aboutsummaryrefslogtreecommitdiffstats
AgeCommit message (Collapse)Author
2024-02-03srtool: fix typo, add example for CVE traceHEADmasterDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2024-02-03srtool: fix CVE detail when no data sourceDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2024-02-03srtool: fix CVE detail crash on empty refernce fieldsDavid Reyna
[YOCTO #15382] Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-12-11tool to move 'new' CVEs to 'historical' stateDavid Reyna
When bootstrapping an installation, useful to move existing new CVEs to historical so that CVE triage can start as of a selected data. Usage: $ ./bin/cve_checker/srtool_cvechecker.py --new-to-historical all $ ./bin/cve_checker/srtool_cvechecker.py --new-to-historical 2023-12-01 [YOCTO #15317] Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-12-08cve_checker:push missing migration filesDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-11-29Fix report dates, Ubuntu alternate CVE reportingDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-11-20SRTool: managed CVE Checker import channelsDavid Reyna
This feature provides table-driven import channels for the CVE CheckAudit creation feature. The supported channel types include: * File from git repo, with automatic cloning * Auto Builder repo as a default channel * File upload * File over SSH via PEM files * File from local directory (to the Server) * Ability to specify a directory, and display an option list of sub- directories to user (e.g. the Auto Builder case) Resources local to the server are safely provisioned by the SRTool manager. [YOCTO #15282] Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-11-20remove errant tenable fileDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-11-19fix clone directory location for trivy reposDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-11-19improve up-patched report formattingDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-11-19add alternate source ubuntu_trivyDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-11-19fix wr_tricy exec callDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-11-18Add first comparible to un-patched summuary reportDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-11-15SRTool: prototype implementation of CVE Checker auditsDavid Reyna
Feature: 1. Ability to import CVE Checker results JSON files into SRTool as an audit 2. Ability to examine the results 3. Ability to generate reports 4. Ability to examine specific CVEs, and compare the status to multiple sources (e.g. Red Hat, Ubuntu). 5. Add Wind River as one of the multiple sources (via WR's Trivy shared repo) [YOCTO #15281] Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-10-24fix NIST disable defaults for 2022 and 2023David Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-10-20strip NVD 'descritions' with embedded leading blank linesDavid Reyna
[YOCTO #15242] Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-10-18Allow creation order sort via rec id for triage pageDavid Reyna
[YOCTO #13624] Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-10-18srtool: abstract the default base URLDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-10-18srtool: fix ttpe in user's pageDavid Reyna
[YOCTO #13622] Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-10-18srtool: sort by dates in triage pageDavid Reyna
[YOCTO #13623] Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-10-16Update sanity check import paths plus improved outputDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-10-16Fix dbtype multiple spellingsDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-10-14Initially disable Mitre to assist bootstrapDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-10-14disable scoring background task until after CVE bootstrapDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-10-14Fix default port to traditional 9000 for SRToolDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-10-14reset default URL to srtguiDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-10-13Add default recipe name listDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>
2023-10-13srtool: bulk update to SRTool version 2.01David Reyna
Enhancements include: * Django 4 support * Transition to dict for backend SQL recordsi * Update CVE sources to 2023 * Progress bars * User triggered datasource execution * Enhanced backgroup task management * User timezones * Support and migration for Postgres * Support for HTTPS front end Signed-off-by: David Reyna <David.Reyna@windriver.com>
2020-02-02srtool: add 'affected-components' and ErrorLog migrationsrtool_v1.09cody.yu@windriver.com
Add the migration file for the new Error Log class and 'affect-components' fields. Signed-off-by: david.reyna@windriver.com <david.reyna@windriver.com>
2020-02-02srtool: extend 'Affected Components', add Error Logcody.yu@windriver.com
* Add "Affected Components" to VUL/INV/DEF, with automatic inheritance on creation from respective parent records. With this is a one-time fixup routine to populate these new fields: ./bin/common/srtool_utils.py \ --fix-inherit-affected-components -f * Add "Error Log", to capture internal errors in a formal table and view. Management > Maintenance > Error Logs * Sort the Product list when add product investigation links to Vulnerability records. * Add Reports for Notification and Error Log * Other small fixes Signed-off-by: david.reyna@windriver.com <david.reyna@windriver.com>
