       cve.Description,
 | 
			
		||||
		Cvss2Severity: severity,
 | 
			
		||||
		Cvss3Severity: severity,
 | 
			
		||||
		SourceLink:    "https://security-tracker.debian.org/tracker/" + cve.CveID,
 | 
			
		||||
		Optional: map[string]string{
 | 
			
		||||
			"attack range": cve.Scope,
 | 
			
		||||
		},
 | 
			
		||||
		SourceLink:    fmt.Sprintf("https://security-tracker.debian.org/tracker/%s", cve.CveID),
 | 
			
		||||
		Optional:      optinal,
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func checkPackageFixStatus(cve *gostmodels.DebianCVE) []models.PackageFixStatus {
 | 
			
		||||
	fixes := []models.PackageFixStatus{}
 | 
			
		||||
	for _, p := range cve.Package {
 | 
			
		||||
		for _, r := range p.Release {
 | 
			
		||||
			f := models.PackageFixStatus{Name: p.PackageName}
 | 
			
		||||
 | 
			
		||||
			if r.Status == "open" {
 | 
			
		||||
				f.NotFixedYet = true
 | 
			
		||||
			} else {
 | 
			
		||||
				f.FixedIn = r.FixedVersion
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			fixes = append(fixes, f)
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return fixes
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
@@ -3,69 +3,309 @@
 | 
			
		||||
 | 
			
		||||
package gost
 | 
			
		||||
 | 
			
		||||
import "testing"
 | 
			
		||||
import (
 | 
			
		||||
	"reflect"
 | 
			
		||||
	"testing"
 | 
			
		||||
 | 
			
		||||
	"github.com/future-architect/vuls/models"
 | 
			
		||||
	gostmodels "github.com/vulsio/gost/models"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func TestDebian_Supported(t *testing.T) {
 | 
			
		||||
	type fields struct {
 | 
			
		||||
		Base Base
 | 
			
		||||
	}
 | 
			
		||||
	type args struct {
 | 
			
		||||
		major string
 | 
			
		||||
	}
 | 
			
		||||
	tests := []struct {
 | 
			
		||||
		name string
 | 
			
		||||
		args args
 | 
			
		||||
		args string
 | 
			
		||||
		want bool
 | 
			
		||||
	}{
 | 
			
		||||
		{
 | 
			
		||||
			name: "7 is supported",
 | 
			
		||||
			args: "7",
 | 
			
		||||
			want: true,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "8 is supported",
 | 
			
		||||
			args: args{
 | 
			
		||||
				major: "8",
 | 
			
		||||
			},
 | 
			
		||||
			args: "8",
 | 
			
		||||
			want: true,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "9 is supported",
 | 
			
		||||
			args: args{
 | 
			
		||||
				major: "9",
 | 
			
		||||
			},
 | 
			
		||||
			args: "9",
 | 
			
		||||
			want: true,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "10 is supported",
 | 
			
		||||
			args: args{
 | 
			
		||||
				major: "10",
 | 
			
		||||
			},
 | 
			
		||||
			args: "10",
 | 
			
		||||
			want: true,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "11 is supported",
 | 
			
		||||
			args: args{
 | 
			
		||||
				major: "11",
 | 
			
		||||
			},
 | 
			
		||||
			args: "11",
 | 
			
		||||
			want: true,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "12 is not supported yet",
 | 
			
		||||
			args: args{
 | 
			
		||||
				major: "12",
 | 
			
		||||
			},
 | 
			
		||||
			args: "12",
 | 
			
		||||
			want: false,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "13 is not supported yet",
 | 
			
		||||
			args: "13",
 | 
			
		||||
			want: false,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "14 is not supported yet",
 | 
			
		||||
			args: "14",
 | 
			
		||||
			want: false,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "empty string is not supported yet",
 | 
			
		||||
			args: args{
 | 
			
		||||
				major: "",
 | 
			
		||||
			},
 | 
			
		||||
			args: "",
 | 
			
		||||
			want: false,
 | 
			
		||||
		},
 | 
			
		||||
	}
 | 
			
		||||
	for _, tt := range tests {
 | 
			
		||||
		t.Run(tt.name, func(t *testing.T) {
 | 
			
		||||
			deb := Debian{}
 | 
			
		||||
			if got := deb.supported(tt.args.major); got != tt.want {
 | 
			
		||||
			if got := (Debian{}).supported(tt.args); got != tt.want {
 | 
			
		||||
				t.Errorf("Debian.Supported() = %v, want %v", got, tt.want)
 | 
			
		||||
			}
 | 
			
		||||
		})
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestDebian_ConvertToModel(t *testing.T) {
 | 
			
		||||
	tests := []struct {
 | 
			
		||||
		name string
 | 
			
		||||
		args gostmodels.DebianCVE
 | 
			
		||||
		want models.CveContent
 | 
			
		||||
	}{
 | 
			
		||||
		{
 | 
			
		||||
			name: "gost Debian.ConvertToModel",
 | 
			
		||||
			args: gostmodels.DebianCVE{
 | 
			
		||||
				CveID:       "CVE-2022-39260",
 | 
			
		||||
				Scope:       "local",
 | 
			
		||||
				Description: "Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git's push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to `execv()`, it is possible to leverage this attack to gain remote code execution on a victim machine. Note that a victim must first allow access to `git shell` as a login shell in order to be vulnerable to this attack. This problem is patched in versions 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 and users are advised to upgrade to the latest version. Disabling `git shell` access via remote logins is a viable short-term workaround.",
 | 
			
