summaryrefslogtreecommitdiffstats
path: root/bin
Commit message (Collapse)AuthorAgeFilesLines
* Remove "NVD severity" from the web UITianon Gravi2022-05-171-9/+0
| | | | | | This is really misleading for users as it represents NVD's opinion on the severity of CVEs, but does *not* necessarily reflect the views of the Debian Security Team (and is often misconstrued by users as though it does). There should probably also be deeper database changes to no longer store this value, but removing it from the website seems like a good (small) place to start.
* lts-cve-triage: triage_possible_missed_fixes: skip packages already in ↵Sylvain Beucler2022-04-211-2/+3
| | | | dla-needed
* lts-cve-triage: track buster/stable updates suited for LTSSylvain Beucler2022-04-211-0/+13
| | | | | (re-committed with proper authorship and commit information) See https://lists.debian.org/debian-lts/2022/04/msg00011.html
* Revert lts-cve-triage.py changesSylvain Beucler2022-04-211-13/+1
| | | | This reverts commit 3fceb4e21a287674f166442ed8f5e563010710ff.
* LTS: triage asteriskAnton Gladky2022-04-211-1/+13
|
* lts-cve-triage: minor code clarificationSylvain Beucler2022-04-141-2/+2
|
* lts-cve-triage: support debian-security-support patternsSylvain Beucler2022-04-141-2/+6
| | | | e.g. better analysis for "node-moment" and "golang-github-prometheus-client-golang"
* lts-cve-triage.py: handle /stable /oldstable notations in dsa-needed.txtSylvain Beucler2022-04-021-1/+3
| | | | e.g. twig/oldstable
* Allow merge-cve-files to let RESERVED throughNeil Williams2022-02-151-1/+8
| | | | | | | Avoid merge-cve-files stumbling over FlagAnnotations like RESERVED and REJECTED. Also add code to tidy up the .xpck files that can be generated by the merge process.
* gen-DSA: don't set extracvefile to "null"Emilio Pozuelo Monfort2022-02-091-1/+1
| | | | | ...if the file config key doesn't exist, otherwise git commit will fail.
* Merge branch 'grabcvefix' into 'master'Neil Williams2022-02-033-1/+831
|\ | | | | | | | | grab-cve-in-fix #1001451 See merge request security-tracker-team/security-tracker!100
| * Improve error handling in grab-cve-in-fixNeil Williams2022-01-271-5/+36
| | | | | | | | | | | | Catch and report on possible typos in changes entries to better support maintainers pre-checking the d.changelog entries before upload - as long as the .changes file is signed.
| * Pylint updatesNeil Williams2022-01-272-97/+60
| | | | | | | | Extend linelength to 120 in black.
| * Update grab-cve-in-fix for known examplesNeil Williams2022-01-273-26/+180
| | | | | | | | | | | | | | | | | | | | Support catching errors in the d.changelog Add support for forcing a specific version Fix typo in new support in bin/merge-cve-files Update support in update-vuln to insert new PackageAnnotations in specific order.
| * Add remaining support and switch to using loggingNeil Williams2022-01-271-21/+146
| | | | | | | | | | | | Add support to add a bug number. Add warnings in --help that each update must be merged before the same CVE can be updated again.
| * Add support for merging NOTE: StringAnnotationsNeil Williams2022-01-271-1/+46
| |
| * Add support for --input accepting email text on STDINNeil Williams2022-01-271-27/+78
| |
| * Add initial update-vuln scriptNeil Williams2022-01-271-0/+182
| |
| * grab-cve-in-fix #1001451Neil Williams2022-01-271-0/+279
| | | | | | | | Add a tool to ease processing of new uploads which fix CVEs
* | gen-DSA: diff and commit changes to extracvefileEmilio Pozuelo Monfort2022-02-011-2/+5
| | | | | | | | In case we're processing a dist that uses an ExtendFile.
* | gen-DSA: sanitize DISTS var after calculating itEmilio Pozuelo Monfort2022-02-011-1/+3
| | | | | | | | Rather than have every user have to do it.
* | remove-cve-dist-tags: remove empty CVE entriesEmilio Pozuelo Monfort2022-02-011-0/+6
|/ | | | | This can happen in ExtendFiles if they only contain dist tags that are being removed.
* gen-DSA: Allow one more digit for the old style bug number formatSalvatore Bonaccorso2022-01-121-1/+1
| | | | | | | | The # prefixed bugnumber format was prefered to pass to the script, still we have the alternative of the digits only. Just bump the allowed digits by one now that we reached the 100000's bug. Signed-off-by: Salvatore Bonaccorso <carnil@debian.org>
* Revert "tracker_service: sort releases in CVE pages"Salvatore Bonaccorso2021-11-301-3/+2
| | | | | | | | | | This reverts commit 8795311fe744f6669fdf3da1ae281615aa97450a. This causes issues e.g. on https://security-tracker.debian.org/tracker/CVE-2021-20313. Revert the change for now, but should be re-add once the bug can be fixed.
* tracker_service: sort releases in CVE pagesEmilio Pozuelo Monfort2021-11-251-2/+3
|
* check-new-issues: implement review commentsNeil Williams2021-11-191-2/+2
| | | | Move the print statements inside the conditional.
