Merge ubuntu-cve-tracker:fixup-fixup into ubuntu-cve-tracker:master
- Git
- lp:ubuntu-cve-tracker
- fixup-fixup
- Merge into master
Proposed by
Marc Deslauriers
Status: | Merged |
---|---|
Merge reported by: | Marc Deslauriers |
Merged at revision: | 5141fa1dbe24201c81069ba3b2d5fa20f5b493e5 |
Proposed branch: | ubuntu-cve-tracker:fixup-fixup |
Merge into: | ubuntu-cve-tracker:master |
Diff against target: |
2340 lines (+1781/-275) 25 files modified
dev/null (+0/-233) scripts/check-syntax (+133/-18) scripts/cve_lib.py (+79/-9) scripts/test_cve_lib.py (+86/-15) scripts/testfiles/cve_lib_test.example (+71/-0) scripts/testfiles/cve_lib_test_1.in (+70/-0) scripts/testfiles/cve_lib_test_1.result (+71/-0) scripts/testfiles/cve_lib_test_10.in (+71/-0) scripts/testfiles/cve_lib_test_10.result (+70/-0) scripts/testfiles/cve_lib_test_2.in (+70/-0) scripts/testfiles/cve_lib_test_2.result (+71/-0) scripts/testfiles/cve_lib_test_3.in (+70/-0) scripts/testfiles/cve_lib_test_3.result (+71/-0) scripts/testfiles/cve_lib_test_4.in (+70/-0) scripts/testfiles/cve_lib_test_4.result (+71/-0) scripts/testfiles/cve_lib_test_5.in (+70/-0) scripts/testfiles/cve_lib_test_5.result (+71/-0) scripts/testfiles/cve_lib_test_6.in (+70/-0) scripts/testfiles/cve_lib_test_6.result (+71/-0) scripts/testfiles/cve_lib_test_7.in (+71/-0) scripts/testfiles/cve_lib_test_7.result (+71/-0) scripts/testfiles/cve_lib_test_8.in (+71/-0) scripts/testfiles/cve_lib_test_8.result (+71/-0) scripts/testfiles/cve_lib_test_9.in (+70/-0) scripts/testfiles/cve_lib_test_9.result (+71/-0) |
Related bugs: |
Reviewer | Review Type | Date Requested | Status |
---|---|---|---|
Rodrigo Figueiredo Zaiden | Approve | ||
Review via email: mp+460700@code.launchpad.net |
Commit message
This series of commits removes the hackish check-syntax-fixup script and adds proper --autofix and --dry-run options to the check-syntax script itself.
Description of the change
To post a comment you must log in.
Revision history for this message
Rodrigo Figueiredo Zaiden (rodrigo-zaiden) wrote : | # |
review:
Approve
Revision history for this message
Marc Deslauriers (mdeslaur) wrote : | # |
thanks for the review! :)
Preview Diff
[H/L] Next/Prev Comment, [J/K] Next/Prev File, [N/P] Next/Prev Hunk
1 | diff --git a/scripts/check-syntax b/scripts/check-syntax | |||
2 | index 3d7ee58..d253622 100755 | |||
3 | --- a/scripts/check-syntax | |||
4 | +++ b/scripts/check-syntax | |||
5 | @@ -242,6 +242,19 @@ parser.add_option( | |||
6 | 242 | default=False, | 242 | default=False, |
7 | 243 | ) | 243 | ) |
8 | 244 | parser.add_option( | 244 | parser.add_option( |
9 | 245 | "-a", | ||
10 | 246 | "--autofix", | ||
11 | 247 | help="Attempt to fix problems automatically", | ||
12 | 248 | action="store_true", | ||
13 | 249 | default=False, | ||
14 | 250 | ) | ||
15 | 251 | parser.add_option( | ||
16 | 252 | "--dry-run", | ||
17 | 253 | help="Dry run for autofix parameter", | ||
18 | 254 | action="store_true", | ||
19 | 255 | default=False, | ||
20 | 256 | ) | ||
21 | 257 | parser.add_option( | ||
22 | 245 | "-j", | 258 | "-j", |
23 | 246 | "--jobs", | 259 | "--jobs", |
24 | 247 | type=int, | 260 | type=int, |
25 | @@ -383,6 +396,103 @@ if len(cna_cves_set) > 0 and all_files: | |||
26 | 383 | 396 | ||
27 | 384 | aliases_cache = {} | 397 | aliases_cache = {} |
28 | 385 | 398 | ||
29 | 399 | def fixup_entry(filename, pkg, rel): | ||
30 | 400 | # If release is devel or EOL, we should add the proper status instead of removing | ||
31 | 401 | if rel == cve_lib.devel_release: | ||
32 | 402 | rel = "devel" | ||
33 | 403 | if opt.dry_run: | ||
34 | 404 | print("Dry-Run: updating %s, %s, devel to DNE" % (filename, pkg)) | ||
35 | 405 | return | ||
36 | 406 | cve_lib.update_state(filename, pkg, "devel", "DNE") | ||
37 | 407 | elif not cve_lib.is_active_release(rel): | ||
38 | 408 | if cve_lib.is_active_esm_release(rel): | ||
39 | 409 | status = cve_lib.EOL_ESM_STATUS.format(state='unknown') | ||
40 | 410 | else: | ||
41 | 411 | status = cve_lib.EOL_STATUS.format(state='unknown') | ||
42 | 412 | |||
43 | 413 | if opt.dry_run: | ||
44 | 414 | print("Dry-Run: updating %s, %s, %s to %s" % (filename, pkg, rel, status)) | ||
45 | 415 | return | ||
46 | 416 | cve_lib.update_state(filename, pkg, rel, status) | ||
47 | 417 | |||
48 | 418 | else: | ||
49 | 419 | if opt.dry_run: | ||
50 | 420 | print("Dry-Run: dropping %s, %s, %s" % (filename, pkg, rel)) | ||
51 | 421 | return | ||
52 | 422 | cve_lib.drop_pkg_release(filename, pkg, rel) | ||
53 | 423 | |||
54 | 424 | def fixup_entry_state(filename, pkg, rel, state): | ||
55 | 425 | if opt.dry_run: | ||
56 | 426 | print("Dry-Run: updating %s, %s, %s to %s" % (filename, pkg, rel, state)) | ||
57 | 427 | return | ||
58 | 428 | |||
59 | 429 | cve_lib.update_state(filename, pkg, rel, state) | ||
60 | 430 | |||
61 | 431 | def fixup_entry_get_status(filename, pkg, rel): | ||
62 | 432 | # get status from the parent release if there is one | ||
63 | 433 | status = "needs-triage" | ||
64 | 434 | try: | ||
65 | 435 | _, _, _, details = cve_lib.get_subproject_details(rel) | ||
66 | 436 | parent = details["parent"] | ||
67 | 437 | # this may be either an alias or a full name but cve_lib only | ||
68 | 438 | # uses aliases | ||
69 | 439 | parent = cve_lib.release_alias(parent) | ||
70 | 440 | data = cve_lib.load_cve(filename) | ||
71 | 441 | status = data["pkgs"][pkg][parent][0] | ||
72 | 442 | note = data["pkgs"][pkg][parent][1] | ||
73 | 443 | if len(note) > 0: | ||
74 | 444 | status = status + " (" + note + ")" | ||
75 | 445 | # if parent reached EOL then we are likely the new alive | ||
76 | 446 | # release so ignore their status in that case | ||
77 | 447 | if "end of life" in status or "end of standard support" in status: | ||
78 | 448 | status = 'needs-triage' | ||
79 | 449 | except (KeyError, ValueError, TypeError): | ||
80 | 450 | pass | ||
81 | 451 | |||
82 | 452 | return status | ||
83 | 453 | |||
84 | 454 | def fixup_entry_missing(filename, pkg, rel): | ||
85 | 455 | status = fixup_entry_get_status(filename, pkg, rel) | ||
86 | 456 | |||
87 | 457 | if rel == cve_lib.devel_release: | ||
88 | 458 | rel = "devel" | ||
89 | 459 | |||
90 | 460 | if opt.dry_run: | ||
91 | 461 | print("Dry-Run: Adding %s, %s, %s to %s" % (filename, pkg, rel, status)) | ||
92 | 462 | return | ||
93 | 463 | |||
94 | 464 | cve_lib.add_state(filename, pkg, rel, status) | ||
95 | 465 | |||
96 | 466 | def fixup_entry_wrong(filename, pkg, rel): | ||
97 | 467 | status = fixup_entry_get_status(filename, pkg, rel) | ||
98 | 468 | |||
99 | 469 | if rel == cve_lib.devel_release: | ||
100 | 470 | rel = "devel" | ||
101 | 471 | |||
102 | 472 | if opt.dry_run: | ||
103 | 473 | print("Dry-Run: updating %s, %s, %s to %s" % (filename, pkg, rel, status)) | ||
104 | 474 | return | ||
105 | 475 | |||
106 | 476 | cve_lib.update_state(filename, pkg, rel, status, None) | ||
107 | 477 | |||
108 | 478 | def get_cve_path(cve, rel): | ||
109 | 479 | |||
110 | 480 | cve = os.path.basename(cve) | ||
111 | 481 | if rel in cve_lib.external_releases: | ||
112 | 482 | # FIXME: Should we also be using get_external_subproject_dir here? | ||
113 | 483 | cvepath = os.path.join( | ||
114 | 484 | cve_lib.get_external_subproject_cve_dir(rel), cve | ||
115 | 485 | ) | ||
116 | 486 | else: | ||
117 | 487 | # Try and find where this CVE is located | ||
118 | 488 | for d in cve_lib.cve_dirs: | ||
119 | 489 | cvepath = os.path.join(d, cve) | ||
120 | 490 | if os.path.exists(cvepath): | ||
121 | 491 | return cvepath | ||
122 | 492 | # Fall back to the active directory if that didn't work? | ||
123 | 493 | cvepath = os.path.join(cve_lib.active_dir, cve) | ||
124 | 494 | return cvepath | ||
125 | 495 | |||
126 | 386 | def check_cve(cve): | 496 | def check_cve(cve): |
127 | 387 | if re.match(r"EMB-", cve): | 497 | if re.match(r"EMB-", cve): |
128 | 388 | cvepath = os.path.join(cve_lib.embargoed_dir, cve) | 498 | cvepath = os.path.join(cve_lib.embargoed_dir, cve) |
129 | @@ -447,9 +557,6 @@ def check_cve(cve): | |||
130 | 447 | # Verify have required releases for each package | 557 | # Verify have required releases for each package |
131 | 448 | listed_releases = set(sorted(data["pkgs"][pkg].keys())) | 558 | listed_releases = set(sorted(data["pkgs"][pkg].keys())) |
132 | 449 | all_required_releases = (set(cve_lib.all_releases + ["devel"]) - set([cve_lib.devel_release])) - set(cve_lib.eol_releases) | 559 | all_required_releases = (set(cve_lib.all_releases + ["devel"]) - set([cve_lib.devel_release])) - set(cve_lib.eol_releases) |
133 | 450 | # get the name of a release which is listed in the CVE so we can | ||
134 | 451 | # place the generated error message on this release's line etc | ||
135 | 452 | nearby_rel = list(listed_releases)[0] | ||
136 | 453 | aliases_releases = set() | 560 | aliases_releases = set() |
137 | 454 | 561 | ||
138 | 455 | listed_series = set() | 562 | listed_series = set() |
139 | @@ -486,12 +593,10 @@ def check_cve(cve): | |||
140 | 486 | 593 | ||
141 | 487 | for pkg_alias in pkgs_from_aliases: | 594 | for pkg_alias in pkgs_from_aliases: |
142 | 488 | if pkg_alias not in data["pkgs"].keys(): | 595 | if pkg_alias not in data["pkgs"].keys(): |
145 | 489 | filename = srcmap["pkgs"][pkg][nearby_rel][0] | 596 | filename = get_cve_path(cve, rel) |
144 | 490 | linenum = srcmap["pkgs"][pkg][nearby_rel][1] | ||
146 | 491 | print( | 597 | print( |
150 | 492 | "%s: %d: %s missing release '%s'" | 598 | "%s: %s missing release '%s'" |
151 | 493 | # put the error on a line near where this entry should go | 599 | % (filename, pkg_alias, rel), |
149 | 494 | % (filename, linenum, pkg_alias, rel), | ||
152 | 495 | file=sys.stderr, | 600 | file=sys.stderr, |
153 | 496 | ) | 601 | ) |
154 | 497 | cve_okay = False | 602 | cve_okay = False |
155 | @@ -501,15 +606,13 @@ def check_cve(cve): | |||
156 | 501 | if aliases: | 606 | if aliases: |
157 | 502 | if rel in listed_releases and pkg \ | 607 | if rel in listed_releases and pkg \ |
158 | 503 | not in pkgs_from_aliases: | 608 | not in pkgs_from_aliases: |
161 | 504 | filename = srcmap["pkgs"][pkg][nearby_rel][0] | 609 | filename = get_cve_path(cve, rel) |
160 | 505 | linenum = srcmap["pkgs"][pkg][nearby_rel][1] | ||
162 | 506 | print( | 610 | print( |
165 | 507 | "%s: %d: package '%s' not in '%s'" | 611 | "%s: package '%s' not in '%s'" |
166 | 508 | % (filename, linenum, pkg, rel), | 612 | % (filename, pkg, rel), |
167 | 509 | file=sys.stderr, | 613 | file=sys.stderr, |