		||||
				Package: []gostmodels.DebianPackage{
 | 
			
		||||
					{
 | 
			
		||||
						PackageName: "git",
 | 
			
		||||
						Release: []gostmodels.DebianRelease{
 | 
			
		||||
							{
 | 
			
		||||
								ProductName:  "bookworm",
 | 
			
		||||
								Status:       "resolved",
 | 
			
		||||
								FixedVersion: "1:2.38.1-1",
 | 
			
		||||
								Urgency:      "not yet assigned",
 | 
			
		||||
								Version:      "1:2.39.2-1.1",
 | 
			
		||||
							},
 | 
			
		||||
							{
 | 
			
		||||
								ProductName:  "bullseye",
 | 
			
		||||
								Status:       "resolved",
 | 
			
		||||
								FixedVersion: "1:2.30.2-1+deb11u1",
 | 
			
		||||
								Urgency:      "not yet assigned",
 | 
			
		||||
								Version:      "1:2.30.2-1",
 | 
			
		||||
							},
 | 
			
		||||
							{
 | 
			
		||||
								ProductName:  "buster",
 | 
			
		||||
								Status:       "resolved",
 | 
			
		||||
								FixedVersion: "1:2.20.1-2+deb10u5",
 | 
			
		||||
								Urgency:      "not yet assigned",
 | 
			
		||||
								Version:      "1:2.20.1-2+deb10u3",
 | 
			
		||||
							},
 | 
			
		||||
							{
 | 
			
		||||
								ProductName:  "sid",
 | 
			
		||||
								Status:       "resolved",
 | 
			
		||||
								FixedVersion: "1:2.38.1-1",
 | 
			
		||||
								Urgency:      "not yet assigned",
 | 
			
		||||
								Version:      "1:2.40.0-1",
 | 
			
		||||
							},
 | 
			
		||||
						},
 | 
			
		||||
					},
 | 
			
		||||
				},
 | 
			
		||||
			},
 | 
			
		||||
			want: models.CveContent{
 | 
			
		||||
				Type:          models.DebianSecurityTracker,
 | 
			
		||||
				CveID:         "CVE-2022-39260",
 | 
			
		||||
				Summary:       "Git is an open source, scalable, distributed revision control system. `git shell` is a restricted login shell that can be used to implement Git's push/pull functionality via SSH. In versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4, the function that splits the command arguments into an array improperly uses an `int` to represent the number of entries in the array, allowing a malicious actor to intentionally overflow the return value, leading to arbitrary heap writes. Because the resulting array is then passed to `execv()`, it is possible to leverage this attack to gain remote code execution on a victim machine. Note that a victim must first allow access to `git shell` as a login shell in order to be vulnerable to this attack. This problem is patched in versions 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 and users are advised to upgrade to the latest version. Disabling `git shell` access via remote logins is a viable short-term workaround.",
 | 
			
		||||
				Cvss2Severity: "not yet assigned",
 | 
			
		||||
				Cvss3Severity: "not yet assigned",
 | 
			
		||||
				SourceLink:    "https://security-tracker.debian.org/tracker/CVE-2022-39260",
 | 
			
		||||
				Optional:      map[string]string{"attack range": "local"},
 | 
			
		||||
			},
 | 
			
		||||
		},
 | 
			
		||||
	}
 | 
			
		||||
	for _, tt := range tests {
 | 
			
		||||
		t.Run(tt.name, func(t *testing.T) {
 | 
			
		||||
			if got := (Debian{}).ConvertToModel(&tt.args); !reflect.DeepEqual(got, &tt.want) {
 | 
			
		||||
				t.Errorf("Debian.ConvertToModel() = %v, want %v", got, tt.want)
 | 
			
		||||
			}
 | 
			
		||||
		})
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func TestDebian_detect(t *testing.T) {
 | 
			
