144 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			144 lines
		
	
	
		
			3.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
//go:build !scanner
 | 
						|
// +build !scanner
 | 
						|
 | 
						|
package oval
 | 
						|
 | 
						|
import (
 | 
						|
	"fmt"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"golang.org/x/xerrors"
 | 
						|
 | 
						|
	"github.com/future-architect/vuls/logging"
 | 
						|
	"github.com/future-architect/vuls/models"
 | 
						|
	ovaldb "github.com/vulsio/goval-dictionary/db"
 | 
						|
	ovalmodels "github.com/vulsio/goval-dictionary/models"
 | 
						|
)
 | 
						|
 | 
						|
// SUSE is the struct of SUSE Linux
 | 
						|
type SUSE struct {
 | 
						|
	Base
 | 
						|
}
 | 
						|
 | 
						|
// NewSUSE creates OVAL client for SUSE
 | 
						|
func NewSUSE(driver ovaldb.DB, baseURL, family string) SUSE {
 | 
						|
	// TODO implement other family
 | 
						|
	return SUSE{
 | 
						|
		Base{
 | 
						|
			driver:  driver,
 | 
						|
			baseURL: baseURL,
 | 
						|
			family:  family,
 | 
						|
		},
 | 
						|
	}
 | 
						|
}
 | 
						|
 | 
						|
// FillWithOval returns scan result after updating CVE info by OVAL
 | 
						|
func (o SUSE) FillWithOval(r *models.ScanResult) (nCVEs int, err error) {
 | 
						|
	var relatedDefs ovalResult
 | 
						|
	if o.driver == nil {
 | 
						|
		if relatedDefs, err = getDefsByPackNameViaHTTP(r, o.baseURL); err != nil {
 | 
						|
			return 0, xerrors.Errorf("Failed to get Definitions via HTTP. err: %w", err)
 | 
						|
		}
 | 
						|
	} else {
 | 
						|
		if relatedDefs, err = getDefsByPackNameFromOvalDB(r, o.driver); err != nil {
 | 
						|
			return 0, xerrors.Errorf("Failed to get Definitions from DB. err: %w", err)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	for _, defPacks := range relatedDefs.entries {
 | 
						|
		o.update(r, defPacks)
 | 
						|
	}
 | 
						|
 | 
						|
	for _, vuln := range r.ScannedCves {
 | 
						|
		if conts, ok := vuln.CveContents[models.SUSE]; ok {
 | 
						|
			for i, cont := range conts {
 | 
						|
				cont.SourceLink = fmt.Sprintf("https://www.suse.com/security/cve/%s.html", cont.CveID)
 | 
						|
				vuln.CveContents[models.SUSE][i] = cont
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return len(relatedDefs.entries), nil
 | 
						|
}
 | 
						|
 | 
						|
func (o SUSE) update(r *models.ScanResult, defpacks defPacks) {
 | 
						|
	ovalContent := o.convertToModel(&defpacks.def)
 | 
						|
	if ovalContent == nil {
 | 
						|
		return
 | 
						|
	}
 | 
						|
	ovalContent.Type = models.NewCveContentType(o.family)
 | 
						|
	vinfo, ok := r.ScannedCves[ovalContent.CveID]
 | 
						|
	if !ok {
 | 
						|
		logging.Log.Debugf("%s is newly detected by OVAL", ovalContent.CveID)
 | 
						|
		vinfo = models.VulnInfo{
 | 
						|
			CveID:       ovalContent.CveID,
 | 
						|
			Confidences: models.Confidences{models.OvalMatch},
 | 
						|
			CveContents: models.NewCveContents(*ovalContent),
 | 
						|
		}
 | 
						|
	} else {
 | 
						|
		cveContents := vinfo.CveContents
 | 
						|
		ctype := models.NewCveContentType(o.family)
 | 
						|
		if _, ok := vinfo.CveContents[ctype]; ok {
 | 
						|
			logging.Log.Debugf("%s OVAL will be overwritten", ovalContent.CveID)
 | 
						|
		} else {
 | 
						|
			logging.Log.Debugf("%s is also detected by OVAL", ovalContent.CveID)
 | 
						|
			cveContents = models.CveContents{}
 | 
						|
		}
 | 
						|
		vinfo.Confidences.AppendIfMissing(models.OvalMatch)
 | 
						|
		cveContents[ctype] = []models.CveContent{*ovalContent}
 | 
						|
		vinfo.CveContents = cveContents
 | 
						|
	}
 | 
						|
 | 
						|
	// uniq(vinfo.AffectedPackages[].Name + defPacks.binpkgFixstat(map[string(=package name)]fixStat{}))
 | 
						|
	collectBinpkgFixstat := defPacks{
 | 
						|
		binpkgFixstat: map[string]fixStat{},
 | 
						|
	}
 | 
						|
	for packName, fixStatus := range defpacks.binpkgFixstat {
 | 
						|
		collectBinpkgFixstat.binpkgFixstat[packName] = fixStatus
 | 
						|
	}
 | 
						|
 | 
						|
	for _, pack := range vinfo.AffectedPackages {
 | 
						|
		collectBinpkgFixstat.binpkgFixstat[pack.Name] = fixStat{
 | 
						|
			notFixedYet: pack.NotFixedYet,
 | 
						|
			fixedIn:     pack.FixedIn,
 | 
						|
		}
 | 
						|
	}
 | 
						|
	vinfo.AffectedPackages = collectBinpkgFixstat.toPackStatuses()
 | 
						|
	vinfo.AffectedPackages.Sort()
 | 
						|
	r.ScannedCves[ovalContent.CveID] = vinfo
 | 
						|
}
 | 
						|
 | 
						|
func (o SUSE) convertToModel(def *ovalmodels.Definition) *models.CveContent {
 | 
						|
	refs := []models.Reference{}
 | 
						|
	for _, r := range def.References {
 | 
						|
		refs = append(refs, models.Reference{
 | 
						|
			Link:   r.RefURL,
 | 
						|
			Source: r.Source,
 | 
						|
			RefID:  r.RefID,
 | 
						|
		})
 | 
						|
	}
 | 
						|
 | 
						|
	var c *models.CveContent
 | 
						|
	for _, cve := range def.Advisory.Cves {
 | 
						|
		switch {
 | 
						|
		case strings.Contains(cve.Href, "www.suse.com"):
 | 
						|
			score3, vec3 := parseCvss3(cve.Cvss3)
 | 
						|
			return &models.CveContent{
 | 
						|
				Title:         def.Title,
 | 
						|
				Summary:       def.Description,
 | 
						|
				CveID:         strings.TrimSuffix(cve.CveID, " at SUSE"),
 | 
						|
				Cvss3Score:    score3,
 | 
						|
				Cvss3Vector:   vec3,
 | 
						|
				Cvss3Severity: cve.Impact,
 | 
						|
				References:    refs,
 | 
						|
			}
 | 
						|
		default:
 | 
						|
			c = &models.CveContent{
 | 
						|
				Title:      def.Title,
 | 
						|
				Summary:    def.Description,
 | 
						|
				CveID:      strings.TrimSuffix(cve.CveID, " at NVD"),
 | 
						|
				References: refs,
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return c
 | 
						|
}
 |