Skip to content

Commit e50c6e9

Browse files
committed
Collect upstream aliases in osv advisory
Signed-off-by: Keshav Priyadarshi <git@keshav.space>
1 parent 47f732d commit e50c6e9

File tree

4 files changed

+67
-24
lines changed

4 files changed

+67
-24
lines changed

vulnerabilities/pipes/osv_v2.py

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -67,6 +67,7 @@ def parse_advisory_data_v3(
6767
details = raw_data.get("details") or ""
6868
summary = build_description(summary=summary, description=details)
6969
aliases = raw_data.get("aliases") or []
70+
aliases.extend(raw_data.get("upstream", []))
7071

7172
date_published = get_published_date(raw_data=raw_data)
7273
severities = list(get_severities(raw_data=raw_data, url=advisory_url))

vulnerabilities/tests/pipelines/v2_importers/test_openssl_importer.py

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -26,7 +26,7 @@ def setUp(self):
2626
self.logger = TestLogger()
2727

2828
@patch("vulnerabilities.pipelines.v2_importers.openssl_importer.OpenSSLImporterPipeline.clone")
29-
def test_redhat_advisories_v2(self, mock_clone):
29+
def test_openssl_advisories_v2(self, mock_clone):
3030
mock_clone.__name__ = "clone"
3131
pipeline = OpenSSLImporterPipeline()
3232
pipeline.advisory_path = TEST_DATA

vulnerabilities/tests/pipelines/v2_importers/test_ubuntu_osv_importer.py

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -28,7 +28,7 @@ def setUp(self):
2828
@patch(
2929
"vulnerabilities.pipelines.v2_importers.ubuntu_osv_importer.UbuntuOSVImporterPipeline.clone"
3030
)
31-
def test_redhat_advisories_v2(self, mock_clone):
31+
def test_ubuntu_advisories_v2(self, mock_clone):
3232
mock_clone.__name__ = "clone"
3333
pipeline = UbuntuOSVImporterPipeline()
3434
pipeline.advisories_path = TEST_DATA / "ubuntu_security_notices"
@@ -40,4 +40,4 @@ def test_redhat_advisories_v2(self, mock_clone):
4040

4141
expected_file = TEST_DATA / "ubuntu_osv_advisoryv2-expected.json"
4242
result = [adv.to_advisory_data().to_dict() for adv in AdvisoryV2.objects.all()]
43-
util_tests.check_results_against_json(result, expected_file, regen=True)
43+
util_tests.check_results_against_json(result, expected_file)