		||||
	type args struct {
 | 
			
		||||
		cves          map[string]gostmodels.DebianCVE
 | 
			
		||||
		srcPkg        models.SrcPackage
 | 
			
		||||
		runningKernel models.Kernel
 | 
			
		||||
	}
 | 
			
		||||
	tests := []struct {
 | 
			
		||||
		name string
 | 
			
		||||
		args args
 | 
			
		||||
		want []cveContent
 | 
			
		||||
	}{
 | 
			
		||||
		{
 | 
			
		||||
			name: "fixed",
 | 
			
		||||
			args: args{
 | 
			
		||||
				cves: map[string]gostmodels.DebianCVE{
 | 
			
		||||
					"CVE-0000-0000": {
 | 
			
		||||
						CveID: "CVE-0000-0000",
 | 
			
		||||
						Package: []gostmodels.DebianPackage{
 | 
			
		||||
							{
 | 
			
		||||
								PackageName: "pkg",
 | 
			
		||||
								Release: []gostmodels.DebianRelease{
 | 
			
		||||
									{
 | 
			
		||||
										ProductName:  "bullseye",
 | 
			
		||||
										Status:       "resolved",
 | 
			
		||||
										FixedVersion: "0.0.0-0",
 | 
			
		||||
									},
 | 
			
		||||
								},
 | 
			
		||||
							},
 | 
			
		||||
						},
 | 
			
		||||
					},
 | 
			
		||||
					"CVE-0000-0001": {
 | 
			
		||||
						CveID: "CVE-0000-0001",
 | 
			
		||||
						Package: []gostmodels.DebianPackage{
 | 
			
		||||
							{
 | 
			
		||||
								PackageName: "pkg",
 | 
			
		||||
								Release: []gostmodels.DebianRelease{
 | 
			
		||||
									{
 | 
			
		||||
										ProductName:  "bullseye",
 | 
			
		||||
										Status:       "resolved",
 | 
			
		||||
										FixedVersion: "0.0.0-2",
 | 
			
		||||
									},
 | 
			
		||||
								},
 | 
			
		||||
							},
 | 
			
		||||
						},
 | 
			
		||||
					},
 | 
			
		||||
				},
 | 
			
		||||
				srcPkg: models.SrcPackage{Name: "pkg", Version: "0.0.0-1", BinaryNames: []string{"pkg"}},
 | 
			
		||||
			},
 | 
			
		||||
			want: []cveContent{
 | 
			
		||||
				{
 | 
			
		||||
					cveContent: models.CveContent{Type: models.DebianSecurityTracker, CveID: "CVE-0000-0001", SourceLink: "https://security-tracker.debian.org/tracker/CVE-0000-0001"},
 | 
			
		||||
					fixStatuses: models.PackageFixStatuses{{
 | 
			
		||||
						Name:    "pkg",
 | 
			
		||||
						FixedIn: "0.0.0-2",
 | 
			
		||||
					}},
 | 
			
		||||
				},
 | 
			
		||||
			},
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "unfixed",
 | 
			
		||||
			args: args{
 | 
			
		||||
				cves: map[string]gostmodels.DebianCVE{
 | 
			
		||||
					"CVE-0000-0000": {
 | 
			
		||||
						CveID: "CVE-0000-0000",
 | 
			
		||||
						Package: []gostmodels.DebianPackage{
 | 
			
		||||
							{
 | 
			
		||||
								PackageName: "pkg",
 | 
			
		||||
								Release: []gostmodels.DebianRelease{
 | 
			
		||||
									{
 | 
			
		||||
										ProductName: "bullseye",
 | 
			
		||||
										Status:      "open",
 | 
			
		||||
									},
 | 
			
		||||
								},
 | 
			
		||||
							},
 | 
			
		||||
						},
 | 
			
		||||
					},
 | 
			
		||||
					"CVE-0000-0001": {
 | 
			
		||||
						CveID: "CVE-0000-0001",
 | 
			
		||||
						Package: []gostmodels.DebianPackage{
 | 
			
		||||
							{
 | 
			
		||||
								PackageName: "pkg",
 | 
			
		||||
								Release: []gostmodels.DebianRelease{
 | 
			
		||||
									{
 | 
			
		||||
										ProductName: "bullseye",
 | 
			
		||||
										Status:      "undetermined",
 | 
			
		||||
									},
 | 
			
		||||
								},
 | 
			
		||||
							},
 | 
			
		||||
						},
 | 
			
		||||
					},
 | 
			
		||||
				},
 | 
			
		||||
				srcPkg: models.SrcPackage{Name: "pkg", Version: "0.0.0-1", BinaryNames: []string{"pkg"}},
 | 
			
		||||
			},
 | 
			
		||||
			want: []cveContent{
 | 
			
		||||
				{
 | 
			
		||||
					cveContent: models.CveContent{Type: models.DebianSecurityTracker, CveID: "CVE-0000-0000", SourceLink: "https://security-tracker.debian.org/tracker/CVE-0000-0000"},
 | 
			
		||||
					fixStatuses: models.PackageFixStatuses{{
 | 
			
		||||
						Name:        "pkg",
 | 
			
		||||
						FixState:    "open",
 | 
			
		||||
						NotFixedYet: true,
 | 
			
		||||
					}},
 | 
			
		||||
				},
 | 
			
		||||
				{
 | 
			
		||||
					cveContent: models.CveContent{Type: models.DebianSecurityTracker, CveID: "CVE-0000-0001", SourceLink: "https://security-tracker.debian.org/tracker/CVE-0000-0001"},
 | 
			
		||||
					fixStatuses: models.PackageFixStatuses{{
 | 
			
		||||
						Name:        "pkg",
 | 
			
		||||
						FixState:    "undetermined",
 | 
			
		||||
						NotFixedYet: true,
 | 
			
		||||
					}},
 | 
			
		||||
				},
 | 
			
		||||
			},
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "linux-signed-amd64",
 | 
			