* Improve check-new-issues for new usersNeil Williams2021-11-191-3/+10
| | | | | Print the supported commands before entering interactive mode. Skip if only listing the CVEs
* bin/lts-missing-uploads: drop the .py extensionEmilio Pozuelo Monfort2021-11-101-0/+0
|
* bin/lts-missing-uploads.py: also get contrib & non-freeEmilio Pozuelo Monfort2021-11-101-6/+12
| | | | | Otherwise we will crash if there's a DLA for a package in one of those components.
* gen-DSA: only call remove-cve-dist-tags if there's dist infoEmilio Pozuelo Monfort2021-11-071-1/+3
| | | | | | | | | | When calling gen-DSA without --save, there's no version/release information, so skip the call there to avoid a crash. In those situations, gen-DSA will be called once more when the DSA is ready with the --save argument, and we'll then remove the appropriate CVE tags. Closes #9
* gen-DSA: Hanlde CVE list in DLA/ELA mode as wellSalvatore Bonaccorso2021-11-061-2/+2
| | | | | | | | | | The recent addition of the remove-cve-dist-tags hook in gen-D[SL]A script removes entries from data/CVE/list when they had a no-dsa (or it's substates) which are handled in the update. When gen-DSA script is invoked in DLA mode though, there is a mechanism to automatically commit the changes (and option to push) but that did not take into account the changes in data/CVE/list.
* tracker_data: setup paths before importing local modulesEmilio Pozuelo Monfort2021-11-051-0/+2
|
* gen-DSA: only call remove-cve-dist-tags onceEmilio Pozuelo Monfort2021-11-031-1/+5
| | | | | | | | | And do it after we've asked for all the versions. Calling the script after asking for each version and before asking for the next is annoying as the script takes some time due to the size of CVE/list. This way not only do we avoid that wait between user inputs, but we also avoid calling the script and thus parsing CVE/list multiple times.
* bin/remove-cve-dist-tags: accept multiple releasesEmilio Pozuelo Monfort2021-11-031-6/+8
| | | | The release argument is a comma-separated list now.
* gen-DSA: call remove-cve-dist-tagsEmilio Pozuelo Monfort2021-11-031-0/+1
| | | | | This will remove 'obsolete' tags for a CVE for a given release and package if it is being fixed in a security update.
* Add a script to remove dist tags (e.g. postponed) from CVE/listEmilio Pozuelo Monfort2021-11-031-0/+60
| | | | | This can be useful when releasing a DSA that fixes some CVEs that were previously triaged as no-dsa.
* gen-D[LS]A: Replace use of which with command -vSalvatore Bonaccorso2021-08-211-2/+2
| | | | | | | As debianutils 5.3-1 deprecates the use of which and will be removed in a future update, switch to the command shell builtin. Signed-off-by: Salvatore Bonaccorso <carnil@debian.org>
* List packages from oldstable and stable for dsa-needed listSalvatore Bonaccorso2021-08-121-1/+1
| | | | | | | | Include in listing the oldstable distribution by enabling the boolean value "include_oldstable" to true and so enabling the including logic later on in the script. Signed-off-by: Salvatore Bonaccorso <carnil@debian.org>
* Not making any changes to a foo-needed.txt file may also indicate a ↵Chris Lamb2021-08-091-1/+1
| | | | misspelled (or conflated) source package name.
* dla: claim openexrSylvain Beucler2021-07-281-1/+1
|
* bin/lts-needs-forward-port: fix lib pathSylvain Beucler2021-07-241-1/+1
|
* Fix report-vuln for Python 3Moritz Mühlenhoff2021-07-011-1/+1
|
* embedded-cleanup: Switch to use coccia.d.o hardcodedSalvatore Bonaccorso2021-06-021-2/+2
| | | | | | | Alioth went away a long time ago, but the UDD database can be queried from the DD accessible coccia.debian.org. Signed-off-by: Salvatore Bonaccorso <carnil@debian.org>
* merge-cve-files: fix variable name in assertion messageEmilio Pozuelo Monfort2021-05-141-1/+1
| | | | And slightly improve the message while at it.
* tracker_service: also sort CVEs on stable-like pagesEmilio Pozuelo Monfort2021-04-301-2/+4
|
* Sort CVEs as versionsSylvain Beucler2021-04-301-4/+4
|
* lts: take glib2.0Emilio Pozuelo Monfort2021-02-181-1/+18
|
* lts-cve-triage.py: Setup paths early due to transitive imports in ↵Chris Lamb2021-02-151-1/+2
| | | | tracker_data.py.
* Fix CVE10k problem for CVE with more than 4 numbersCarles Pina i Estany2021-02-152-22/+19
| | | | | | | It had no consequences in security-tracker: the next-oldstable-point-update.txt file is empty and the next-point-update.txt CVEs are not used yet for what I can see via this code path.
* merge-cve-files: support replacing main (sid) annotationsEmilio Pozuelo Monfort2021-02-031-9/+16
|

© 2014-2024 Faster IT GmbH | imprint | privacy policy