vulnerabilities/tests/test_data/ubuntu/ubuntu_osv_advisoryv2-expected.json

Lines changed: 63 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,9 @@
11
[
22
{
33
"advisory_id": "UBUNTU-CVE-2001-1593",
4-
"aliases": [],
4+
"aliases": [
5+
"CVE-2001-1593"
6+
],
57
"summary": "Jakub Wilk found that a2ps, a tool to convert text and other types of files to PostScript, insecurely used a temporary file in spy_user(). A local attacker could use this flaw to perform a symbolic link attack to modify an arbitrary file accessible to the user running a2ps.",
68
"affected_packages": [
79
{
@@ -45,7 +47,9 @@
4547
},
4648
{
4749
"advisory_id": "UBUNTU-CVE-2005-1515",
48-
"aliases": [],
50+
"aliases": [
51+
"CVE-2005-1515"
52+
],
4953
"summary": "Integer signedness error in the qmail_put and substdio_put functions in qmail, when running on 64 bit platforms with a large amount of virtual memory, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a large number of SMTP RCPT TO commands.",
5054
"affected_packages": [
5155
{
@@ -146,7 +150,9 @@
146150
},
147151
{
148152
"advisory_id": "UBUNTU-CVE-2010-0751",
149-
"aliases": [],
153+
"aliases": [
154+
"CVE-2010-0751"
155+
],
150156
"summary": "The ip_evictor function in ip_fragment.c in libnids before 1.24, as used in dsniff and possibly other products, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via crafted fragmented packets.",
151157
"affected_packages": [
152158
{
@@ -204,7 +210,9 @@
204210
},
205211
{
206212
"advisory_id": "UBUNTU-CVE-2010-1824",
207-
"aliases": [],
213+
"aliases": [
214+
"CVE-2010-1824"
215+
],
208216
"summary": "Use-after-free vulnerability in WebKit, as used in Apple iTunes before 10.2 on Windows, Apple Safari, and Google Chrome before 6.0.472.59, allows remote attackers to execute arbitrary code or cause a denial of service via vectors related to SVG styles, the DOM tree, and error messages.",
209217
"affected_packages": [
210218
{
@@ -267,7 +275,9 @@
267275
},
268276
{
269277
"advisory_id": "UBUNTU-CVE-2010-2496",
270-
"aliases": [],
278+
"aliases": [
279+
"CVE-2010-2496"
280+
],
271281
"summary": "stonith-ng in pacemaker and cluster-glue passed passwords as commandline parameters, making it possible for local attackers to gain access to passwords of the HA stack and potentially influence its operations. This is fixed in cluster-glue 1.0.6 and newer, and pacemaker 1.1.3 and newer.",
272282
"affected_packages": [
273283
{
@@ -345,7 +355,9 @@
345355
},
346356
{
347357
"advisory_id": "UBUNTU-CVE-2015-0209",
348-
"aliases": [],
358+
"aliases": [
359+
"CVE-2015-0209"
360+
],
349361
"summary": "Use-after-free vulnerability in the d2i_ECPrivateKey function in crypto/ec/ec_asn1.c in OpenSSL before 0.9.8zf, 1.0.0 before 1.0.0r, 1.0.1 before 1.0.1m, and 1.0.2 before 1.0.2a might allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via a malformed Elliptic Curve (EC) private-key file that is improperly handled during import.",
350362
"affected_packages": [
351363
{
@@ -394,7 +406,9 @@
394406
},
395407
{
396408
"advisory_id": "UBUNTU-CVE-2015-0222",
397-
"aliases": [],
409+
"aliases": [
410+
"CVE-2015-0222"
411+
],
398412
"summary": "ModelMultipleChoiceField in Django 1.6.x before 1.6.10 and 1.7.x before 1.7.3, when show_hidden_initial is set to True, allows remote attackers to cause a denial of service by submitting duplicate values, which triggers a large number of SQL queries.",
399413
"affected_packages": [
400414
{
@@ -448,7 +462,9 @@
448462
},
449463
{
450464
"advisory_id": "UBUNTU-CVE-2015-0244",
451-
"aliases": [],
465+
"aliases": [
466+
"CVE-2015-0244"
467+
],
452468
"summary": "PostgreSQL before 9.0.19, 9.1.x before 9.1.15, 9.2.x before 9.2.10, 9.3.x before 9.3.6, and 9.4.x before 9.4.1 does not properly handle errors while reading a protocol message, which allows remote attackers to conduct SQL injection attacks via crafted binary data in a parameter and causing an error, which triggers the loss of synchronization and part of the protocol message to be treated as a new message, as demonstrated by causing a timeout or query cancellation.",
453469
"affected_packages": [
454470
{
@@ -516,7 +532,9 @@
516532
},
517533
{
518534
"advisory_id": "UBUNTU-CVE-2015-0261",
519-
"aliases": [],
535+
"aliases": [
536+
"CVE-2015-0261"
537+
],
520538
"summary": "Integer signedness error in the mobility_opt_print function in the IPv6 mobility printer in tcpdump before 4.7.2 allows remote attackers to cause a denial of service (out-of-bounds read and crash) or possibly execute arbitrary code via a negative length value.",
521539
"affected_packages": [
522540
{
@@ -570,7 +588,9 @@
570588
},
571589
{
572590
"advisory_id": "UBUNTU-CVE-2015-0295",
573-
"aliases": [],
591+
"aliases": [
592+
"CVE-2015-0295"
593+
],
574594
"summary": "The BMP decoder in QtGui in QT before 5.5 does not properly calculate the masks used to extract the color components, which allows remote attackers to cause a denial of service (divide-by-zero and crash) via a crafted BMP file.",
575595
"affected_packages": [
576596
{
@@ -638,7 +658,9 @@
638658
},
639659
{
640660
"advisory_id": "UBUNTU-CVE-2020-0305",
641-
"aliases": [],
661+
"aliases": [
662+
"CVE-2020-0305"
663+
],
642664
"summary": "In cdev_get of char_dev.c, there is a possible use-after-free due to a race condition. This could lead to local escalation of privilege with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-153467744",
643665
"affected_packages": [
644666
{
@@ -1434,7 +1456,9 @@
14341456
},
14351457
{
14361458
"advisory_id": "UBUNTU-CVE-2020-0556",
1437-
"aliases": [],
1459+
"aliases": [
1460+
"CVE-2020-0556"
1461+
],
14381462
"summary": "Improper access control in subsystem for BlueZ before version 5.54 may allow an unauthenticated user to potentially enable escalation of privilege and denial of service via adjacent access",
14391463
"affected_packages": [