		||||
			args: args{
 | 
			
		||||
				cves: map[string]gostmodels.DebianCVE{
 | 
			
		||||
					"CVE-0000-0000": {
 | 
			
		||||
						CveID: "CVE-0000-0000",
 | 
			
		||||
						Package: []gostmodels.DebianPackage{
 | 
			
		||||
							{
 | 
			
		||||
								PackageName: "linux",
 | 
			
		||||
								Release: []gostmodels.DebianRelease{
 | 
			
		||||
									{
 | 
			
		||||
										ProductName:  "bullseye",
 | 
			
		||||
										Status:       "resolved",
 | 
			
		||||
										FixedVersion: "0.0.0-0",
 | 
			
		||||
									},
 | 
			
		||||
								},
 | 
			
		||||
							},
 | 
			
		||||
						},
 | 
			
		||||
					},
 | 
			
		||||
					"CVE-0000-0001": {
 | 
			
		||||
						CveID: "CVE-0000-0001",
 | 
			
		||||
						Package: []gostmodels.DebianPackage{
 | 
			
		||||
							{
 | 
			
		||||
								PackageName: "linux",
 | 
			
		||||
								Release: []gostmodels.DebianRelease{
 | 
			
		||||
									{
 | 
			
		||||
										ProductName:  "bullseye",
 | 
			
		||||
										Status:       "resolved",
 | 
			
		||||
										FixedVersion: "0.0.0-2",
 | 
			
		||||
									},
 | 
			
		||||
								},
 | 
			
		||||
							},
 | 
			
		||||
						},
 | 
			
		||||
					},
 | 
			
		||||
				},
 | 
			
		||||
				srcPkg:        models.SrcPackage{Name: "linux-signed-amd64", Version: "0.0.0+1", BinaryNames: []string{"linux-image-5.10.0-20-amd64"}},
 | 
			
		||||
				runningKernel: models.Kernel{Release: "5.10.0-20-amd64", Version: "0.0.0-1"},
 | 
			
		||||
			},
 | 
			
		||||
			want: []cveContent{
 | 
			
		||||
				{
 | 
			
		||||
					cveContent: models.CveContent{Type: models.DebianSecurityTracker, CveID: "CVE-0000-0001", SourceLink: "https://security-tracker.debian.org/tracker/CVE-0000-0001"},
 | 
			
		||||
					fixStatuses: models.PackageFixStatuses{{
 | 
			
		||||
						Name:    "linux-image-5.10.0-20-amd64",
 | 
			
		||||
						FixedIn: "0.0.0-2",
 | 
			
		||||
					}},
 | 
			
		||||
				},
 | 
			
		||||
			},
 | 
			
		||||
		},
 | 
			
		||||
	}
 | 
			
		||||
	for _, tt := range tests {
 | 
			
		||||
		t.Run(tt.name, func(t *testing.T) {
 | 
			
		||||
			if got := (Debian{}).detect(tt.args.cves, tt.args.srcPkg, tt.args.runningKernel); !reflect.DeepEqual(got, tt.want) {
 | 
			
		||||
				t.Errorf("Debian.detect() = %v, want %v", got, tt.want)
 | 
			
		||||
			}
 | 
			
		||||
		})
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										146
									
								
								gost/ubuntu.go
									
									
									
									
									
								
							
							
						
						
									
										146
									
								
								gost/ubuntu.go
									
									
									
									
									
								
							@@ -9,6 +9,8 @@ import (
 | 
			
		||||
	"regexp"
 | 
			
		||||
	"strings"
 | 
			
		||||
 | 
			
		||||
	debver "github.com/knqyf263/go-deb-version"
 | 
			
		||||
	"golang.org/x/exp/maps"
 | 
			
		||||
	"golang.org/x/xerrors"
 | 
			
		||||
 | 
			
		||||
	"github.com/future-architect/vuls/logging"
 | 
			
		||||
@@ -72,21 +74,44 @@ var kernelSourceNamePattern = regexp.MustCompile(`^linux((-(ti-omap4|armadaxp|ma
 | 
			
		||||
 | 
			
		||||
// DetectCVEs fills cve information that has in Gost
 | 
			
		||||
func (ubu Ubuntu) DetectCVEs(r *models.ScanResult, _ bool) (nCVEs int, err error) {
 | 
			
		||||
	ubuReleaseVer := strings.Replace(r.Release, ".", "", 1)
 | 
			
		||||
	if !ubu.supported(ubuReleaseVer) {
 | 
			
		||||
	if !ubu.supported(strings.Replace(r.Release, ".", "", 1)) {
 | 
			
		||||
		logging.Log.Warnf("Ubuntu %s is not supported yet", r.Release)
 | 
			
		||||
		return 0, nil
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if r.Container.ContainerID == "" {
 | 
			
		||||
		if r.RunningKernel.Release == "" {
 | 
			
		||||
			logging.Log.Warnf("Since the exact kernel release is not available, the vulnerability in the kernel package is not detected.")
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	fixedCVEs, err := ubu.detectCVEsWithFixState(r, true)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return 0, xerrors.Errorf("Failed to detect fixed CVEs. err: %w", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	unfixedCVEs, err := ubu.detectCVEsWithFixState(r, false)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return 0, xerrors.Errorf("Failed to detect unfixed CVEs. err: %w", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return len(unique(append(fixedCVEs, unfixedCVEs...))), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (ubu Ubuntu) detectCVEsWithFixState(r *models.ScanResult, fixed bool) ([]string, error) {
 | 
			