168 | 510 | ) | 614 | ) |
169 | 511 | missing_releases = all_required_releases - listed_releases | 615 | missing_releases = all_required_releases - listed_releases |
170 | 512 | nearby_rel = list(listed_releases - missing_releases)[0] | ||
171 | 513 | for rel in missing_releases: | 616 | for rel in missing_releases: |
172 | 514 | # only warn on active CVEs | 617 | # only warn on active CVEs |
173 | 515 | if is_active(cve) and \ | 618 | if is_active(cve) and \ |
174 | @@ -519,14 +622,14 @@ def check_cve(cve): | |||
175 | 519 | # we shouldn't add any entries to the CVE | 622 | # we shouldn't add any entries to the CVE |
176 | 520 | if not cve_lib.is_cve_triage_required(rel): continue | 623 | if not cve_lib.is_cve_triage_required(rel): continue |
177 | 521 | 624 | ||
180 | 522 | filename = srcmap["pkgs"][pkg][nearby_rel][0] | 625 | filename = get_cve_path(cve, rel) |
179 | 523 | linenum = srcmap["pkgs"][pkg][nearby_rel][1] | ||
181 | 524 | print( | 626 | print( |
185 | 525 | "%s: %d: %s missing release '%s'" | 627 | "%s: %s missing release '%s'" |
186 | 526 | # put the error on a line near where this entry should go | 628 | % (filename, pkg, rel), |
184 | 527 | % (filename, linenum, pkg, rel), | ||
187 | 528 | file=sys.stderr, | 629 | file=sys.stderr, |
188 | 529 | ) | 630 | ) |
189 | 631 | if opt.autofix: | ||
190 | 632 | fixup_entry_missing(filename, pkg, rel) | ||
191 | 530 | cve_okay = False | 633 | cve_okay = False |
192 | 531 | unknown_releases = listed_releases - set(cve_lib.all_releases + ["devel", "upstream"]) | 634 | unknown_releases = listed_releases - set(cve_lib.all_releases + ["devel", "upstream"]) |
193 | 532 | for rel in unknown_releases: | 635 | for rel in unknown_releases: |
194 | @@ -537,6 +640,8 @@ def check_cve(cve): | |||
195 | 537 | % (filename, linenum, pkg, rel), | 640 | % (filename, linenum, pkg, rel), |
196 | 538 | file=sys.stderr, | 641 | file=sys.stderr, |
197 | 539 | ) | 642 | ) |
198 | 643 | if opt.autofix: | ||
199 | 644 | fixup_entry(filename, pkg, rel) | ||
200 | 540 | cve_okay = False | 645 | cve_okay = False |
201 | 541 | for release in sorted(data["pkgs"][pkg].keys()): | 646 | for release in sorted(data["pkgs"][pkg].keys()): |
202 | 542 | rel = release | 647 | rel = release |
203 | @@ -590,6 +695,8 @@ def check_cve(cve): | |||
204 | 590 | % (filename, linenum, pkg, state, rel, fixed_state), | 695 | % (filename, linenum, pkg, state, rel, fixed_state), |
205 | 591 | file=sys.stderr, | 696 | file=sys.stderr, |
206 | 592 | ) | 697 | ) |
207 | 698 | if opt.autofix: | ||
208 | 699 | fixup_entry_state(filename, pkg, rel, fixed_state) | ||
209 | 593 | cve_okay = False | 700 | cve_okay = False |
210 | 594 | # REMOVED THIS CHECK TEMPORARILY WHILE WE WORK IN ANOTHER SOLUTION | 701 | # REMOVED THIS CHECK TEMPORARILY WHILE WE WORK IN ANOTHER SOLUTION |
211 | 595 | # elif state == 'ignored': | 702 | # elif state == 'ignored': |
212 | @@ -601,6 +708,8 @@ def check_cve(cve): | |||
213 | 601 | # % (filename, linenum, pkg, details[1], rel, fixed_state), | 708 | # % (filename, linenum, pkg, details[1], rel, fixed_state), |
214 | 602 | # file=sys.stderr, | 709 | # file=sys.stderr, |
215 | 603 | # ) | 710 | # ) |
216 | 711 | # if opt.autofix: | ||
217 | 712 | # fixup_entry_state(filename, pkg, rel, fixed_state) | ||
218 | 604 | # cve_okay = False | 713 | # cve_okay = False |
219 | 605 | continue | 714 | continue |
220 | 606 | 715 | ||
221 | @@ -625,6 +734,8 @@ def check_cve(cve): | |||
222 | 625 | % (filename, linenum, pkg, rel), | 734 | % (filename, linenum, pkg, rel), |
223 | 626 | file=sys.stderr, | 735 | file=sys.stderr, |
224 | 627 | ) | 736 | ) |
225 | 737 | if opt.autofix: | ||
226 | 738 | fixup_entry_wrong(filename, pkg, rel) | ||
227 | 628 | cve_okay = False | 739 | cve_okay = False |
228 | 629 | continue | 740 | continue |
229 | 630 | 741 | ||
230 | @@ -667,6 +778,8 @@ def check_cve(cve): | |||
231 | 667 | % (filename, linenum, pkg, rel), | 778 | % (filename, linenum, pkg, rel), |
232 | 668 | file=sys.stderr, | 779 | file=sys.stderr, |
233 | 669 | ) | 780 | ) |
234 | 781 | if opt.autofix: | ||
235 | 782 | fixup_entry(filename, pkg, rel) | ||
236 | 670 | cve_okay = False | 783 | cve_okay = False |
237 | 671 | else: | 784 | else: |
238 | 672 | if rel in source: | 785 | if rel in source: |
239 | @@ -703,6 +816,8 @@ def check_cve(cve): | |||
240 | 703 | % (filename, linenum, pkg, rel), | 816 | % (filename, linenum, pkg, rel), |
241 | 704 | file=sys.stderr, | 817 | file=sys.stderr, |
242 | 705 | ) | 818 | ) |
243 | 819 | if opt.autofix: | ||
244 | 820 | fixup_entry(filename, pkg, rel) | ||
245 | 706 | cve_okay = False | 821 | cve_okay = False |
246 | 707 | elif opt.strict and not opt.newer: | 822 | elif opt.strict and not opt.newer: |
247 | 708 | # Validate the version is <= version in release | 823 | # Validate the version is <= version in release |
248 | diff --git a/scripts/check-syntax-fixup b/scripts/check-syntax-fixup | |||
249 | 709 | deleted file mode 100755 | 824 | deleted file mode 100755 |
250 | index 0ce195b..0000000 | |||
251 | --- a/scripts/check-syntax-fixup | |||
252 | +++ /dev/null | |||
253 | @@ -1,233 +0,0 @@ | |||
254 | 1 | #!/usr/bin/env python3 | ||
255 | 2 | |||
256 | 3 | # Author: Alex Murray <alex.murray@canonical.com> | ||
257 | 4 | # Copyright (C) 2021 Canonical Ltd. | ||
258 | 5 | # | ||
259 | 6 | # This script is distributed under the terms and conditions of the GNU General | ||
260 | 7 | # Public License, Version 2 or later. See http://www.gnu.org/copyleft/gpl.html | ||
261 | 8 | # for details. | ||
262 | 9 | |||
263 | 10 | # | ||
264 | 11 | # This script uses the output of check-syntax to determine what needs to | ||
265 | 12 | # be fixed. Typical usage is: | ||
266 | 13 | # | ||
267 | 14 | # ./scripts/check-syntax 2>&1 | ./scripts/check-syntax-fixup | ||
268 | 15 | # | ||
269 | 16 | |||
270 | 17 | import argparse | ||
271 | 18 | import os | ||
272 | 19 | import sys | ||
273 | 20 | import cve_lib | ||
274 | 21 | |||
275 | 22 | |||
276 | 23 | def insert_into_file(filename: str, linenum: int, line: str, dryrun=False, verbose=False): | ||
277 | 24 | """Insert line into filename at linenum.""" | ||
278 | 25 | if not dryrun: | ||
279 | 26 | # file may not already exist | ||
280 | 27 | contents = [] | ||
281 | 28 | try: | ||
282 | 29 | with open(filename, "r") as f: | ||
283 | 30 | contents = f.readlines() | ||
284 | 31 | except FileNotFoundError: | ||
285 | 32 | pass | ||
286 | 33 | if verbose: | ||
287 | 34 | print("%s: %d: inserting '%s'" % (os.path.relpath(filename), linenum, line.strip())) | ||
288 | 35 | # linenum is 1 based but arrays are 0-based | ||
289 | 36 | contents.insert(linenum - 1, line) | ||
290 | 37 | with open(cve, "w") as f: | ||
291 | 38 | f.write("".join(contents)) | ||
292 | 39 | else: | ||
293 | 40 | print("%s: %d: would insert '%s'" % (os.path.relpath(filename), linenum, line.strip())) | ||
294 | 41 | |||
295 | 42 | |||
296 | 43 | def delete_from_file(filename: str, linenum: int, dryrun=False, verbose=False): | ||
297 | 44 | """Delete line at linenum from filename.""" | ||
298 | 45 | if not dryrun: | ||
299 | 46 | # file may not already exist | ||
300 | 47 | contents = [] | ||
301 | 48 | try: | ||
302 | 49 | with open(filename, "r") as f: | ||
303 | 50 | contents = f.readlines() | ||
304 | 51 | except FileNotFoundError: | ||
305 | 52 | pass | ||
306 | 53 | if verbose: | ||
307 | 54 | print("%s: %d: deleting... " % (os.path.relpath(filename), linenum)) | ||
308 | 55 | # linenum is 1 based but arrays are 0-based | ||
309 | 56 | del contents[linenum - 1] | ||
310 | 57 | with open(cve, "w") as f: | ||
311 | 58 | f.write("".join(contents)) | ||
312 | 59 | else: | ||
313 | 60 | print("%s: %d: would delete this line" % (os.path.relpath(filename), linenum)) | ||
314 | 61 | |||
315 | 62 | |||
316 | 63 | def identify_subproject_line_number(filename: str, pkg: str, rel: str): | ||
317 | 64 | # file may not already exist | ||
318 | 65 | contents = [] | ||
319 | 66 | try: | ||
320 | 67 | with open(filename, "r") as f: | ||
321 | 68 | contents = f.readlines() | ||
322 | 69 | except FileNotFoundError: | ||
323 | 70 | pass | ||
324 | 71 | |||
325 | 72 | for linenum,line in enumerate(contents): | ||
326 | 73 | if not line or ':' not in line or '_' not in line: | ||
327 | 74 | continue | ||
328 | 75 | line_rel, line_pkg = line.split(":")[0].split('_', maxsplit=1) | ||
329 | 76 | if pkg == line_pkg and rel == line_rel: | ||
330 | 77 | return linenum + 1 | ||
331 | 78 | |||
332 | 79 | return -1 | ||
333 | 80 | |||
334 | 81 | def get_pkg_rel_from_msg(msg): | ||
335 | 82 | parts = msg.split(" ") | ||
336 | 83 | if 'DOES exist' in msg or 'not in' in msg: | ||
337 | 84 | pkg = parts[1].replace("'", "") | ||
338 | 85 | rel = parts[-1].replace("'", "") | ||
339 | 86 | elif 'unknown package' in msg: | ||
340 | 87 | pkg = parts[2].replace("'", "") | ||
341 | 88 | rel = parts[-1].replace("'", "") | ||
342 | 89 | elif 'incorrect' in msg: | ||
343 | 90 | pkg = parts[0].replace("'", "") | ||
344 | 91 | rel = msg.split(', try')[0].split(' ')[-1].replace("'", "") | ||
345 | 92 | else: | ||
346 | 93 | pkg = parts[0] | ||
347 | 94 | rel = parts[-1].replace("'", "") | ||
348 | 95 | return pkg, rel | ||
349 | 96 | |||
350 | 97 | parser = argparse.ArgumentParser("Automatically fixup issues flagged by check-syntax") | ||
351 | 98 | parser.add_argument( | ||
352 | 99 | "-n", | ||
353 | 100 | "--dry-run", | ||
354 | 101 | action="store_true", | ||
355 | 102 | default=False, | ||
356 | 103 | help="Don't perform any actual modifications just print what would be done.", | ||
357 | 104 | ) | ||
358 | 105 | parser.add_argument( | ||
359 | 106 | "-v", | ||
360 | 107 | "--verbose", | ||
361 | 108 | action="store_true", | ||
362 | 109 | default=False, | ||
363 | 110 | help="Print output for each operation performed.", | ||
364 | 111 | ) | ||
365 | 112 | parser.add_argument( | ||
366 | 113 | "infile", | ||
367 | 114 | nargs="?", | ||
368 | 115 | help="File to read input from. Defaults to stdin.", | ||
369 | 116 | type=argparse.FileType("r"), | ||
370 | 117 | default=sys.stdin, | ||
371 | 118 | ) | ||
372 | 119 | args = parser.parse_args() | ||
373 | 120 | if args.dry_run: | ||
374 | 121 | print("DRY RUN - LIKE THE MATRIX, THIS IS JUST A SIMULATION.") | ||
375 | 122 | |||
376 | 123 | |||
377 | 124 | modified = [] | ||
378 | 125 | |||
379 | 126 | for line in args.infile: | ||
380 | 127 | # skip warnings | ||