14401464
{
@@ -1512,7 +1536,9 @@
15121536
},
15131537
{
15141538
"advisory_id": "UBUNTU-CVE-2020-1739",
1515-
"aliases": [],
1539+
"aliases": [
1540+
"CVE-2020-1739"
1541+
],
15161542
"summary": "A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument \"password\" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.",
15171543
"affected_packages": [
15181544
{
@@ -1613,7 +1639,9 @@
16131639
},
16141640
{
16151641
"advisory_id": "UBUNTU-CVE-2020-1770",
1616-
"aliases": [],
1642+
"aliases": [
1643+
"CVE-2020-1770"
1644+
],
16171645
"summary": "Support bundle generated files could contain sensitive information that might be unwanted to be disclosed. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.",
16181646
"affected_packages": [
16191647
{
@@ -1700,7 +1728,9 @@
17001728
},
17011729
{
17021730
"advisory_id": "UBUNTU-CVE-2020-1944",
1703-
"aliases": [],
1731+
"aliases": [
1732+
"CVE-2020-1944"
1733+
],
17041734
"summary": "There is a vulnerability in Apache Traffic Server 6.0.0 to 6.2.3, 7.0.0 to 7.1.8, and 8.0.0 to 8.0.5 with a smuggling attack and Transfer-Encoding and Content length headers. Upgrade to versions 7.1.9 and 8.0.6 or later versions.",
17051735
"affected_packages": [
17061736
{
@@ -1796,7 +1826,9 @@
17961826
},
17971827
{
17981828
"advisory_id": "UBUNTU-CVE-2020-2590",
1799-
"aliases": [],
1829+
"aliases": [
1830+
"CVE-2020-2590"
1831+
],
18001832
"summary": "Vulnerability in the Java SE, Java SE Embedded product of Oracle Java SE (component: Security). Supported versions that are affected are Java SE: 7u241, 8u231, 11.0.5 and 13.0.1; Java SE Embedded: 8u231. Difficult to exploit vulnerability allows unauthenticated attacker with network access via Kerberos to compromise Java SE, Java SE Embedded. Successful attacks of this vulnerability can result in unauthorized update, insert or delete access to some of Java SE, Java SE Embedded accessible data. Note: This vulnerability applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets (in Java SE 8), that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. This vulnerability can also be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. CVSS 3.0 Base Score 3.7 (Integrity impacts). CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N).",
18011833
"affected_packages": [
18021834
{
@@ -2000,7 +2032,9 @@
20002032
},
20012033
{
20022034
"advisory_id": "UBUNTU-CVE-2020-6537",
2003-
"aliases": [],
2035+
"aliases": [
2036+
"CVE-2020-6537"
2037+
],
20042038
"summary": "Type confusion in V8 in Google Chrome prior to 84.0.4147.105 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.",
20052039
"affected_packages": [
20062040
{
@@ -2298,7 +2332,9 @@
22982332
},
22992333
{
23002334
"advisory_id": "UBUNTU-CVE-2025-0677",
2301-
"aliases": [],
2335+
"aliases": [
2336+
"CVE-2025-0677"
2337+
],
23022338
"summary": "A flaw was found in grub2. When performing a symlink lookup, the grub's UFS module checks the inode's data size to allocate the internal buffer to read the file content, however, it fails to check if the symlink data size has overflown. When this occurs, grub_malloc() may be called with a smaller value than needed. When further reading the data from the disk into the buffer, the grub_ufs_lookup_symlink() function will write past the end of the allocated size. An attack can leverage this by crafting a malicious filesystem, and as a result, it will corrupt data stored in the heap, allowing for arbitrary code execution used to by-pass secure boot mechanisms.",
23032339
"affected_packages": [
23042340
{
@@ -2529,7 +2565,9 @@
25292565
},
25302566
{
25312567
"advisory_id": "UBUNTU-CVE-2025-1179",
2532-
"aliases": [],
2568+
"aliases": [
2569+
"CVE-2025-1179"
2570+
],
25332571
"summary": "A vulnerability was found in GNU Binutils 2.43. It has been rated as critical. Affected by this issue is the function bfd_putl64 of the file bfd/libbfd.c of the component ld. The manipulation leads to memory corruption. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. It is recommended to upgrade the affected component. The code maintainer explains, that \"[t]his bug has been fixed at some point between the 2.43 and 2.44 releases\".",
25342572
"affected_packages": [
25352573
{
@@ -2679,7 +2717,9 @@
26792717
},
26802718
{
26812719
"advisory_id": "UBUNTU-CVE-2025-14345",
2682-
"aliases": [],
2720+
"aliases": [
2721+
"CVE-2025-14345"
2722+
],
26832723
"summary": "A post-authentication\u00a0flaw in the network two-phase commit protocol used for cross-shard transactions in MongoDB Server may lead to logical data inconsistencies under specific conditions which are not predictable and exist for a very short period of time. This error can cause the transaction coordination logic to misinterpret the transaction as committed, resulting in inconsistent state on those shards. This may lead to low integrity and availability impact. This issue impacts MongoDB Server v8.0 versions prior to 8.0.16, MongoDB Server v7.0 versions prior to 7.0.26 and MongoDB server v8.2 versions prior to 8.2.2.",
26842724
"affected_packages": [
26852725
{
@@ -2785,7 +2825,9 @@
27852825
},
27862826
{
27872827
"advisory_id": "UBUNTU-CVE-2025-71115",
2788-
"aliases": [],
2828+
"aliases": [
2829+
"CVE-2025-71115"
2830+
],
27892831
"summary": "In the Linux kernel, the following vulnerability has been resolved: um: init cpu_tasks[] earlier This is currently done in uml_finishsetup(), but e.g. with KCOV enabled we'll crash because some init code can call into e.g. memparse(), which has coverage annotations, and then the checks in check_kcov_mode() crash because current is NULL. Simply initialize the cpu_tasks[] array statically, which fixes the crash. For the later SMP work, it seems to have not really caused any problems yet, but initialize all of the entries anyway.",
27902832
"affected_packages": [
27912833
{

0 commit comments

Comments
 (0)