		||||
	detects := map[string]cveContent{}
 | 
			
		||||
	if ubu.driver == nil {
 | 
			
		||||
		urlPrefix, err := util.URLPathJoin(ubu.baseURL, "ubuntu", ubuReleaseVer, "pkgs")
 | 
			
		||||
		urlPrefix, err := util.URLPathJoin(ubu.baseURL, "ubuntu", strings.Replace(r.Release, ".", "", 1), "pkgs")
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return 0, xerrors.Errorf("Failed to join URLPath. err: %w", err)
 | 
			
		||||
			return nil, xerrors.Errorf("Failed to join URLPath. err: %w", err)
 | 
			
		||||
		}
 | 
			
		||||
		responses, err := getCvesWithFixStateViaHTTP(r, urlPrefix, "fixed-cves")
 | 
			
		||||
		s := "fixed-cves"
 | 
			
		||||
		if !fixed {
 | 
			
		||||
			s = "unfixed-cves"
 | 
			
		||||
		}
 | 
			
		||||
		responses, err := getCvesWithFixStateViaHTTP(r, urlPrefix, s)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return 0, xerrors.Errorf("Failed to get fixed CVEs via HTTP. err: %w", err)
 | 
			
		||||
			return nil, xerrors.Errorf("Failed to get fixed CVEs via HTTP. err: %w", err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		for _, res := range responses {
 | 
			
		||||
@@ -97,60 +122,24 @@ func (ubu Ubuntu) DetectCVEs(r *models.ScanResult, _ bool) (nCVEs int, err error
 | 
			
		||||
			n := strings.NewReplacer("linux-signed", "linux", "linux-meta", "linux").Replace(res.request.packName)
 | 
			
		||||
 | 
			
		||||
			if kernelSourceNamePattern.MatchString(n) {
 | 
			
		||||
				isDetect := false
 | 
			
		||||
				isRunning := false
 | 
			
		||||
				for _, bn := range r.SrcPackages[res.request.packName].BinaryNames {
 | 
			
		||||
					if bn == fmt.Sprintf("linux-image-%s", r.RunningKernel.Release) {
 | 
			
		||||
						isDetect = true
 | 
			
		||||
						isRunning = true
 | 
			
		||||
						break
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
				if !isDetect {
 | 
			
		||||
				// To detect vulnerabilities in running kernels only, skip if the kernel is not running.
 | 
			
		||||
				if !isRunning {
 | 
			
		||||
					continue
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			fixeds := map[string]gostmodels.UbuntuCVE{}
 | 
			
		||||
			if err := json.Unmarshal([]byte(res.json), &fixeds); err != nil {
 | 
			
		||||
				return 0, xerrors.Errorf("Failed to unmarshal json. err: %w", err)
 | 
			
		||||
			cs := map[string]gostmodels.UbuntuCVE{}
 | 
			
		||||
			if err := json.Unmarshal([]byte(res.json), &cs); err != nil {
 | 
			
		||||
				return nil, xerrors.Errorf("Failed to unmarshal json. err: %w", err)
 | 
			
		||||
			}
 | 
			
		||||
			for _, content := range detect(fixeds, true, models.SrcPackage{Name: res.request.packName, Version: r.SrcPackages[res.request.packName].Version, BinaryNames: r.SrcPackages[res.request.packName].BinaryNames}, fmt.Sprintf("linux-image-%s", r.RunningKernel.Release)) {
 | 
			
		||||
				c, ok := detects[content.cveContent.CveID]
 | 
			
		||||
				if ok {
 | 
			
		||||
					content.fixStatuses = append(content.fixStatuses, c.fixStatuses...)
 | 
			
		||||
				}
 | 
			
		||||
				detects[content.cveContent.CveID] = content
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		responses, err = getCvesWithFixStateViaHTTP(r, urlPrefix, "unfixed-cves")
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			return 0, xerrors.Errorf("Failed to get unfixed CVEs via HTTP. err: %w", err)
 | 
			
		||||
		}
 | 
			
		||||
		for _, res := range responses {
 | 
			
		||||
			if !res.request.isSrcPack {
 | 
			
		||||
				continue
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			n := strings.NewReplacer("linux-signed", "linux", "linux-meta", "linux").Replace(res.request.packName)
 | 
			
		||||
 | 
			
		||||
			if kernelSourceNamePattern.MatchString(n) {
 | 
			
		||||
				isDetect := false
 | 
			
		||||
				for _, bn := range r.SrcPackages[res.request.packName].BinaryNames {
 | 
			
		||||
					if bn == fmt.Sprintf("linux-image-%s", r.RunningKernel.Release) {
 | 
			
		||||
						isDetect = true
 | 
			
		||||
						break
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
				if !isDetect {
 | 
			
		||||
					continue
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			unfixeds := map[string]gostmodels.UbuntuCVE{}
 | 
			