381 | 128 | if line.startswith("WARNING:"): | ||
382 | 129 | continue | ||
383 | 130 | # parse out file name, line number, and message | ||
384 | 131 | parts = line.split(":") | ||
385 | 132 | if len(parts) != 3: | ||
386 | 133 | continue | ||
387 | 134 | # strip whitespace from all parts | ||
388 | 135 | parts = map(lambda s: s.strip(), parts) | ||
389 | 136 | cve, linenum, msg = parts | ||
390 | 137 | linenum = int(linenum) | ||
391 | 138 | |||
392 | 139 | # don't modify a file more than once otherwise the line numbers get out of whack | ||
393 | 140 | if cve in modified: | ||
394 | 141 | # print unhandled lines | ||
395 | 142 | print(line, file=sys.stderr) | ||
396 | 143 | continue | ||
397 | 144 | |||
398 | 145 | if "missing release" in msg or 'DOES exist' in msg: | ||
399 | 146 | # e.g. golang missing release 'gke/gke-1.19' | ||
400 | 147 | # e.g. package 'libextractor' DOES exist in 'trusty/esm' | ||
401 | 148 | pkg, rel = get_pkg_rel_from_msg(msg) | ||
402 | 149 | |||
403 | 150 | # get status from the parent release if there is one | ||
404 | 151 | status = "needs-triage" | ||
405 | 152 | try: | ||
406 | 153 | _, _, _, details = cve_lib.get_subproject_details(rel) | ||
407 | 154 | parent = details["parent"] | ||
408 | 155 | # this may be either an alias or a full name but cve_lib only | ||
409 | 156 | # uses aliases | ||
410 | 157 | parent = cve_lib.release_alias(parent) | ||
411 | 158 | data = cve_lib.load_cve(cve) | ||
412 | 159 | status = data["pkgs"][pkg][parent][0] | ||
413 | 160 | note = data["pkgs"][pkg][parent][1] | ||
414 | 161 | if len(note) > 0: | ||
415 | 162 | status = status + " (" + note + ")" | ||
416 | 163 | # if parent reached EOL then we are likely the new alive | ||
417 | 164 | # release so ignore their status in that case | ||
418 | 165 | if "end of life" in status or "end of standard support" in status: | ||
419 | 166 | status = 'needs-triage' | ||
420 | 167 | except (KeyError, ValueError, TypeError): | ||
421 | 168 | pass | ||
422 | 169 | |||
423 | 170 | if rel == cve_lib.devel_release: | ||
424 | 171 | rel = "devel" | ||
425 | 172 | |||
426 | 173 | fixup = "{rel}_{pkg}: {status}\n".format(rel=rel, pkg=pkg, status=status) | ||
427 | 174 | |||
428 | 175 | # remove this hard-coded hack one-day... | ||
429 | 176 | if rel in cve_lib.external_releases or \ | ||
430 | 177 | (rel == "trusty/esm" and "DOES exist" in msg): | ||
431 | 178 | cve = os.path.join( | ||
432 | 179 | cve_lib.get_external_subproject_cve_dir(rel), os.path.basename(cve) | ||
433 | 180 | ) | ||
434 | 181 | linenum = identify_subproject_line_number(cve, pkg, rel) | ||
435 | 182 | if linenum == -1: | ||
436 | 183 | if 'DOES exist' in msg: | ||
437 | 184 | continue | ||
438 | 185 | linenum = 1 # We are inserting | ||
439 | 186 | |||
440 | 187 | # Remove the 'DNE' line before adding the new one | ||
441 | 188 | if 'DOES exist' in msg: | ||
442 | 189 | delete_from_file(cve, linenum, args.dry_run, args.verbose) | ||
443 | 190 | |||
444 | 191 | insert_into_file(cve, linenum, fixup, args.dry_run, args.verbose) | ||
445 | 192 | modified.append(cve) | ||
446 | 193 | |||
447 | 194 | elif "unknown package" in msg or "not in" in msg \ | ||
448 | 195 | or "unknown release" in msg or "incorrect status"\ | ||
449 | 196 | or "incorrect ignored detail" in msg: | ||
450 | 197 | pkg, rel = get_pkg_rel_from_msg(msg) | ||
451 | 198 | |||
452 | 199 | # remove this hard-coded hack one-day... | ||
453 | 200 | if rel in cve_lib.external_releases or rel == "trusty/esm": | ||
454 | 201 | cve = os.path.join( | ||
455 | 202 | cve_lib.get_external_subproject_cve_dir(rel), os.path.basename(cve) | ||
456 | 203 | ) | ||
457 | 204 | linenum = identify_subproject_line_number(cve, pkg, rel) | ||
458 | 205 | if linenum == -1: | ||
459 | 206 | print(line, file=sys.stderr) | ||
460 | 207 | continue | ||
461 | 208 | |||
462 | 209 | # delete this line since | ||
463 | 210 | delete_from_file(cve, linenum, args.dry_run, args.verbose) | ||
464 | 211 | |||
465 | 212 | #if release is devel or EOL, we should add the proper status instead of removing | ||
466 | 213 | if rel == cve_lib.devel_release: | ||
467 | 214 | rel = "devel" | ||
468 | 215 | fixup = "{rel}_{pkg}: {status}\n".format(rel=rel, pkg=pkg, status="DNE") | ||
469 | 216 | insert_into_file(cve, linenum, fixup, args.dry_run, args.verbose) | ||
470 | 217 | elif not cve_lib.is_active_release(rel): | ||
471 | 218 | if 'incorrect' in msg: | ||
472 | 219 | status = msg.split("try '")[1].replace("'", "") | ||
473 | 220 | else: | ||
474 | 221 | state = msg.split(' ')[3].replace("'", "") | ||
475 | 222 | if cve_lib.is_active_esm_release(rel): | ||
476 | 223 | status = cve_lib.EOL_ESM_STATUS.format(state=state) | ||
477 | 224 | else: | ||
478 | 225 | status = cve_lib.EOL_STATUS.format(state=state) | ||
479 | 226 | |||
480 | 227 | fixup = "{rel}_{pkg}: {status}\n".format(rel=rel, pkg=pkg, status=status) | ||
481 | 228 | insert_into_file(cve, linenum, fixup, args.dry_run, args.verbose) | ||
482 | 229 | |||
483 | 230 | modified.append(cve) | ||
484 | 231 | else: | ||
485 | 232 | # print unhandled lines | ||
486 | 233 | print(line, file=sys.stderr) | ||
487 | diff --git a/scripts/cve_lib.py b/scripts/cve_lib.py | |||
488 | index 68431ea..438348a 100755 | |||
489 | --- a/scripts/cve_lib.py | |||
490 | +++ b/scripts/cve_lib.py | |||
491 | @@ -1687,6 +1687,15 @@ def drop_dup_release(cve, rel): | |||
492 | 1687 | output.close() | 1687 | output.close() |
493 | 1688 | os.rename(cve + '.new', cve) | 1688 | os.rename(cve + '.new', cve) |
494 | 1689 | 1689 | ||
495 | 1690 | def drop_pkg_release(cve, pkg, rel): | ||
496 | 1691 | output = codecs.open(cve + ".new", 'w', encoding="utf-8") | ||
497 | 1692 | with codecs.open(cve, encoding="utf-8") as inF: | ||
498 | 1693 | lines = inF.readlines() | ||
499 | 1694 | for line in lines: | ||
500 | 1695 | if not line.startswith('%s_%s:' % (rel, pkg)): | ||
501 | 1696 | output.write(line) | ||
502 | 1697 | output.close() | ||
503 | 1698 | os.rename(cve + '.new', cve) | ||
504 | 1690 | 1699 | ||
505 | 1691 | def clone_release(cve, pkg, oldrel, newrel): | 1700 | def clone_release(cve, pkg, oldrel, newrel): |
506 | 1692 | output = codecs.open(cve + ".new", 'w', encoding="utf-8") | 1701 | output = codecs.open(cve + ".new", 'w', encoding="utf-8") |
507 | @@ -1701,7 +1710,7 @@ def clone_release(cve, pkg, oldrel, newrel): | |||
508 | 1701 | os.rename(cve + '.new', cve) | 1710 | os.rename(cve + '.new', cve) |
509 | 1702 | 1711 | ||
510 | 1703 | 1712 | ||
512 | 1704 | def update_state(cve, pkg, rel, state, details): | 1713 | def update_state(cve, pkg, rel, state, details=None): |
513 | 1705 | output = codecs.open(cve + ".new", 'w', encoding="utf-8") | 1714 | output = codecs.open(cve + ".new", 'w', encoding="utf-8") |
514 | 1706 | with codecs.open(cve, encoding="utf-8") as inF: | 1715 | with codecs.open(cve, encoding="utf-8") as inF: |
515 | 1707 | lines = inF.readlines() | 1716 | lines = inF.readlines() |
516 | @@ -1716,18 +1725,79 @@ def update_state(cve, pkg, rel, state, details): | |||
517 | 1716 | os.rename(cve + '.new', cve) | 1725 | os.rename(cve + '.new', cve) |
518 | 1717 | 1726 | ||
519 | 1718 | 1727 | ||
521 | 1719 | def add_state(cve, pkg, rel, state, details, after_rel): | 1728 | def add_state(cve, pkg, rel, state, details=None, after_rel=None): |
522 | 1729 | new_line = '%s_%s: %s' % (rel, pkg, state) | ||
523 | 1730 | if details: | ||
524 | 1731 | new_line += ' (%s)' % (details) | ||
525 | 1732 | new_line += '\n' | ||
526 | 1733 | |||
527 | 1734 | # This is a new file | ||
528 | 1735 | if not os.path.exists(cve): | ||
529 | 1736 | with open(cve, "w") as f: | ||
530 | 1737 | f.write(new_line) | ||
531 | 1738 | return | ||
532 | 1739 | |||
533 | 1720 | output = codecs.open(cve + ".new", 'w', encoding="utf-8") | 1740 | output = codecs.open(cve + ".new", 'w', encoding="utf-8") |
534 | 1721 | with codecs.open(cve, encoding="utf-8") as inF: | 1741 | with codecs.open(cve, encoding="utf-8") as inF: |
535 | 1722 | lines = inF.readlines() | 1742 | lines = inF.readlines() |
538 | 1723 | for line in lines: | 1743 | |
539 | 1724 | if line.startswith('%s_%s:' % (after_rel, pkg)): | 1744 | if after_rel == None: |
540 | 1745 | index = None | ||
541 | 1746 | if rel != 'devel': | ||
542 | 1747 | index = all_releases.index(rel) | ||
543 | 1748 | done = False | ||
544 | 1749 | found_pkg = False | ||
545 | 1750 | for line in lines: | ||
546 | 1751 | if done: | ||
547 | 1752 | output.write(line) | ||
548 | 1753 | continue | ||
549 | 1754 | if not ('_%s:' % pkg) in line: | ||
550 | 1755 | # If we're past the package section, and we wanted to add | ||
551 | 1756 | # the devel release, stick it here | ||
552 | 1757 | if rel == 'devel' and found_pkg == True: | ||
553 | 1758 | output.write(new_line) | ||
554 | 1759 | done = True | ||
555 | 1760 | output.write(line) | ||
556 | 1761 | continue | ||
557 | 1762 | |||
558 | 1763 | found_pkg = True | ||
559 | 1764 | if rel != 'devel': | ||
560 | 1765 | line_rel = line.split('_')[0] | ||
561 | 1766 | # Whoa, we hit the devel release, stick it here | ||
562 | 1767 | if line_rel == "devel": | ||
563 | 1768 | output.write(new_line) | ||
564 | 1769 | output.write(line) | ||
565 | 1770 | done = True | ||
566 | 1771 | continue | ||
567 | 1772 | |||
568 | 1773 | # Does this look like a release name? | ||
569 | 1774 | if line_rel not in all_releases: | ||
570 | 1775 | output.write(line) | ||
571 | 1776 | continue | ||
572 | 1777 | |||
573 | 1778 | # See if the release is bigger than ours, if so, stick it here | ||
574 | 1779 | if all_releases.index(line_rel) > index: | ||
575 | 1780 | output.write(new_line) | ||
576 | 1781 | output.write(line) | ||
577 | 1782 | done = True | ||
578 | 1783 | continue | ||
579 | 1784 | |||
580 | 1785 | # Nothing to see here, move along | ||
581 | 1725 | output.write(line) | 1786 | output.write(line) |
587 | 1726 | line = '%s_%s: %s' % (rel, pkg, state) | 1787 | |
588 | 1727 | if details: | 1788 | # If we made it here, we didn't find a place to put it, just |
589 | 1728 | line += ' (%s)' % (details) | 1789 | # stick it at the end of the file |
590 | 1729 | line += '\n' | 1790 | if done == False: |
591 | 1730 | output.write(line) | 1791 | output.write(new_line) |
592 | 1792 | |||
593 | 1793 | else: | ||
594 | 1794 | for line in lines: | ||
595 | 1795 | if line.startswith('%s_%s:' % (after_rel, pkg)): | ||
596 | 1796 | output.write(line) | ||
597 | 1797 | output.write(new_line) | ||
