* refactor: cve_client.go * refactor: don't use global Config in private func * remove import alias for config * refactor: dbclient * refactor: resultDir * refactor: resultsDir * refactor * refactor: gost * refactor: db client * refactor: cveDB * refactor: cvedb * refactor: exploitDB * refactor: remove detector/dbclient.go * refactor: writer * refactor: syslog writer * refactor: ips * refactor: ensureResultDir * refactor: proxy * fix(db): call CloseDB * add integration test * feat(report): sort array in json * sort func for json diff * add build-int to makefile * add int-rds-redis to makefile * fix: test case, makefile * fix makefile * show cve count after diff * make diff * diff -c * sort exploits in json for diff * sort metasploit, exploit
71 lines
1.6 KiB
Go
71 lines
1.6 KiB
Go
// +build !scanner
|
|
|
|
package oval
|
|
|
|
import (
|
|
"github.com/future-architect/vuls/config"
|
|
"github.com/future-architect/vuls/constant"
|
|
"github.com/future-architect/vuls/logging"
|
|
"github.com/future-architect/vuls/models"
|
|
)
|
|
|
|
// Alpine is the struct of Alpine Linux
|
|
type Alpine struct {
|
|
Base
|
|
}
|
|
|
|
// NewAlpine creates OVAL client for SUSE
|
|
func NewAlpine(cnf config.VulnDictInterface) Alpine {
|
|
return Alpine{
|
|
Base{
|
|
family: constant.Alpine,
|
|
Cnf: cnf,
|
|
},
|
|
}
|
|
}
|
|
|
|
// FillWithOval returns scan result after updating CVE info by OVAL
|
|
func (o Alpine) FillWithOval(r *models.ScanResult) (nCVEs int, err error) {
|
|
var relatedDefs ovalResult
|
|
if o.Cnf.IsFetchViaHTTP() {
|
|
if relatedDefs, err = getDefsByPackNameViaHTTP(r, o.Cnf.GetURL()); err != nil {
|
|
return 0, err
|
|
}
|
|
} else {
|
|
driver, err := newOvalDB(o.Cnf, r.Family)
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
defer func() {
|
|
if err := driver.CloseDB(); err != nil {
|
|
logging.Log.Errorf("Failed to close DB. err: %+v")
|
|
}
|
|
}()
|
|
|
|
if relatedDefs, err = getDefsByPackNameFromOvalDB(driver, r); err != nil {
|
|
return 0, err
|
|
}
|
|
}
|
|
for _, defPacks := range relatedDefs.entries {
|
|
o.update(r, defPacks)
|
|
}
|
|
|
|
return len(relatedDefs.entries), nil
|
|
}
|
|
|
|
func (o Alpine) update(r *models.ScanResult, defPacks defPacks) {
|
|
cveID := defPacks.def.Advisory.Cves[0].CveID
|
|
vinfo, ok := r.ScannedCves[cveID]
|
|
if !ok {
|
|
logging.Log.Debugf("%s is newly detected by OVAL", cveID)
|
|
vinfo = models.VulnInfo{
|
|
CveID: cveID,
|
|
Confidences: []models.Confidence{models.OvalMatch},
|
|
}
|
|
}
|
|
|
|
vinfo.AffectedPackages = defPacks.toPackStatuses()
|
|
vinfo.AffectedPackages.Sort()
|
|
r.ScannedCves[cveID] = vinfo
|
|
}
|