Merge ~alexmurray/ubuntu-cve-tracker:add-cpes-to-check-cves into ubuntu-cve-tracker:master
Status: | Needs review |
---|---|
Proposed branch: | ~alexmurray/ubuntu-cve-tracker:add-cpes-to-check-cves |
Merge into: | ubuntu-cve-tracker:master |
Diff against target: |
204 lines (+83/-11) 1 file modified
scripts/check-cves (+83/-11) |
Related bugs: |
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Ubuntu Security Team | Pending | ||
Review via email: mp+447308@code.staging.launchpad.net |
Description of the change
Will do some more testing with this change during CVE triage tomorrow, but it gives much better support for smarter ignore entries - ie:
./scripts/
Loading /home/amurray/
Loading ./nvdcve-
97% [======
*******
CVE-2023-3519 (1/1: 100%)
https:/
*******
Published: 2023-07-19 18:15:00 UTC
MISC: https:/
=======
CVE-2023-3519
Unauthenticated remote code execution
CVSS (nvd): CVSS:3.
CVE-2023-3519 ignore Citrix Netscaler Application Delivery Controller
A]dd (or R]epeat), I]gnore forever, S]kip for now, or Q]uit? [skip] I
Reason to be ignored?
a) Unauthenticated remote code execution
b) Citrix Netscaler Application Delivery Controller
c) Citrix Netscaler Gateway
There was an error fetching revisions from git servers. Please try again in a few minutes. If the problem persists, contact Launchpad support.
I tried this branch as part of triage today, and it failed when looking
at a non-json file:
$ ./scripts/ check-cves --cve CVE-2023-37919 allitems.xml git/cve_ trackers/ debian- security- tracker/ data/CVE/ list ... ======= ======= ======= ======= ======= ======= === ] 261292008 ETA: 0:00:01 steve/git/ ubuntu- cve-tracker/ ./scripts/ check-cves" , line 1736, in <module> parse(readable) python3. 11/xml/ sax/expatreader .py", line 111, in parse IncrementalPars er.parse( self, source) python3. 11/xml/ sax/xmlreader. py", line 125, in parse feed(buffer) python3. 11/xml/ sax/expatreader .py", line 217, in feed _parser. Parse(data, isFinal) pyexpat. c", line 468, in EndElement python3. 11/xml/ sax/expatreader .py", line 336, in end_element _cont_handler. endElement( name) steve/git/ ubuntu- cve-tracker/ ./scripts/ check-cves" , line 782, in endElement handle_ cve() steve/git/ ubuntu- cve-tracker/ ./scripts/ check-cves" , line 813, in handle_cve cve_data[ self.curr_ cve].setdefault ('cpes' , [] + self.curr_cpes)
^^^^^^ ^^^^^^^ ^
Loading /home/steve/
Loading allitems.xml ...
Traceback (most recent call last):=
File "/home/
parser.
File "/usr/lib/
xmlreader.
File "/usr/lib/
self.
File "/usr/lib/
self.
File "../Modules/
File "/usr/lib/
self.
File "/home/
self.
File "/home/
self.
AttributeError: 'CVEHandler' object has no attribute 'curr_cpes'. Did you mean: 'curr_cve'?
--
Steve Beattie
<email address hidden>