598 | 1798 | else: | ||
599 | 1799 | output.write(line) | ||
600 | 1800 | |||
601 | 1731 | output.close() | 1801 | output.close() |
602 | 1732 | os.rename(cve + '.new', cve) | 1802 | os.rename(cve + '.new', cve) |
603 | 1733 | 1803 | ||
604 | diff --git a/scripts/test_cve_lib.py b/scripts/test_cve_lib.py | |||
605 | index db9b4b2..f44b4d1 100755 | |||
606 | --- a/scripts/test_cve_lib.py | |||
607 | +++ b/scripts/test_cve_lib.py | |||
608 | @@ -7,6 +7,8 @@ import pytest | |||
609 | 7 | import random | 7 | import random |
610 | 8 | import sys | 8 | import sys |
611 | 9 | import cve_lib | 9 | import cve_lib |
612 | 10 | import shutil | ||
613 | 11 | import filecmp | ||
614 | 10 | 12 | ||
615 | 11 | def pytest_generate_tests(metafunc): | 13 | def pytest_generate_tests(metafunc): |
616 | 12 | if "cvss" in metafunc.fixturenames: | 14 | if "cvss" in metafunc.fixturenames: |
617 | @@ -28,23 +30,24 @@ def pytest_generate_tests(metafunc): | |||
618 | 28 | print("Failed to find %s to generate test cases..." % nvdjson, file=sys.stderr) | 30 | print("Failed to find %s to generate test cases..." % nvdjson, file=sys.stderr) |
619 | 29 | metafunc.parametrize("cvss", [item for _, item in cvss.items()]) | 31 | metafunc.parametrize("cvss", [item for _, item in cvss.items()]) |
620 | 30 | 32 | ||
624 | 31 | def test_cvss_empty(): | 33 | class TestCVSS: |
625 | 32 | with pytest.raises(ValueError): | 34 | def test_cvss_empty(self): |
626 | 33 | cve_lib.parse_cvss('') | 35 | with pytest.raises(ValueError): |
627 | 36 | cve_lib.parse_cvss('') | ||
628 | 34 | 37 | ||
632 | 35 | def test_cvss_none(): | 38 | def test_cvss_none(self): |
633 | 36 | with pytest.raises(ValueError): | 39 | with pytest.raises(ValueError): |
634 | 37 | cve_lib.parse_cvss(None) | 40 | cve_lib.parse_cvss(None) |
635 | 38 | 41 | ||
645 | 39 | def test_cvss(cvss): | 42 | def test_cvss(self, cvss): |
646 | 40 | # hack around the fact that some cvssV3 entries use the cvssV2 | 43 | # hack around the fact that some cvssV3 entries use the cvssV2 |
647 | 41 | # ADJACENT_NETWORK attackVector which is wrong... | 44 | # ADJACENT_NETWORK attackVector which is wrong... |
648 | 42 | if cvss["baseMetricV3"]["cvssV3"]["attackVector"] == "ADJACENT_NETWORK": | 45 | if cvss["baseMetricV3"]["cvssV3"]["attackVector"] == "ADJACENT_NETWORK": |
649 | 43 | cvss["baseMetricV3"]["cvssV3"]["attackVector"] = "ADJACENT" | 46 | cvss["baseMetricV3"]["cvssV3"]["attackVector"] = "ADJACENT" |
650 | 44 | js = cve_lib.parse_cvss(cvss["baseMetricV3"]["cvssV3"]["vectorString"]) | 47 | js = cve_lib.parse_cvss(cvss["baseMetricV3"]["cvssV3"]["vectorString"]) |
651 | 45 | # the existing impact may contain a baseMetricV2 or others so only | 48 | # the existing impact may contain a baseMetricV2 or others so only |
652 | 46 | # compare CVSS3 | 49 | # compare CVSS3 |
653 | 47 | assert(js["baseMetricV3"] == cvss["baseMetricV3"]) | 50 | assert(js["baseMetricV3"] == cvss["baseMetricV3"]) |
654 | 48 | 51 | ||
655 | 49 | 52 | ||
656 | 50 | class TestPackageOverrideTests: | 53 | class TestPackageOverrideTests: |
657 | @@ -99,6 +102,74 @@ class TestReleaseSort: | |||
658 | 99 | assert cve_lib.release_sort( | 102 | assert cve_lib.release_sort( |
659 | 100 | ["xenial", "dapper"]) == ["dapper", "xenial"] | 103 | ["xenial", "dapper"]) == ["dapper", "xenial"] |
660 | 101 | 104 | ||
661 | 105 | class TestFileManipulation: | ||
662 | 106 | |||
663 | 107 | def _prepare_files(self, tmp_path, filename): | ||
664 | 108 | test_file = os.path.join(tmp_path, filename) | ||
665 | 109 | test_result = 'scripts/testfiles/' + filename + '.result' | ||
666 | 110 | shutil.copy('scripts/testfiles/' + filename + '.in', test_file) | ||
667 | 111 | return (test_file, test_result) | ||
668 | 112 | |||
669 | 113 | def test_add_state_middle(self, tmp_path): | ||
670 | 114 | test_file, test_result = self._prepare_files(tmp_path, 'cve_lib_test_1') | ||
671 | 115 | # Insert a release in the middle of other releases | ||
672 | 116 | cve_lib.add_state(test_file, "openssl", "mantic", "needs-triage") | ||
673 | 117 | assert filecmp.cmp(test_file, test_result) | ||
674 | 118 | |||
675 | 119 | def test_add_state_devel(self, tmp_path): | ||
676 | 120 | test_file, test_result = self._prepare_files(tmp_path, 'cve_lib_test_2') | ||
677 | 121 | # Insert a missing devel release | ||
678 | 122 | cve_lib.add_state(test_file, "openssl", "devel", "needs-triage") | ||
679 | 123 | assert filecmp.cmp(test_file, test_result) | ||
680 | 124 | |||
681 | 125 | def test_add_state_middle_last(self, tmp_path): | ||
682 | 126 | test_file, test_result = self._prepare_files(tmp_path, 'cve_lib_test_3') | ||
683 | 127 | # Insert a release in the middle of other releases in the last group | ||
684 | 128 | cve_lib.add_state(test_file, "edk2", "jammy", "needs-triage") | ||
685 | 129 | assert filecmp.cmp(test_file, test_result) | ||
686 | 130 | |||
687 | 131 | def test_add_state_devel_end_of_file(self, tmp_path): | ||
688 | 132 | test_file, test_result = self._prepare_files(tmp_path, 'cve_lib_test_4') | ||
689 | 133 | # Insert a missing devel release in the last group | ||
690 | 134 | cve_lib.add_state(test_file, "edk2", "devel", "needs-triage") | ||
691 | 135 | assert filecmp.cmp(test_file, test_result) | ||
692 | 136 | |||
693 | 137 | def test_add_state_with_details(self, tmp_path): | ||
694 | 138 | test_file, test_result = self._prepare_files(tmp_path, 'cve_lib_test_5') | ||
695 | 139 | # Insert a release in the middle of other releases with details | ||
696 | 140 | cve_lib.add_state(test_file, "openssl", "mantic", "not-affected", "code not present") | ||
697 | 141 | assert filecmp.cmp(test_file, test_result) | ||
698 | 142 | |||
699 | 143 | def test_add_state_after_rel(self, tmp_path): | ||
700 | 144 | test_file, test_result = self._prepare_files(tmp_path, 'cve_lib_test_6') | ||
701 | 145 | # Insert a release after a certain other release | ||
702 | 146 | cve_lib.add_state(test_file, "openssl", "mantic", "needs-triage", after_rel="jammy") | ||
703 | 147 | assert filecmp.cmp(test_file, test_result) | ||
704 | 148 | |||
705 | 149 | def test_update_state(self, tmp_path): | ||
706 | 150 | test_file, test_result = self._prepare_files(tmp_path, 'cve_lib_test_7') | ||
707 | 151 | # Update the state of a release | ||
708 | 152 | cve_lib.update_state(test_file, "openssl", "mantic", "not-affected") | ||
709 | 153 | assert filecmp.cmp(test_file, test_result) | ||
710 | 154 | |||
711 | 155 | def test_update_state_with_details(self, tmp_path): | ||
712 | 156 | test_file, test_result = self._prepare_files(tmp_path, 'cve_lib_test_8') | ||
713 | 157 | # Update the state of a release with some details | ||
714 | 158 | cve_lib.update_state(test_file, "openssl", "mantic", "not-affected", "code not present") | ||
715 | 159 | assert filecmp.cmp(test_file, test_result) | ||
716 | 160 | |||
717 | 161 | def test_clone_release(self, tmp_path): | ||
718 | 162 | test_file, test_result = self._prepare_files(tmp_path, 'cve_lib_test_9') | ||
719 | 163 | # Clone a release into another (ordering is weird here, what uses this?) | ||
720 | 164 | cve_lib.clone_release(test_file, "openssl", "mantic", "jammy") | ||
721 | 165 | assert filecmp.cmp(test_file, test_result) | ||
722 | 166 | |||
723 | 167 | def test_drop_pkg_release(self, tmp_path): | ||
724 | 168 | test_file, test_result = self._prepare_files(tmp_path, 'cve_lib_test_10') | ||
725 | 169 | # Drop a release | ||
726 | 170 | cve_lib.drop_pkg_release(test_file, "openssl", "mantic") | ||
727 | 171 | assert filecmp.cmp(test_file, test_result) | ||
728 | 172 | |||
729 | 102 | class TestReleaseDevel: | 173 | class TestReleaseDevel: |
730 | 103 | def test_release_devel_direct(self): | 174 | def test_release_devel_direct(self): |
731 | 104 | # ensure that there is no more than one ubuntu release marked as | 175 | # ensure that there is no more than one ubuntu release marked as |
732 | diff --git a/scripts/testfiles/cve_lib_test.example b/scripts/testfiles/cve_lib_test.example | |||
733 | 105 | new file mode 100644 | 176 | new file mode 100644 |
734 | index 0000000..2dad463 | |||
735 | --- /dev/null | |||
736 | +++ b/scripts/testfiles/cve_lib_test.example | |||
737 | @@ -0,0 +1,71 @@ | |||
738 | 1 | Candidate: CVE-2024-TEST | ||
739 | 2 | PublicDate: 2024-02-16 | ||
740 | 3 | References: | ||
741 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
742 | 5 | Description: | ||
743 | 6 | Some flaw description | ||
744 | 7 | Ubuntu-Description: | ||
745 | 8 | Notes: | ||
746 | 9 | Mitigation: | ||
747 | 10 | Bugs: | ||
748 | 11 | Priority: medium | ||
749 | 12 | Discovered-by: | ||
750 | 13 | Assigned-to: | ||
751 | 14 | CVSS: | ||
752 | 15 | |||
753 | 16 | Patches_openssl: | ||
754 | 17 | upstream_openssl: needs-triage | ||
755 | 18 | trusty_openssl: ignored (end of standard support) | ||
756 | 19 | trusty/esm_openssl: needs-triage | ||
757 | 20 | xenial_openssl: ignored (end of standard support) | ||
758 | 21 | esm-infra/xenial_openssl: needs-triage | ||
759 | 22 | fips-updates/xenial_openssl: needs-triage | ||
760 | 23 | fips/xenial_openssl: needs-triage | ||
761 | 24 | bionic_openssl: ignored (end of standard support) | ||
762 | 25 | esm-infra/bionic_openssl: needs-triage | ||
763 | 26 | fips-updates/bionic_openssl: needs-triage | ||
764 | 27 | fips/bionic_openssl: needs-triage | ||
765 | 28 | focal_openssl: needs-triage | ||
766 | 29 | fips-updates/focal_openssl: needs-triage | ||
767 | 30 | fips/focal_openssl: needs-triage | ||
768 | 31 | jammy_openssl: needs-triage | ||
769 | 32 | mantic_openssl: needs-triage | ||
770 | 33 | devel_openssl: needs-triage | ||
771 | 34 | |||
772 | 35 | Patches_openssl1.0: | ||
773 | 36 | upstream_openssl1.0: needs-triage | ||
774 | 37 | trusty_openssl1.0: DNE | ||
775 | 38 | xenial_openssl1.0: DNE | ||
776 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
777 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
778 | 41 | focal_openssl1.0: DNE | ||
779 | 42 | jammy_openssl1.0: DNE | ||
780 | 43 | mantic_openssl1.0: DNE | ||
781 | 44 | devel_openssl1.0: DNE | ||
782 | 45 | |||
783 | 46 | Patches_nodejs: | ||
784 | 47 | upstream_nodejs: needs-triage | ||
785 | 48 | trusty_nodejs: ignored (end of standard support) | ||
786 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
787 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
788 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
789 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