		||||
			if err := json.Unmarshal([]byte(res.json), &unfixeds); err != nil {
 | 
			
		||||
				return 0, xerrors.Errorf("Failed to unmarshal json. err: %w", err)
 | 
			
		||||
			}
 | 
			
		||||
			for _, content := range detect(unfixeds, false, models.SrcPackage{Name: res.request.packName, Version: r.SrcPackages[res.request.packName].Version, BinaryNames: r.SrcPackages[res.request.packName].BinaryNames}, fmt.Sprintf("linux-image-%s", r.RunningKernel.Release)) {
 | 
			
		||||
			for _, content := range ubu.detect(cs, fixed, models.SrcPackage{Name: res.request.packName, Version: r.SrcPackages[res.request.packName].Version, BinaryNames: r.SrcPackages[res.request.packName].BinaryNames}, fmt.Sprintf("linux-image-%s", r.RunningKernel.Release)) {
 | 
			
		||||
				c, ok := detects[content.cveContent.CveID]
 | 
			
		||||
				if ok {
 | 
			
		||||
					content.fixStatuses = append(content.fixStatuses, c.fixStatuses...)
 | 
			
		||||
@@ -159,39 +148,32 @@ func (ubu Ubuntu) DetectCVEs(r *models.ScanResult, _ bool) (nCVEs int, err error
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	} else {
 | 
			
		||||
		for _, pack := range r.SrcPackages {
 | 
			
		||||
			n := strings.NewReplacer("linux-signed", "linux", "linux-meta", "linux").Replace(pack.Name)
 | 
			
		||||
		for _, p := range r.SrcPackages {
 | 
			
		||||
			n := strings.NewReplacer("linux-signed", "linux", "linux-meta", "linux").Replace(p.Name)
 | 
			
		||||
 | 
			
		||||
			if kernelSourceNamePattern.MatchString(n) {
 | 
			
		||||
				isDetect := false
 | 
			
		||||
				for _, bn := range pack.BinaryNames {
 | 
			
		||||
				isRunning := false
 | 
			
		||||
				for _, bn := range p.BinaryNames {
 | 
			
		||||
					if bn == fmt.Sprintf("linux-image-%s", r.RunningKernel.Release) {
 | 
			
		||||
						isDetect = true
 | 
			
		||||
						isRunning = true
 | 
			
		||||
						break
 | 
			
		||||
					}
 | 
			
		||||
				}
 | 
			
		||||
				if !isDetect {
 | 
			
		||||
				// To detect vulnerabilities in running kernels only, skip if the kernel is not running.
 | 
			
		||||
				if !isRunning {
 | 
			
		||||
					continue
 | 
			
		||||
				}
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			fixeds, err := ubu.driver.GetFixedCvesUbuntu(ubuReleaseVer, n)
 | 
			
		||||
			var f func(string, string) (map[string]gostmodels.UbuntuCVE, error) = ubu.driver.GetFixedCvesUbuntu
 | 
			
		||||
			if !fixed {
 | 
			
		||||
				f = ubu.driver.GetUnfixedCvesUbuntu
 | 
			
		||||
			}
 | 
			
		||||
			cs, err := f(strings.Replace(r.Release, ".", "", 1), n)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				return 0, xerrors.Errorf("Failed to get fixed CVEs for SrcPackage. err: %w", err)
 | 
			
		||||
				return nil, xerrors.Errorf("Failed to get CVEs. release: %s, src package: %s, err: %w", major(r.Release), p.Name, err)
 | 
			
		||||
			}
 | 
			
		||||
			for _, content := range detect(fixeds, true, pack, fmt.Sprintf("linux-image-%s", r.RunningKernel.Release)) {
 | 
			
		||||
				c, ok := detects[content.cveContent.CveID]
 | 
			
		||||
				if ok {
 | 
			
		||||
					content.fixStatuses = append(content.fixStatuses, c.fixStatuses...)
 | 
			
		||||
				}
 | 
			
		||||
				detects[content.cveContent.CveID] = content
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			unfixeds, err := ubu.driver.GetUnfixedCvesUbuntu(ubuReleaseVer, n)
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				return 0, xerrors.Errorf("Failed to get unfixed CVEs for SrcPackage. err: %w", err)
 | 
			
		||||
			}
 | 
			
		||||
			for _, content := range detect(unfixeds, false, pack, fmt.Sprintf("linux-image-%s", r.RunningKernel.Release)) {
 | 
			
		||||
			for _, content := range ubu.detect(cs, fixed, p, fmt.Sprintf("linux-image-%s", r.RunningKernel.Release)) {
 | 
			
		||||
				c, ok := detects[content.cveContent.CveID]
 | 
			
		||||
				if ok {
 | 
			
		||||
					content.fixStatuses = append(content.fixStatuses, c.fixStatuses...)
 | 
			
		||||
@@ -208,8 +190,8 @@ func (ubu Ubuntu) DetectCVEs(r *models.ScanResult, _ bool) (nCVEs int, err error
 | 
			
		||||
				v.CveContents = models.NewCveContents(content.cveContent)
 | 
			
		||||
			} else {
 | 
			
		||||
				v.CveContents[models.UbuntuAPI] = []models.CveContent{content.cveContent}
 | 
			