2020-01-31srtool: enhance database utility validation and repair functionsDavid Reyna
1. Support analyzing alternate databases (e.g. backups) with potentially older schemas by autogenerating and loading respective "srt_schema.py" files, using the '--database /path/to/srt.sqlite' option. 2. Add the following reports to help analyize the distribution of V3/V2 severity values across the CVE years and across the CVE/VUL/INV records. This helps spot trends and potential translation errors. ./bin/common/srtool_utils.py --report-cve-status-summary ./bin/common/srtool_utils.py --report-db-status-summary 3. Add a report to display VUL/INV/DEF recoords that are unattached to any parent CVE/VUL/INV records respectively. ./bin/common/srtool_utils.py --report-unattached-records 4. Update the repair routines to report issues, but only fix them if the "--force" flag is set. This allows the review of the potential fixes before committing them. 5. General clean and internal documentation. Rename the commands to better distinguish "fix" (one-shot), "repair" (on-going), and "report" functions. Signed-off-by: David Reyna <David.Reyna@windriver.com>
2020-01-31srtool: preset foreign keys in object creationDavid Reyna
The model for vulnerabilities and investigation is more stringent in defining the foreign keys when creating records. Set these values when creating a record to avoid a 'null-constraint' error. Signed-off-by: David Reyna <David.Reyna@windriver.com>
2020-01-26srtool: inherit comments to new vulnerabilitys and investigationsSRTOOL_DJANGO_1_11David Reyna
When creating a new Vulnerability or Investigation, inherit the parent object's (CVE/Vulnerability) "comments" field. Signed-off-by: David Reyna <David.Reyna@windriver.com>
2020-01-26srtool: disable table display cachingDavid Reyna
Normally the Table display feature caches served pages for faster refresh. However, in the SRTool the data is very volaile so this often shows stale information. For now, disable the caching. Signed-off-by: David Reyna <David.Reyna@windriver.com>
2020-01-26srtool: fix NIST modified pre-emption, bad cvesource mappingsDavid Reyna
1.Fix NIST modified pre-emption * When a CVE appears in the 'Modified' source * Remove the CVE link to the normal source * Add the CVE link to the modified source * When a CVE disappears from the 'Modified' source * Remove the CVE link from the modified source * Restore the CVE link to the normal source * If forcing a normal source update, first gather the CVEs in the current "Modified" source, and ignore them when scanning the normal source. This is to avoid regressive updates. * Add tracing to help validate this workflow. 2. Fix sql_cve_query() to always return a valid cve_id even when there are no updates, to avoid adding cvesource mappings to '-1'. This addresses one of the issues in '--find-bad-links'. 3. In the NIST details web page, force the display of impact and exploit scores to two decimal places, to normalize the current NIST feeds that are outputting 8+ decimal places. Signed-off-by: David Reyna <David.Reyna@windriver.com>
2020-01-24srtool: fix alt-source updates, improve CVE repairDavid Reyna
1. Fix the NIST 'alt-source' routine to correctly use the current 'modified' datasource to preempt the regular datasources, and also set the CVE datasource links accordingly. 2. Update the CVE NIST improve Score/Severity repair, also insure that the 'modified' datasource values pre-empt the regular datasource values. Also, fix missing and/or obsolete NIST datasource references for CVEs. ./bin/common/srtool_utils.py --fix-severity [ALL|"NIST Modified Data"|...] 3. Add/improve helper routine to list Score/Severity values across the many NIST data sources (e.g. modified and regular), plus the the current CVE values and the current CVE datasource links. This is used to investigate and validate the above repair routine. ./bin/nist/srtool_nist.py -S CVE-2020-7470 Signed-off-by: David Reyna <David.Reyna@windriver.com>
2020-01-23srtool: fix routine for broken V3/V2 status in CVE recordsDavid Reyna
Add a fixup utility to repair error from the MITRE CVE creation script that left broken V2 status values. Also add a NIST status summary debug command to report the CVE general status across the base source file, the 'modified' source file, and list the current datasource mappings for that CVE. Signed-off-by: David Reyna <David.Reyna@windriver.com>
2020-01-22srtool: fix score_date formatDavid Reyna
The schema for this field is 'models.DateField' but the scoring method in "srtool_common --score-new-cves" was setting an obsolete date_time value. That crashes Django-2.2 (but not Django-1.11). Signed-off-by: David Reyna <David.Reyna@windriver.com>
2020-01-21srtool: publish leave product empty if not investigationDavid Reyna
In the summary publish report, leave the product cell blank if there is no Investigation. Signed-off-by: David Reyna <David.Reyna@windriver.com>
2020-01-21srtool: add CVE summary report to core reportsDavid Reyna
Add the generic CVE summary report across products to the core report list. Signed-off-by: David Reyna <David.Reyna@windriver.com>
2020-01-21srtool: add publishing, update backup scanning, MITRE init fixDavid Reyna