790 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
791 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
792 | 55 | esm-apps/focal_nodejs: needs-triage | ||
793 | 56 | jammy_nodejs: needed | ||
794 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
795 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
796 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
797 | 60 | |||
798 | 61 | Patches_edk2: | ||
799 | 62 | upstream_edk2: needs-triage | ||
800 | 63 | trusty_edk2: ignored (end of standard support) | ||
801 | 64 | xenial_edk2: ignored (end of standard support) | ||
802 | 65 | esm-apps/xenial_edk2: needs-triage | ||
803 | 66 | bionic_edk2: ignored (end of standard support) | ||
804 | 67 | esm-apps/bionic_edk2: needs-triage | ||
805 | 68 | focal_edk2: needs-triage | ||
806 | 69 | jammy_edk2: needs-triage | ||
807 | 70 | mantic_edk2: needs-triage | ||
808 | 71 | devel_edk2: needs-triage | ||
809 | diff --git a/scripts/testfiles/cve_lib_test_1.in b/scripts/testfiles/cve_lib_test_1.in | |||
810 | 0 | new file mode 100644 | 72 | new file mode 100644 |
811 | index 0000000..aa830d9 | |||
812 | --- /dev/null | |||
813 | +++ b/scripts/testfiles/cve_lib_test_1.in | |||
814 | @@ -0,0 +1,70 @@ | |||
815 | 1 | Candidate: CVE-2024-TEST | ||
816 | 2 | PublicDate: 2024-02-16 | ||
817 | 3 | References: | ||
818 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
819 | 5 | Description: | ||
820 | 6 | Some flaw description | ||
821 | 7 | Ubuntu-Description: | ||
822 | 8 | Notes: | ||
823 | 9 | Mitigation: | ||
824 | 10 | Bugs: | ||
825 | 11 | Priority: medium | ||
826 | 12 | Discovered-by: | ||
827 | 13 | Assigned-to: | ||
828 | 14 | CVSS: | ||
829 | 15 | |||
830 | 16 | Patches_openssl: | ||
831 | 17 | upstream_openssl: needs-triage | ||
832 | 18 | trusty_openssl: ignored (end of standard support) | ||
833 | 19 | trusty/esm_openssl: needs-triage | ||
834 | 20 | xenial_openssl: ignored (end of standard support) | ||
835 | 21 | esm-infra/xenial_openssl: needs-triage | ||
836 | 22 | fips-updates/xenial_openssl: needs-triage | ||
837 | 23 | fips/xenial_openssl: needs-triage | ||
838 | 24 | bionic_openssl: ignored (end of standard support) | ||
839 | 25 | esm-infra/bionic_openssl: needs-triage | ||
840 | 26 | fips-updates/bionic_openssl: needs-triage | ||
841 | 27 | fips/bionic_openssl: needs-triage | ||
842 | 28 | focal_openssl: needs-triage | ||
843 | 29 | fips-updates/focal_openssl: needs-triage | ||
844 | 30 | fips/focal_openssl: needs-triage | ||
845 | 31 | jammy_openssl: needs-triage | ||
846 | 32 | devel_openssl: needs-triage | ||
847 | 33 | |||
848 | 34 | Patches_openssl1.0: | ||
849 | 35 | upstream_openssl1.0: needs-triage | ||
850 | 36 | trusty_openssl1.0: DNE | ||
851 | 37 | xenial_openssl1.0: DNE | ||
852 | 38 | bionic_openssl1.0: ignored (end of standard support) | ||
853 | 39 | esm-infra/bionic_openssl1.0: needs-triage | ||
854 | 40 | focal_openssl1.0: DNE | ||
855 | 41 | jammy_openssl1.0: DNE | ||
856 | 42 | mantic_openssl1.0: DNE | ||
857 | 43 | devel_openssl1.0: DNE | ||
858 | 44 | |||
859 | 45 | Patches_nodejs: | ||
860 | 46 | upstream_nodejs: needs-triage | ||
861 | 47 | trusty_nodejs: ignored (end of standard support) | ||
862 | 48 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
863 | 49 | xenial_nodejs: not-affected (uses system openssl) | ||
864 | 50 | esm-apps/xenial_nodejs: needs-triage | ||
865 | 51 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
866 | 52 | esm-apps/bionic_nodejs: needs-triage | ||
867 | 53 | focal_nodejs: not-affected (uses system openssl) | ||
868 | 54 | esm-apps/focal_nodejs: needs-triage | ||
869 | 55 | jammy_nodejs: needed | ||
870 | 56 | esm-apps/jammy_nodejs: needs-triage | ||
871 | 57 | mantic_nodejs: not-affected (uses system openssl) | ||
872 | 58 | devel_nodejs: not-affected (uses system openssl) | ||
873 | 59 | |||
874 | 60 | Patches_edk2: | ||
875 | 61 | upstream_edk2: needs-triage | ||
876 | 62 | trusty_edk2: ignored (end of standard support) | ||
877 | 63 | xenial_edk2: ignored (end of standard support) | ||
878 | 64 | esm-apps/xenial_edk2: needs-triage | ||
879 | 65 | bionic_edk2: ignored (end of standard support) | ||
880 | 66 | esm-apps/bionic_edk2: needs-triage | ||
881 | 67 | focal_edk2: needs-triage | ||
882 | 68 | jammy_edk2: needs-triage | ||
883 | 69 | mantic_edk2: needs-triage | ||
884 | 70 | devel_edk2: needs-triage | ||
885 | diff --git a/scripts/testfiles/cve_lib_test_1.result b/scripts/testfiles/cve_lib_test_1.result | |||
886 | 0 | new file mode 100644 | 71 | new file mode 100644 |
887 | index 0000000..2dad463 | |||
888 | --- /dev/null | |||
889 | +++ b/scripts/testfiles/cve_lib_test_1.result | |||
890 | @@ -0,0 +1,71 @@ | |||
891 | 1 | Candidate: CVE-2024-TEST | ||
892 | 2 | PublicDate: 2024-02-16 | ||
893 | 3 | References: | ||
894 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
895 | 5 | Description: | ||
896 | 6 | Some flaw description | ||
897 | 7 | Ubuntu-Description: | ||
898 | 8 | Notes: | ||
899 | 9 | Mitigation: | ||
900 | 10 | Bugs: | ||
901 | 11 | Priority: medium | ||
902 | 12 | Discovered-by: | ||
903 | 13 | Assigned-to: | ||
904 | 14 | CVSS: | ||
905 | 15 | |||
906 | 16 | Patches_openssl: | ||
907 | 17 | upstream_openssl: needs-triage | ||
908 | 18 | trusty_openssl: ignored (end of standard support) | ||
909 | 19 | trusty/esm_openssl: needs-triage | ||
910 | 20 | xenial_openssl: ignored (end of standard support) | ||
911 | 21 | esm-infra/xenial_openssl: needs-triage | ||
912 | 22 | fips-updates/xenial_openssl: needs-triage | ||
913 | 23 | fips/xenial_openssl: needs-triage | ||
914 | 24 | bionic_openssl: ignored (end of standard support) | ||
915 | 25 | esm-infra/bionic_openssl: needs-triage | ||
916 | 26 | fips-updates/bionic_openssl: needs-triage | ||
917 | 27 | fips/bionic_openssl: needs-triage | ||
918 | 28 | focal_openssl: needs-triage | ||
919 | 29 | fips-updates/focal_openssl: needs-triage | ||
920 | 30 | fips/focal_openssl: needs-triage | ||
921 | 31 | jammy_openssl: needs-triage | ||
922 | 32 | mantic_openssl: needs-triage | ||
923 | 33 | devel_openssl: needs-triage | ||
924 | 34 | |||
925 | 35 | Patches_openssl1.0: | ||
926 | 36 | upstream_openssl1.0: needs-triage | ||
927 | 37 | trusty_openssl1.0: DNE | ||
928 | 38 | xenial_openssl1.0: DNE | ||
929 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
930 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
931 | 41 | focal_openssl1.0: DNE | ||
932 | 42 | jammy_openssl1.0: DNE | ||
933 | 43 | mantic_openssl1.0: DNE | ||
934 | 44 | devel_openssl1.0: DNE | ||
935 | 45 | |||
936 | 46 | Patches_nodejs: | ||
937 | 47 | upstream_nodejs: needs-triage | ||
938 | 48 | trusty_nodejs: ignored (end of standard support) | ||
939 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
940 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
941 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
942 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
943 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
944 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
945 | 55 | esm-apps/focal_nodejs: needs-triage | ||
946 | 56 | jammy_nodejs: needed | ||
947 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
948 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
949 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
950 | 60 | |||
951 | 61 | Patches_edk2: | ||
952 | 62 | upstream_edk2: needs-triage | ||
953 | 63 | trusty_edk2: ignored (end of standard support) | ||
954 | 64 | xenial_edk2: ignored (end of standard support) | ||
955 | 65 | esm-apps/xenial_edk2: needs-triage | ||
956 | 66 | bionic_edk2: ignored (end of standard support) | ||
957 | 67 | esm-apps/bionic_edk2: needs-triage | ||
958 | 68 | focal_edk2: needs-triage | ||
959 | 69 | jammy_edk2: needs-triage | ||
960 | 70 | mantic_edk2: needs-triage | ||
961 | 71 | devel_edk2: needs-triage | ||
962 | diff --git a/scripts/testfiles/cve_lib_test_10.in b/scripts/testfiles/cve_lib_test_10.in | |||
963 | 0 | new file mode 100644 | 72 | new file mode 100644 |
964 | index 0000000..2dad463 | |||
965 | --- /dev/null | |||
966 | +++ b/scripts/testfiles/cve_lib_test_10.in | |||
967 | @@ -0,0 +1,71 @@ | |||
968 | 1 | Candidate: CVE-2024-TEST | ||
969 | 2 | PublicDate: 2024-02-16 | ||
970 | 3 | References: | ||
971 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
972 | 5 | Description: | ||
973 | 6 | Some flaw description | ||
974 | 7 | Ubuntu-Description: | ||
975 | 8 | Notes: | ||
976 | 9 | Mitigation: | ||
977 | 10 | Bugs: | ||
978 | 11 | Priority: medium | ||
979 | 12 | Discovered-by: | ||
980 | 13 | Assigned-to: | ||
981 | 14 | CVSS: | ||
982 | 15 | |||
983 | 16 | Patches_openssl: | ||
984 | 17 | upstream_openssl: needs-triage | ||
985 | 18 | trusty_openssl: ignored (end of standard support) | ||
986 | 19 | trusty/esm_openssl: needs-triage | ||
987 | 20 | xenial_openssl: ignored (end of standard support) | ||
988 | 21 | esm-infra/xenial_openssl: needs-triage | ||
989 | 22 | fips-updates/xenial_openssl: needs-triage | ||
990 | 23 | fips/xenial_openssl: needs-triage | ||
991 | 24 | bionic_openssl: ignored (end of standard support) | ||
992 | 25 | esm-infra/bionic_openssl: needs-triage | ||
993 | 26 | fips-updates/bionic_openssl: needs-triage | ||
994 | 27 | fips/bionic_openssl: needs-triage | ||
995 | 28 | focal_openssl: needs-triage | ||
996 | 29 | fips-updates/focal_openssl: needs-triage | ||
997 | 30 | fips/focal_openssl: needs-triage | ||
998 | 31 | jammy_openssl: needs-triage | ||
999 | 32 | mantic_openssl: needs-triage | ||
1000 | 33 | devel_openssl: needs-triage | ||
1001 | 34 | |||
1002 | 35 | Patches_openssl1.0: | ||
1003 | 36 | upstream_openssl1.0: needs-triage | ||
1004 | 37 | trusty_openssl1.0: DNE | ||
1005 | 38 | xenial_openssl1.0: DNE | ||
1006 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
1007 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
1008 | 41 | focal_openssl1.0: DNE | ||
1009 | 42 | jammy_openssl1.0: DNE | ||
1010 | 43 | mantic_openssl1.0: DNE | ||
1011 | 44 | devel_openssl1.0: DNE | ||
1012 | 45 | |||
1013 | 46 | Patches_nodejs: | ||
1014 | 47 | upstream_nodejs: needs-triage | ||
1015 | 48 | trusty_nodejs: ignored (end of standard support) | ||
1016 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
1017 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
1018 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
1019 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
1020 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