		||||
				v.Confidences = models.Confidences{models.UbuntuAPIMatch}
 | 
			
		||||
			}
 | 
			
		||||
			v.Confidences.AppendIfMissing(models.UbuntuAPIMatch)
 | 
			
		||||
		} else {
 | 
			
		||||
			v = models.VulnInfo{
 | 
			
		||||
				CveID:       content.cveContent.CveID,
 | 
			
		||||
@@ -224,10 +206,10 @@ func (ubu Ubuntu) DetectCVEs(r *models.ScanResult, _ bool) (nCVEs int, err error
 | 
			
		||||
		r.ScannedCves[content.cveContent.CveID] = v
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return len(detects), nil
 | 
			
		||||
	return maps.Keys(detects), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func detect(cves map[string]gostmodels.UbuntuCVE, fixed bool, srcPkg models.SrcPackage, runningKernelBinaryPkgName string) []cveContent {
 | 
			
		||||
func (ubu Ubuntu) detect(cves map[string]gostmodels.UbuntuCVE, fixed bool, srcPkg models.SrcPackage, runningKernelBinaryPkgName string) []cveContent {
 | 
			
		||||
	n := strings.NewReplacer("linux-signed", "linux", "linux-meta", "linux").Replace(srcPkg.Name)
 | 
			
		||||
 | 
			
		||||
	var contents []cveContent
 | 
			
		||||
@@ -257,7 +239,7 @@ func detect(cves map[string]gostmodels.UbuntuCVE, fixed bool, srcPkg models.SrcP
 | 
			
		||||
						}
 | 
			
		||||
					}
 | 
			
		||||
 | 
			
		||||
					affected, err := isGostDefAffected(installedVersion, patchedVersion)
 | 
			
		||||
					affected, err := ubu.isGostDefAffected(installedVersion, patchedVersion)
 | 
			
		||||
					if err != nil {
 | 
			
		||||
						logging.Log.Debugf("Failed to parse versions: %s, Ver: %s, Gost: %s", err, installedVersion, patchedVersion)
 | 
			
		||||
						continue
 | 
			
		||||
@@ -296,6 +278,18 @@ func detect(cves map[string]gostmodels.UbuntuCVE, fixed bool, srcPkg models.SrcP
 | 
			
		||||
	return contents
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (ubu Ubuntu) isGostDefAffected(versionRelease, gostVersion string) (affected bool, err error) {
 | 
			
		||||
	vera, err := debver.NewVersion(versionRelease)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return false, xerrors.Errorf("Failed to parse version. version: %s, err: %w", versionRelease, err)
 | 
			
		||||
	}
 | 
			
		||||
	verb, err := debver.NewVersion(gostVersion)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return false, xerrors.Errorf("Failed to parse version. version: %s, err: %w", gostVersion, err)
 | 
			
		||||
	}
 | 
			
		||||
	return vera.LessThan(verb), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ConvertToModel converts gost model to vuls model
 | 
			
		||||
func (ubu Ubuntu) ConvertToModel(cve *gostmodels.UbuntuCVE) *models.CveContent {
 | 
			
		||||
	references := []models.Reference{}
 | 
			
		||||
@@ -323,7 +317,7 @@ func (ubu Ubuntu) ConvertToModel(cve *gostmodels.UbuntuCVE) *models.CveContent {
 | 
			
		||||
		Summary:       cve.Description,
 | 
			
		||||
		Cvss2Severity: cve.Priority,
 | 
			
		||||
		Cvss3Severity: cve.Priority,
 | 
			
		||||
		SourceLink:    "https://ubuntu.com/security/" + cve.Candidate,
 | 
			
		||||
		SourceLink:    fmt.Sprintf("https://ubuntu.com/security/%s", cve.Candidate),
 | 
			
		||||
		References:    references,
 | 
			
		||||
		Published:     cve.PublicDate,
 | 
			
		||||
	}
 | 
			
		||||
 
 | 
			
		||||
@@ -10,68 +10,51 @@ import (
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
func TestUbuntu_Supported(t *testing.T) {
 | 
			
		||||
	type args struct {
 | 
			
		||||
		ubuReleaseVer string
 | 
			
		||||
	}
 | 
			
		||||
	tests := []struct {
 | 
			
		||||
		name string
 | 
			
		||||
		args args
 | 
			
		||||
		args string
 | 
			
		||||
		want bool
 | 
			
		||||
	}{
 | 
			
		||||
		{
 | 
			
		||||
			name: "14.04 is supported",
 | 
			
		||||
			args: args{
 | 
			
		||||
				ubuReleaseVer: "1404",
 | 
			
		||||
			},
 | 
			
		||||
			args: "1404",
 | 
			
		||||
			want: true,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "16.04 is supported",
 | 
			
		||||
			args: args{
 | 
			
		||||
				ubuReleaseVer: "1604",
 | 
			
		||||
			},
 | 
			
		||||
			args: "1604",
 | 
			
		||||
			want: true,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "18.04 is supported",
 | 
			
		||||
			args: args{
 | 
			
		||||
				ubuReleaseVer: "1804",
 | 
			
		||||
			},
 | 
			
		||||
			args: "1804",
 | 
			
		||||
			want: true,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "20.04 is supported",
 | 
			
		||||
			args: args{
 | 
			
		||||
				ubuReleaseVer: "2004",
 | 
			
		||||
			},
 | 
			
		||||
			args: "2004",
 | 
			
		||||
			want: true,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "20.10 is supported",
 | 
			