Add CVE publishing features, specifically add a method to generate CVE status across the releases, filterable by CVE status. Add dynamic schema calculations for the backup database snapshots, to enable difference scanning even when the schema has been reordered after a migration. Add first part of database difference scanning code migration. Fix MITRE scanning for new source files. [YOCTO #13734] Signed-off-by: David Reyna <David.Reyna@windriver.com>
2020-01-12srtool: add MITRE 2020David Reyna
Add the MITRE 2020 data source [YOCTO #13734] Signed-off-by: David Reyna <David.Reyna@windriver.com>
2020-01-12Bug 13734 - cumulative deployment features and fixesDavid Reyna
srtool: cumulative deployment features and fixes High level new features: * Publishing support to external/public databases * Ability to label products as "active", "inactive", "under development" Inactive (EOL) products appear but * Do not affect status propagation * Do not auto-create defects Development product status is not exported to pubic database * Extend NIST download range to 2002..2019 * Added MITRE downloads to provide RESERVED tracking * Extended audit history tracking and meta-data * Delete CVE records * Ability to do "OR" searches (default is "AND") Example: "CVE-2019-20095 OR CVE-2019-20096 OR CVE-2019-19977" * Automated defect creation (Jira) If selected, creates customer defect for selected and active products Reuse existing defect if present for given product * Many small sorting, readability, edge case fixes Backups: * Add meta-data stamp file for each backup * Save daily backups with day name instead of day number * Preserve file dates when making copies to backup * Add list command Automated Updates: * Fix report format * Add trial run test Utilities: * Add 13 new database fix up procedures Some are one-shot historical fixes, some are learned validation checks Database Schema: * Add "SRTool" class to wrap shared enumerations (e.g. Priority) * Add "Update" class to tag and track audit trail objects * Change Priority naming to match CVE model instead of JIRA * Add srt_created/srt_updated to CVE/Vul/Inv/Notify for improved updating and auditing * Add to Defect the SRT versions of Status, Priority, Outcome To distinguish these from the customer's defect system's values Common Tools: * Fix new CVE auto-scoring to skip CVE's already scored (though still NEW) * Add automated propagation of Defects/Investigations status to parent Vulnerabilities See "srtool_common.py" for rule details CVEs: * Add MITRE as an automatic upstream source This is to specifically capture all of the "RESERVED" CVE enumerations which will not appear in the MIST databases, and have the CVE records in place for internal investigations and transitions to "public" status. * Spell out the command arguments in the NIST data source files for greater legibility * Change Priority naming to match CVE instead of JIRA * Add parallel status states for "inactive" products This specifically blocks state propagation from inactive objects to active objects NIST management script: * Refactor file for greater clarity * Reorder methods to reflect workflow order * Fully spell out names of objects * Remove temporary holding class "CVE" in favor of dictionary objects * Debugging enhancements * Incremental update commands for stepped debugging For example, ability to fetch/update specific CVE(s) * Additional debugging flags [YOCTO #13734] Signed-off-by: David Reyna <David.Reyna@windriver.com>
2019-02-20srtool_reports: fix investigations product filter, CVE reportDavid Reyna
Fix the key for the product filter in the investigations table, and the output for full reports in the CVE->defects report. Signed-off-by: David Reyna <David.Reyna@windriver.com>
2019-02-20srtool_update: improve update reporting and schedulingDavid Reyna
Track the current running update task in ".srtupdate.task" to help track background update activity and overhead. Make calls to the update start/stop absolute paths to help track active SRTool tasks, especially between multiple servers. Signed-off-by: David Reyna <David.Reyna@windriver.com>
2019-02-20srtool_common: fix package updatesDavid Reyna
Fix a misplaced ')' in the updated package registration code. Signed-off-by: David Reyna <David.Reyna@windriver.com>
2019-02-19srtool_jira: fix Jira status mappingsDavid Reyna
Fix a copy/paste error in the Jira status mapping table. Signed-off-by: David Reyna <David.Reyna@windriver.com>
2019-02-19srtool_update: fix product/user update from tablesDavid Reyna
When restarting the SRTool, the main app's user and product table should be re-read and applied. This fixes a select problem. Signed-off-by: David Reyna <David.Reyna@windriver.com>
2019-02-19srtool_report: add CVE to defects reportDavid Reyna
Add a report lists the Vulnerabilities, Investigations, and Defects (plus status) for the givne list of CVEs. Example: 1) Open the CVEs table 2) Search for this string: "CVE-2017-5715 OR CVE-2017-5753 OR CVE-2017-5754" 3) Click Export * Select the new report "CVE to Defects Table". You can leave the rest of the settings alone. * Click "Generate and Download Report" * Open the report CSV file in your text editor or in Excel. Signed-off-by: David Reyna <David.Reyna@windriver.com>
2019-02-09srtool_srt: add 'manage' usage help displayDavid Reyna
Signed-off-by: David Reyna <David.Reyna@windriver.com>