1021 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
1022 | 55 | esm-apps/focal_nodejs: needs-triage | ||
1023 | 56 | jammy_nodejs: needed | ||
1024 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
1025 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
1026 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
1027 | 60 | |||
1028 | 61 | Patches_edk2: | ||
1029 | 62 | upstream_edk2: needs-triage | ||
1030 | 63 | trusty_edk2: ignored (end of standard support) | ||
1031 | 64 | xenial_edk2: ignored (end of standard support) | ||
1032 | 65 | esm-apps/xenial_edk2: needs-triage | ||
1033 | 66 | bionic_edk2: ignored (end of standard support) | ||
1034 | 67 | esm-apps/bionic_edk2: needs-triage | ||
1035 | 68 | focal_edk2: needs-triage | ||
1036 | 69 | jammy_edk2: needs-triage | ||
1037 | 70 | mantic_edk2: needs-triage | ||
1038 | 71 | devel_edk2: needs-triage | ||
1039 | diff --git a/scripts/testfiles/cve_lib_test_10.result b/scripts/testfiles/cve_lib_test_10.result | |||
1040 | 0 | new file mode 100644 | 72 | new file mode 100644 |
1041 | index 0000000..aa830d9 | |||
1042 | --- /dev/null | |||
1043 | +++ b/scripts/testfiles/cve_lib_test_10.result | |||
1044 | @@ -0,0 +1,70 @@ | |||
1045 | 1 | Candidate: CVE-2024-TEST | ||
1046 | 2 | PublicDate: 2024-02-16 | ||
1047 | 3 | References: | ||
1048 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
1049 | 5 | Description: | ||
1050 | 6 | Some flaw description | ||
1051 | 7 | Ubuntu-Description: | ||
1052 | 8 | Notes: | ||
1053 | 9 | Mitigation: | ||
1054 | 10 | Bugs: | ||
1055 | 11 | Priority: medium | ||
1056 | 12 | Discovered-by: | ||
1057 | 13 | Assigned-to: | ||
1058 | 14 | CVSS: | ||
1059 | 15 | |||
1060 | 16 | Patches_openssl: | ||
1061 | 17 | upstream_openssl: needs-triage | ||
1062 | 18 | trusty_openssl: ignored (end of standard support) | ||
1063 | 19 | trusty/esm_openssl: needs-triage | ||
1064 | 20 | xenial_openssl: ignored (end of standard support) | ||
1065 | 21 | esm-infra/xenial_openssl: needs-triage | ||
1066 | 22 | fips-updates/xenial_openssl: needs-triage | ||
1067 | 23 | fips/xenial_openssl: needs-triage | ||
1068 | 24 | bionic_openssl: ignored (end of standard support) | ||
1069 | 25 | esm-infra/bionic_openssl: needs-triage | ||
1070 | 26 | fips-updates/bionic_openssl: needs-triage | ||
1071 | 27 | fips/bionic_openssl: needs-triage | ||
1072 | 28 | focal_openssl: needs-triage | ||
1073 | 29 | fips-updates/focal_openssl: needs-triage | ||
1074 | 30 | fips/focal_openssl: needs-triage | ||
1075 | 31 | jammy_openssl: needs-triage | ||
1076 | 32 | devel_openssl: needs-triage | ||
1077 | 33 | |||
1078 | 34 | Patches_openssl1.0: | ||
1079 | 35 | upstream_openssl1.0: needs-triage | ||
1080 | 36 | trusty_openssl1.0: DNE | ||
1081 | 37 | xenial_openssl1.0: DNE | ||
1082 | 38 | bionic_openssl1.0: ignored (end of standard support) | ||
1083 | 39 | esm-infra/bionic_openssl1.0: needs-triage | ||
1084 | 40 | focal_openssl1.0: DNE | ||
1085 | 41 | jammy_openssl1.0: DNE | ||
1086 | 42 | mantic_openssl1.0: DNE | ||
1087 | 43 | devel_openssl1.0: DNE | ||
1088 | 44 | |||
1089 | 45 | Patches_nodejs: | ||
1090 | 46 | upstream_nodejs: needs-triage | ||
1091 | 47 | trusty_nodejs: ignored (end of standard support) | ||
1092 | 48 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
1093 | 49 | xenial_nodejs: not-affected (uses system openssl) | ||
1094 | 50 | esm-apps/xenial_nodejs: needs-triage | ||
1095 | 51 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
1096 | 52 | esm-apps/bionic_nodejs: needs-triage | ||
1097 | 53 | focal_nodejs: not-affected (uses system openssl) | ||
1098 | 54 | esm-apps/focal_nodejs: needs-triage | ||
1099 | 55 | jammy_nodejs: needed | ||
1100 | 56 | esm-apps/jammy_nodejs: needs-triage | ||
1101 | 57 | mantic_nodejs: not-affected (uses system openssl) | ||
1102 | 58 | devel_nodejs: not-affected (uses system openssl) | ||
1103 | 59 | |||
1104 | 60 | Patches_edk2: | ||
1105 | 61 | upstream_edk2: needs-triage | ||
1106 | 62 | trusty_edk2: ignored (end of standard support) | ||
1107 | 63 | xenial_edk2: ignored (end of standard support) | ||
1108 | 64 | esm-apps/xenial_edk2: needs-triage | ||
1109 | 65 | bionic_edk2: ignored (end of standard support) | ||
1110 | 66 | esm-apps/bionic_edk2: needs-triage | ||
1111 | 67 | focal_edk2: needs-triage | ||
1112 | 68 | jammy_edk2: needs-triage | ||
1113 | 69 | mantic_edk2: needs-triage | ||
1114 | 70 | devel_edk2: needs-triage | ||
1115 | diff --git a/scripts/testfiles/cve_lib_test_2.in b/scripts/testfiles/cve_lib_test_2.in | |||
1116 | 0 | new file mode 100644 | 71 | new file mode 100644 |
1117 | index 0000000..95cda1b | |||
1118 | --- /dev/null | |||
1119 | +++ b/scripts/testfiles/cve_lib_test_2.in | |||
1120 | @@ -0,0 +1,70 @@ | |||
1121 | 1 | Candidate: CVE-2024-TEST | ||
1122 | 2 | PublicDate: 2024-02-16 | ||
1123 | 3 | References: | ||
1124 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
1125 | 5 | Description: | ||
1126 | 6 | Some flaw description | ||
1127 | 7 | Ubuntu-Description: | ||
1128 | 8 | Notes: | ||
1129 | 9 | Mitigation: | ||
1130 | 10 | Bugs: | ||
1131 | 11 | Priority: medium | ||
1132 | 12 | Discovered-by: | ||
1133 | 13 | Assigned-to: | ||
1134 | 14 | CVSS: | ||
1135 | 15 | |||
1136 | 16 | Patches_openssl: | ||
1137 | 17 | upstream_openssl: needs-triage | ||
1138 | 18 | trusty_openssl: ignored (end of standard support) | ||
1139 | 19 | trusty/esm_openssl: needs-triage | ||
1140 | 20 | xenial_openssl: ignored (end of standard support) | ||
1141 | 21 | esm-infra/xenial_openssl: needs-triage | ||
1142 | 22 | fips-updates/xenial_openssl: needs-triage | ||
1143 | 23 | fips/xenial_openssl: needs-triage | ||
1144 | 24 | bionic_openssl: ignored (end of standard support) | ||
1145 | 25 | esm-infra/bionic_openssl: needs-triage | ||
1146 | 26 | fips-updates/bionic_openssl: needs-triage | ||
1147 | 27 | fips/bionic_openssl: needs-triage | ||
1148 | 28 | focal_openssl: needs-triage | ||
1149 | 29 | fips-updates/focal_openssl: needs-triage | ||
1150 | 30 | fips/focal_openssl: needs-triage | ||
1151 | 31 | jammy_openssl: needs-triage | ||
1152 | 32 | mantic_openssl: needs-triage | ||
1153 | 33 | |||
1154 | 34 | Patches_openssl1.0: | ||
1155 | 35 | upstream_openssl1.0: needs-triage | ||
1156 | 36 | trusty_openssl1.0: DNE | ||
1157 | 37 | xenial_openssl1.0: DNE | ||
1158 | 38 | bionic_openssl1.0: ignored (end of standard support) | ||
1159 | 39 | esm-infra/bionic_openssl1.0: needs-triage | ||
1160 | 40 | focal_openssl1.0: DNE | ||
1161 | 41 | jammy_openssl1.0: DNE | ||
1162 | 42 | mantic_openssl1.0: DNE | ||
1163 | 43 | devel_openssl1.0: DNE | ||
1164 | 44 | |||
1165 | 45 | Patches_nodejs: | ||
1166 | 46 | upstream_nodejs: needs-triage | ||
1167 | 47 | trusty_nodejs: ignored (end of standard support) | ||
1168 | 48 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
1169 | 49 | xenial_nodejs: not-affected (uses system openssl) | ||
1170 | 50 | esm-apps/xenial_nodejs: needs-triage | ||
1171 | 51 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
1172 | 52 | esm-apps/bionic_nodejs: needs-triage | ||
1173 | 53 | focal_nodejs: not-affected (uses system openssl) | ||
1174 | 54 | esm-apps/focal_nodejs: needs-triage | ||
1175 | 55 | jammy_nodejs: needed | ||
1176 | 56 | esm-apps/jammy_nodejs: needs-triage | ||
1177 | 57 | mantic_nodejs: not-affected (uses system openssl) | ||
1178 | 58 | devel_nodejs: not-affected (uses system openssl) | ||
1179 | 59 | |||
1180 | 60 | Patches_edk2: | ||
1181 | 61 | upstream_edk2: needs-triage | ||
1182 | 62 | trusty_edk2: ignored (end of standard support) | ||
1183 | 63 | xenial_edk2: ignored (end of standard support) | ||
1184 | 64 | esm-apps/xenial_edk2: needs-triage | ||
1185 | 65 | bionic_edk2: ignored (end of standard support) | ||
1186 | 66 | esm-apps/bionic_edk2: needs-triage | ||
1187 | 67 | focal_edk2: needs-triage | ||
1188 | 68 | jammy_edk2: needs-triage | ||
1189 | 69 | mantic_edk2: needs-triage | ||
1190 | 70 | devel_edk2: needs-triage | ||
1191 | diff --git a/scripts/testfiles/cve_lib_test_2.result b/scripts/testfiles/cve_lib_test_2.result | |||
1192 | 0 | new file mode 100644 | 71 | new file mode 100644 |
1193 | index 0000000..2dad463 | |||
1194 | --- /dev/null | |||
1195 | +++ b/scripts/testfiles/cve_lib_test_2.result | |||
1196 | @@ -0,0 +1,71 @@ | |||
1197 | 1 | Candidate: CVE-2024-TEST | ||
1198 | 2 | PublicDate: 2024-02-16 | ||
1199 | 3 | References: | ||
1200 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
1201 | 5 | Description: | ||
1202 | 6 | Some flaw description | ||
1203 | 7 | Ubuntu-Description: | ||
1204 | 8 | Notes: | ||
1205 | 9 | Mitigation: | ||
1206 | 10 | Bugs: | ||
1207 | 11 | Priority: medium | ||
1208 | 12 | Discovered-by: | ||
1209 | 13 | Assigned-to: | ||
1210 | 14 | CVSS: | ||
1211 | 15 | |||
1212 | 16 | Patches_openssl: | ||
1213 | 17 | upstream_openssl: needs-triage | ||
1214 | 18 | trusty_openssl: ignored (end of standard support) | ||
1215 | 19 | trusty/esm_openssl: needs-triage | ||
1216 | 20 | xenial_openssl: ignored (end of standard support) | ||
1217 | 21 | esm-infra/xenial_openssl: needs-triage | ||
1218 | 22 | fips-updates/xenial_openssl: needs-triage | ||
1219 | 23 | fips/xenial_openssl: needs-triage | ||
1220 | 24 | bionic_openssl: ignored (end of standard support) | ||
1221 | 25 | esm-infra/bionic_openssl: needs-triage | ||
1222 | 26 | fips-updates/bionic_openssl: needs-triage | ||
1223 | 27 | fips/bionic_openssl: needs-triage | ||
1224 | 28 | focal_openssl: needs-triage | ||
1225 | 29 | fips-updates/focal_openssl: needs-triage | ||
1226 | 30 | fips/focal_openssl: needs-triage | ||
1227 | 31 | jammy_openssl: needs-triage | ||
1228 | 32 | mantic_openssl: needs-triage | ||
1229 | 33 | devel_openssl: needs-triage | ||
1230 | 34 | |||
1231 | 35 | Patches_openssl1.0: | ||
1232 | 36 | upstream_openssl1.0: needs-triage | ||
1233 | 37 | trusty_openssl1.0: DNE | ||
1234 | 38 | xenial_openssl1.0: DNE | ||
1235 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
1236 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
1237 | 41 | focal_openssl1.0: DNE | ||
1238 | 42 | jammy_openssl1.0: DNE | ||
1239 | 43 | mantic_openssl1.0: DNE | ||
1240 | 44 | devel_openssl1.0: DNE | ||
1241 | 45 | |||
1242 | 46 | Patches_nodejs: | ||
1243 | 47 | upstream_nodejs: needs-triage | ||
1244 | 48 | trusty_nodejs: ignored (end of standard support) | ||
1245 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
1246 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