		||||
			args: args{
 | 
			
		||||
				ubuReleaseVer: "2010",
 | 
			
		||||
			},
 | 
			
		||||
			args: "2010",
 | 
			
		||||
			want: true,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "21.04 is supported",
 | 
			
		||||
			args: args{
 | 
			
		||||
				ubuReleaseVer: "2104",
 | 
			
		||||
			},
 | 
			
		||||
			args: "2104",
 | 
			
		||||
			want: true,
 | 
			
		||||
		},
 | 
			
		||||
		{
 | 
			
		||||
			name: "empty string is not supported yet",
 | 
			
		||||
			args: args{
 | 
			
		||||
				ubuReleaseVer: "",
 | 
			
		||||
			},
 | 
			
		||||
			args: "",
 | 
			
		||||
			want: false,
 | 
			
		||||
		},
 | 
			
		||||
	}
 | 
			
		||||
	for _, tt := range tests {
 | 
			
		||||
		t.Run(tt.name, func(t *testing.T) {
 | 
			
		||||
			ubu := Ubuntu{}
 | 
			
		||||
			if got := ubu.supported(tt.args.ubuReleaseVer); got != tt.want {
 | 
			
		||||
			if got := ubu.supported(tt.args); got != tt.want {
 | 
			
		||||
				t.Errorf("Ubuntu.Supported() = %v, want %v", got, tt.want)
 | 
			
		||||
			}
 | 
			
		||||
		})
 | 
			
		||||
@@ -289,7 +272,7 @@ func Test_detect(t *testing.T) {
 | 
			
		||||
	}
 | 
			
		||||
	for _, tt := range tests {
 | 
			
		||||
		t.Run(tt.name, func(t *testing.T) {
 | 
			
		||||
			if got := detect(tt.args.cves, tt.args.fixed, tt.args.srcPkg, tt.args.runningKernelBinaryPkgName); !reflect.DeepEqual(got, tt.want) {
 | 
			
		||||
			if got := (Ubuntu{}).detect(tt.args.cves, tt.args.fixed, tt.args.srcPkg, tt.args.runningKernelBinaryPkgName); !reflect.DeepEqual(got, tt.want) {
 | 
			
		||||
				t.Errorf("detect() = %#v, want %#v", got, tt.want)
 | 
			
		||||
			}
 | 
			
		||||
		})
 | 
			
		||||
 
 | 
			
		||||
							
								
								
									
										21
									
								
								gost/util.go
									
									
									
									
									
								
							
							
						
						
									
										21
									
								
								gost/util.go
									
									
									
									
									
								
							@@ -80,10 +80,9 @@ func getCvesViaHTTP(cveIDs []string, urlPrefix string) (
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
type request struct {
 | 
			
		||||
	osMajorVersion string
 | 
			
		||||
	packName       string
 | 
			
		||||
	isSrcPack      bool
 | 
			
		||||
	cveID          string
 | 
			
		||||
	packName  string
 | 
			
		||||
	isSrcPack bool
 | 
			
		||||
	cveID     string
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func getCvesWithFixStateViaHTTP(r *models.ScanResult, urlPrefix, fixState string) (responses []response, err error) {
 | 
			
		||||
@@ -98,16 +97,14 @@ func getCvesWithFixStateViaHTTP(r *models.ScanResult, urlPrefix, fixState string
 | 
			
		||||
	go func() {
 | 
			
		||||
		for _, pack := range r.Packages {
 | 
			
		||||
			reqChan <- request{
 | 
			
		||||
				osMajorVersion: major(r.Release),
 | 
			
		||||
				packName:       pack.Name,
 | 
			
		||||
				isSrcPack:      false,
 | 
			
		||||
				packName:  pack.Name,
 | 
			
		||||
				isSrcPack: false,
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
		for _, pack := range r.SrcPackages {
 | 
			
		||||
			reqChan <- request{
 | 
			
		||||
				osMajorVersion: major(r.Release),
 | 
			
		||||
				packName:       pack.Name,
 | 
			
		||||
				isSrcPack:      true,
 | 
			
		||||
				packName:  pack.Name,
 | 
			
		||||
				isSrcPack: true,
 | 
			
		||||
			}
 | 
			
		||||
		}
 | 
			
		||||
	}()
 | 
			
		||||
@@ -142,11 +139,11 @@ func getCvesWithFixStateViaHTTP(r *models.ScanResult, urlPrefix, fixState string
 | 
			
		||||
		case err := <-errChan:
 | 
			
		||||
			errs = append(errs, err)
 | 
			
		||||
		case <-timeout:
 | 
			
		||||
			return nil, xerrors.New("Timeout Fetching OVAL")
 | 
			
		||||
			return nil, xerrors.New("Timeout Fetching Gost")
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
	if len(errs) != 0 {
 | 
			
		||||
		return nil, xerrors.Errorf("Failed to fetch OVAL. err: %w", errs)
 | 
			
		||||
		return nil, xerrors.Errorf("Failed to fetch Gost. err: %w", errs)
 | 
			
		||||
	}
 | 
			
		||||
	return
 | 
			
		||||
}
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user