1247 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
1248 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
1249 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
1250 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
1251 | 55 | esm-apps/focal_nodejs: needs-triage | ||
1252 | 56 | jammy_nodejs: needed | ||
1253 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
1254 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
1255 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
1256 | 60 | |||
1257 | 61 | Patches_edk2: | ||
1258 | 62 | upstream_edk2: needs-triage | ||
1259 | 63 | trusty_edk2: ignored (end of standard support) | ||
1260 | 64 | xenial_edk2: ignored (end of standard support) | ||
1261 | 65 | esm-apps/xenial_edk2: needs-triage | ||
1262 | 66 | bionic_edk2: ignored (end of standard support) | ||
1263 | 67 | esm-apps/bionic_edk2: needs-triage | ||
1264 | 68 | focal_edk2: needs-triage | ||
1265 | 69 | jammy_edk2: needs-triage | ||
1266 | 70 | mantic_edk2: needs-triage | ||
1267 | 71 | devel_edk2: needs-triage | ||
1268 | diff --git a/scripts/testfiles/cve_lib_test_3.in b/scripts/testfiles/cve_lib_test_3.in | |||
1269 | 0 | new file mode 100644 | 72 | new file mode 100644 |
1270 | index 0000000..d2e0b69 | |||
1271 | --- /dev/null | |||
1272 | +++ b/scripts/testfiles/cve_lib_test_3.in | |||
1273 | @@ -0,0 +1,70 @@ | |||
1274 | 1 | Candidate: CVE-2024-TEST | ||
1275 | 2 | PublicDate: 2024-02-16 | ||
1276 | 3 | References: | ||
1277 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
1278 | 5 | Description: | ||
1279 | 6 | Some flaw description | ||
1280 | 7 | Ubuntu-Description: | ||
1281 | 8 | Notes: | ||
1282 | 9 | Mitigation: | ||
1283 | 10 | Bugs: | ||
1284 | 11 | Priority: medium | ||
1285 | 12 | Discovered-by: | ||
1286 | 13 | Assigned-to: | ||
1287 | 14 | CVSS: | ||
1288 | 15 | |||
1289 | 16 | Patches_openssl: | ||
1290 | 17 | upstream_openssl: needs-triage | ||
1291 | 18 | trusty_openssl: ignored (end of standard support) | ||
1292 | 19 | trusty/esm_openssl: needs-triage | ||
1293 | 20 | xenial_openssl: ignored (end of standard support) | ||
1294 | 21 | esm-infra/xenial_openssl: needs-triage | ||
1295 | 22 | fips-updates/xenial_openssl: needs-triage | ||
1296 | 23 | fips/xenial_openssl: needs-triage | ||
1297 | 24 | bionic_openssl: ignored (end of standard support) | ||
1298 | 25 | esm-infra/bionic_openssl: needs-triage | ||
1299 | 26 | fips-updates/bionic_openssl: needs-triage | ||
1300 | 27 | fips/bionic_openssl: needs-triage | ||
1301 | 28 | focal_openssl: needs-triage | ||
1302 | 29 | fips-updates/focal_openssl: needs-triage | ||
1303 | 30 | fips/focal_openssl: needs-triage | ||
1304 | 31 | jammy_openssl: needs-triage | ||
1305 | 32 | mantic_openssl: needs-triage | ||
1306 | 33 | devel_openssl: needs-triage | ||
1307 | 34 | |||
1308 | 35 | Patches_openssl1.0: | ||
1309 | 36 | upstream_openssl1.0: needs-triage | ||
1310 | 37 | trusty_openssl1.0: DNE | ||
1311 | 38 | xenial_openssl1.0: DNE | ||
1312 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
1313 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
1314 | 41 | focal_openssl1.0: DNE | ||
1315 | 42 | jammy_openssl1.0: DNE | ||
1316 | 43 | mantic_openssl1.0: DNE | ||
1317 | 44 | devel_openssl1.0: DNE | ||
1318 | 45 | |||
1319 | 46 | Patches_nodejs: | ||
1320 | 47 | upstream_nodejs: needs-triage | ||
1321 | 48 | trusty_nodejs: ignored (end of standard support) | ||
1322 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
1323 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
1324 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
1325 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
1326 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
1327 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
1328 | 55 | esm-apps/focal_nodejs: needs-triage | ||
1329 | 56 | jammy_nodejs: needed | ||
1330 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
1331 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
1332 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
1333 | 60 | |||
1334 | 61 | Patches_edk2: | ||
1335 | 62 | upstream_edk2: needs-triage | ||
1336 | 63 | trusty_edk2: ignored (end of standard support) | ||
1337 | 64 | xenial_edk2: ignored (end of standard support) | ||
1338 | 65 | esm-apps/xenial_edk2: needs-triage | ||
1339 | 66 | bionic_edk2: ignored (end of standard support) | ||
1340 | 67 | esm-apps/bionic_edk2: needs-triage | ||
1341 | 68 | focal_edk2: needs-triage | ||
1342 | 69 | mantic_edk2: needs-triage | ||
1343 | 70 | devel_edk2: needs-triage | ||
1344 | diff --git a/scripts/testfiles/cve_lib_test_3.result b/scripts/testfiles/cve_lib_test_3.result | |||
1345 | 0 | new file mode 100644 | 71 | new file mode 100644 |
1346 | index 0000000..2dad463 | |||
1347 | --- /dev/null | |||
1348 | +++ b/scripts/testfiles/cve_lib_test_3.result | |||
1349 | @@ -0,0 +1,71 @@ | |||
1350 | 1 | Candidate: CVE-2024-TEST | ||
1351 | 2 | PublicDate: 2024-02-16 | ||
1352 | 3 | References: | ||
1353 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
1354 | 5 | Description: | ||
1355 | 6 | Some flaw description | ||
1356 | 7 | Ubuntu-Description: | ||
1357 | 8 | Notes: | ||
1358 | 9 | Mitigation: | ||
1359 | 10 | Bugs: | ||
1360 | 11 | Priority: medium | ||
1361 | 12 | Discovered-by: | ||
1362 | 13 | Assigned-to: | ||
1363 | 14 | CVSS: | ||
1364 | 15 | |||
1365 | 16 | Patches_openssl: | ||
1366 | 17 | upstream_openssl: needs-triage | ||
1367 | 18 | trusty_openssl: ignored (end of standard support) | ||
1368 | 19 | trusty/esm_openssl: needs-triage | ||
1369 | 20 | xenial_openssl: ignored (end of standard support) | ||
1370 | 21 | esm-infra/xenial_openssl: needs-triage | ||
1371 | 22 | fips-updates/xenial_openssl: needs-triage | ||
1372 | 23 | fips/xenial_openssl: needs-triage | ||
1373 | 24 | bionic_openssl: ignored (end of standard support) | ||
1374 | 25 | esm-infra/bionic_openssl: needs-triage | ||
1375 | 26 | fips-updates/bionic_openssl: needs-triage | ||
1376 | 27 | fips/bionic_openssl: needs-triage | ||
1377 | 28 | focal_openssl: needs-triage | ||
1378 | 29 | fips-updates/focal_openssl: needs-triage | ||
1379 | 30 | fips/focal_openssl: needs-triage | ||
1380 | 31 | jammy_openssl: needs-triage | ||
1381 | 32 | mantic_openssl: needs-triage | ||
1382 | 33 | devel_openssl: needs-triage | ||
1383 | 34 | |||
1384 | 35 | Patches_openssl1.0: | ||
1385 | 36 | upstream_openssl1.0: needs-triage | ||
1386 | 37 | trusty_openssl1.0: DNE | ||
1387 | 38 | xenial_openssl1.0: DNE | ||
1388 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
1389 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
1390 | 41 | focal_openssl1.0: DNE | ||
1391 | 42 | jammy_openssl1.0: DNE | ||
1392 | 43 | mantic_openssl1.0: DNE | ||
1393 | 44 | devel_openssl1.0: DNE | ||
1394 | 45 | |||
1395 | 46 | Patches_nodejs: | ||
1396 | 47 | upstream_nodejs: needs-triage | ||
1397 | 48 | trusty_nodejs: ignored (end of standard support) | ||
1398 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
1399 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
1400 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
1401 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
1402 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
1403 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
1404 | 55 | esm-apps/focal_nodejs: needs-triage | ||
1405 | 56 | jammy_nodejs: needed | ||
1406 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
1407 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
1408 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
1409 | 60 | |||
1410 | 61 | Patches_edk2: | ||
1411 | 62 | upstream_edk2: needs-triage | ||
1412 | 63 | trusty_edk2: ignored (end of standard support) | ||
1413 | 64 | xenial_edk2: ignored (end of standard support) | ||
1414 | 65 | esm-apps/xenial_edk2: needs-triage | ||
1415 | 66 | bionic_edk2: ignored (end of standard support) | ||
1416 | 67 | esm-apps/bionic_edk2: needs-triage | ||
1417 | 68 | focal_edk2: needs-triage | ||
1418 | 69 | jammy_edk2: needs-triage | ||
1419 | 70 | mantic_edk2: needs-triage | ||
1420 | 71 | devel_edk2: needs-triage | ||
1421 | diff --git a/scripts/testfiles/cve_lib_test_4.in b/scripts/testfiles/cve_lib_test_4.in | |||
1422 | 0 | new file mode 100644 | 72 | new file mode 100644 |
1423 | index 0000000..b9799d0 | |||
1424 | --- /dev/null | |||
1425 | +++ b/scripts/testfiles/cve_lib_test_4.in | |||
1426 | @@ -0,0 +1,70 @@ | |||
1427 | 1 | Candidate: CVE-2024-TEST | ||
1428 | 2 | PublicDate: 2024-02-16 | ||
1429 | 3 | References: | ||
1430 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
1431 | 5 | Description: | ||
1432 | 6 | Some flaw description | ||
1433 | 7 | Ubuntu-Description: | ||
1434 | 8 | Notes: | ||
1435 | 9 | Mitigation: | ||
1436 | 10 | Bugs: | ||
1437 | 11 | Priority: medium | ||
1438 | 12 | Discovered-by: | ||
1439 | 13 | Assigned-to: | ||
1440 | 14 | CVSS: | ||
1441 | 15 | |||
1442 | 16 | Patches_openssl: | ||
1443 | 17 | upstream_openssl: needs-triage | ||
1444 | 18 | trusty_openssl: ignored (end of standard support) | ||
1445 | 19 | trusty/esm_openssl: needs-triage | ||
1446 | 20 | xenial_openssl: ignored (end of standard support) | ||
1447 | 21 | esm-infra/xenial_openssl: needs-triage | ||
1448 | 22 | fips-updates/xenial_openssl: needs-triage | ||
1449 | 23 | fips/xenial_openssl: needs-triage | ||
1450 | 24 | bionic_openssl: ignored (end of standard support) | ||
1451 | 25 | esm-infra/bionic_openssl: needs-triage | ||
1452 | 26 | fips-updates/bionic_openssl: needs-triage | ||
1453 | 27 | fips/bionic_openssl: needs-triage | ||
1454 | 28 | focal_openssl: needs-triage | ||
1455 | 29 | fips-updates/focal_openssl: needs-triage | ||
1456 | 30 | fips/focal_openssl: needs-triage | ||
1457 | 31 | jammy_openssl: needs-triage | ||
1458 | 32 | mantic_openssl: needs-triage | ||
1459 | 33 | devel_openssl: needs-triage | ||
1460 | 34 | |||
1461 | 35 | Patches_openssl1.0: | ||
1462 | 36 | upstream_openssl1.0: needs-triage | ||
1463 | 37 | trusty_openssl1.0: DNE | ||
1464 | 38 | xenial_openssl1.0: DNE | ||
1465 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
1466 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
1467 | 41 | focal_openssl1.0: DNE | ||
1468 | 42 | jammy_openssl1.0: DNE | ||
1469 | 43 | mantic_openssl1.0: DNE | ||
1470 | 44 | devel_openssl1.0: DNE | ||
1471 | 45 | |||
1472 | 46 | Patches_nodejs: | ||
1473 | 47 | upstream_nodejs: needs-triage | ||
1474 | 48 | trusty_nodejs: ignored (end of standard support) | ||
1475 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
1476 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
1477 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
1478 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
1479 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
1480 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
1481 | 55 | esm-apps/focal_nodejs: needs-triage | ||
1482 | 56 | jammy_nodejs: needed | ||
1483 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
1484 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
1485 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
1486 | 60 | |||
1487 | 61 | Patches_edk2: | ||
1488 | 62 | upstream_edk2: needs-triage | ||
1489 | 63 | trusty_edk2: ignored (end of standard support) | ||
1490 | 64 | xenial_edk2: ignored (end of standard support) | ||
1491 | 65 | esm-apps/xenial_edk2: needs-triage | ||
1492 | 66 | bionic_edk2: ignored (end of standard support) | ||
1493 | 67 | esm-apps/bionic_edk2: needs-triage | ||
1494 | 68 | focal_edk2: needs-triage | ||
1495 | 69 | jammy_edk2: needs-triage | ||
1496 | 70 | mantic_edk2: needs-triage | ||
1497 | diff --git a/scripts/testfiles/cve_lib_test_4.result b/scripts/testfiles/cve_lib_test_4.result | |||
1498 | 0 | new file mode 100644 | 71 | new file mode 100644 |
1499 | index 0000000..2dad463 | |||
1500 | --- /dev/null | |||
1501 | +++ b/scripts/testfiles/cve_lib_test_4.result | |||
1502 | @@ -0,0 +1,71 @@ | |||
1503 | 1 | Candidate: CVE-2024-TEST | ||
1504 | 2 | PublicDate: 2024-02-16 | ||
1505 | 3 | References: | ||
1506 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
1507 | 5 | Description: | ||
1508 | 6 | Some flaw description | ||
1509 | 7 | Ubuntu-Description: | ||
1510 | 8 | Notes: | ||
1511 | 9 | Mitigation: | ||
1512 | 10 | Bugs: | ||
1513 | 11 | Priority: medium | ||
1514 | 12 | Discovered-by: | ||
1515 | 13 | Assigned-to: | ||
1516 | 14 | CVSS: | ||
1517 | 15 | |||
1518 | 16 | Patches_openssl: | ||
1519 | 17 | upstream_openssl: needs-triage | ||
1520 | 18 | trusty_openssl: ignored (end of standard support) | ||
1521 | 19 | trusty/esm_openssl: needs-triage | ||
1522 | 20 | xenial_openssl: ignored (end of standard support) | ||
1523 | 21 | esm-infra/xenial_openssl: needs-triage | ||
1524 | 22 | fips-updates/xenial_openssl: needs-triage | ||
1525 | 23 | fips/xenial_openssl: needs-triage | ||
1526 | 24 | bionic_openssl: ignored (end of standard support) | ||
1527 | 25 | esm-infra/bionic_openssl: needs-triage | ||
1528 | 26 | fips-updates/bionic_openssl: needs-triage | ||
1529 | 27 | fips/bionic_openssl: needs-triage | ||
1530 | 28 | focal_openssl: needs-triage | ||
1531 | 29 | fips-updates/focal_openssl: needs-triage | ||
1532 | 30 | fips/focal_openssl: needs-triage | ||
1533 | 31 | jammy_openssl: needs-triage | ||
1534 | 32 | mantic_openssl: needs-triage | ||
1535 | 33 | devel_openssl: needs-triage | ||
1536 | 34 | |||
1537 | 35 | Patches_openssl1.0: | ||
1538 | 36 | upstream_openssl1.0: needs-triage | ||
1539 | 37 | trusty_openssl1.0: DNE | ||
1540 | 38 | xenial_openssl1.0: DNE | ||
1541 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
1542 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
1543 | 41 | focal_openssl1.0: DNE | ||
1544 | 42 | jammy_openssl1.0: DNE | ||
1545 | 43 | mantic_openssl1.0: DNE | ||
1546 | 44 | devel_openssl1.0: DNE | ||
1547 | 45 | |||
1548 | 46 | Patches_nodejs: | ||
1549 | 47 | upstream_nodejs: needs-triage | ||
1550 | 48 | trusty_nodejs: ignored (end of standard support) | ||
1551 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
1552 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
1553 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
1554 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
1555 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
1556 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
1557 | 55 | esm-apps/focal_nodejs: needs-triage | ||
1558 | 56 | jammy_nodejs: needed | ||
1559 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
1560 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
1561 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
1562 | 60 | |||
1563 | 61 | Patches_edk2: | ||
1564 | 62 | upstream_edk2: needs-triage | ||
1565 | 63 | trusty_edk2: ignored (end of standard support) | ||
1566 | 64 | xenial_edk2: ignored (end of standard support) | ||
1567 | 65 | esm-apps/xenial_edk2: needs-triage | ||
1568 | 66 | bionic_edk2: ignored (end of standard support) | ||
1569 | 67 | esm-apps/bionic_edk2: needs-triage | ||
1570 | 68 | focal_edk2: needs-triage | ||
1571 | 69 | jammy_edk2: needs-triage | ||
1572 | 70 | mantic_edk2: needs-triage | ||
1573 | 71 | devel_edk2: needs-triage | ||
1574 | diff --git a/scripts/testfiles/cve_lib_test_5.in b/scripts/testfiles/cve_lib_test_5.in | |||
1575 | 0 | new file mode 100644 | 72 | new file mode 100644 |
1576 | index 0000000..aa830d9 | |||
1577 | --- /dev/null | |||
1578 | +++ b/scripts/testfiles/cve_lib_test_5.in | |||
1579 | @@ -0,0 +1,70 @@ | |||
1580 | 1 | Candidate: CVE-2024-TEST | ||
1581 | 2 | PublicDate: 2024-02-16 | ||
1582 | 3 | References: | ||
1583 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
1584 | 5 | Description: | ||
1585 | 6 | Some flaw description | ||
1586 | 7 | Ubuntu-Description: | ||
1587 | 8 | Notes: | ||
1588 | 9 | Mitigation: | ||
1589 | 10 | Bugs: | ||
1590 | 11 | Priority: medium | ||
1591 | 12 | Discovered-by: | ||
1592 | 13 | Assigned-to: | ||
1593 | 14 | CVSS: | ||
1594 | 15 | |||
1595 | 16 | Patches_openssl: | ||
1596 | 17 | upstream_openssl: needs-triage | ||
1597 | 18 | trusty_openssl: ignored (end of standard support) | ||
1598 | 19 | trusty/esm_openssl: needs-triage | ||
1599 | 20 | xenial_openssl: ignored (end of standard support) | ||
1600 | 21 | esm-infra/xenial_openssl: needs-triage | ||
1601 | 22 | fips-updates/xenial_openssl: needs-triage | ||
1602 | 23 | fips/xenial_openssl: needs-triage | ||
1603 | 24 | bionic_openssl: ignored (end of standard support) | ||
1604 | 25 | esm-infra/bionic_openssl: needs-triage | ||
1605 | 26 | fips-updates/bionic_openssl: needs-triage | ||
1606 | 27 | fips/bionic_openssl: needs-triage | ||
1607 | 28 | focal_openssl: needs-triage | ||
1608 | 29 | fips-updates/focal_openssl: needs-triage | ||
1609 | 30 | fips/focal_openssl: needs-triage | ||
1610 | 31 | jammy_openssl: needs-triage | ||
1611 | 32 | devel_openssl: needs-triage | ||
1612 | 33 | |||
1613 | 34 | Patches_openssl1.0: | ||
1614 | 35 | upstream_openssl1.0: needs-triage | ||
1615 | 36 | trusty_openssl1.0: DNE | ||
1616 | 37 | xenial_openssl1.0: DNE | ||
1617 | 38 | bionic_openssl1.0: ignored (end of standard support) | ||
1618 | 39 | esm-infra/bionic_openssl1.0: needs-triage | ||
1619 | 40 | focal_openssl1.0: DNE | ||
1620 | 41 | jammy_openssl1.0: DNE | ||
1621 | 42 | mantic_openssl1.0: DNE | ||
1622 | 43 | devel_openssl1.0: DNE | ||
1623 | 44 | |||
1624 | 45 | Patches_nodejs: | ||
1625 | 46 | upstream_nodejs: needs-triage | ||
1626 | 47 | trusty_nodejs: ignored (end of standard support) | ||
1627 | 48 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
1628 | 49 | xenial_nodejs: not-affected (uses system openssl) | ||
1629 | 50 | esm-apps/xenial_nodejs: needs-triage | ||
1630 | 51 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
1631 | 52 | esm-apps/bionic_nodejs: needs-triage | ||
1632 | 53 | focal_nodejs: not-affected (uses system openssl) | ||
1633 | 54 | esm-apps/focal_nodejs: needs-triage | ||
1634 | 55 | jammy_nodejs: needed | ||
1635 | 56 | esm-apps/jammy_nodejs: needs-triage | ||
1636 | 57 | mantic_nodejs: not-affected (uses system openssl) | ||
1637 | 58 | devel_nodejs: not-affected (uses system openssl) | ||
1638 | 59 | |||
1639 | 60 | Patches_edk2: | ||
1640 | 61 | upstream_edk2: needs-triage | ||
1641 | 62 | trusty_edk2: ignored (end of standard support) | ||
1642 | 63 | xenial_edk2: ignored (end of standard support) | ||
1643 | 64 | esm-apps/xenial_edk2: needs-triage | ||
1644 | 65 | bionic_edk2: ignored (end of standard support) | ||
1645 | 66 | esm-apps/bionic_edk2: needs-triage | ||
1646 | 67 | focal_edk2: needs-triage | ||
1647 | 68 | jammy_edk2: needs-triage | ||
1648 | 69 | mantic_edk2: needs-triage | ||
1649 | 70 | devel_edk2: needs-triage | ||
1650 | diff --git a/scripts/testfiles/cve_lib_test_5.result b/scripts/testfiles/cve_lib_test_5.result | |||
1651 | 0 | new file mode 100644 | 71 | new file mode 100644 |
1652 | index 0000000..0464b30 | |||
1653 | --- /dev/null | |||
1654 | +++ b/scripts/testfiles/cve_lib_test_5.result | |||
1655 | @@ -0,0 +1,71 @@ | |||
1656 | 1 | Candidate: CVE-2024-TEST | ||
1657 | 2 | PublicDate: 2024-02-16 | ||
1658 | 3 | References: | ||
1659 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
1660 | 5 | Description: | ||
1661 | 6 | Some flaw description | ||
1662 | 7 | Ubuntu-Description: | ||
1663 | 8 | Notes: | ||
1664 | 9 | Mitigation: | ||
1665 | 10 | Bugs: | ||
1666 | 11 | Priority: medium | ||
1667 | 12 | Discovered-by: | ||
1668 | 13 | Assigned-to: | ||
1669 | 14 | CVSS: | ||
1670 | 15 | |||
1671 | 16 | Patches_openssl: | ||
1672 | 17 | upstream_openssl: needs-triage | ||
1673 | 18 | trusty_openssl: ignored (end of standard support) | ||
1674 | 19 | trusty/esm_openssl: needs-triage | ||
1675 | 20 | xenial_openssl: ignored (end of standard support) | ||
1676 | 21 | esm-infra/xenial_openssl: needs-triage | ||
1677 | 22 | fips-updates/xenial_openssl: needs-triage | ||
1678 | 23 | fips/xenial_openssl: needs-triage | ||
1679 | 24 | bionic_openssl: ignored (end of standard support) | ||
1680 | 25 | esm-infra/bionic_openssl: needs-triage | ||
1681 | 26 | fips-updates/bionic_openssl: needs-triage | ||
1682 | 27 | fips/bionic_openssl: needs-triage | ||
1683 | 28 | focal_openssl: needs-triage | ||
1684 | 29 | fips-updates/focal_openssl: needs-triage | ||
1685 | 30 | fips/focal_openssl: needs-triage | ||
1686 | 31 | jammy_openssl: needs-triage | ||
1687 | 32 | mantic_openssl: not-affected (code not present) | ||
1688 | 33 | devel_openssl: needs-triage | ||
1689 | 34 | |||
1690 | 35 | Patches_openssl1.0: | ||
1691 | 36 | upstream_openssl1.0: needs-triage | ||
1692 | 37 | trusty_openssl1.0: DNE | ||
1693 | 38 | xenial_openssl1.0: DNE | ||
1694 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
1695 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
1696 | 41 | focal_openssl1.0: DNE | ||
1697 | 42 | jammy_openssl1.0: DNE | ||
1698 | 43 | mantic_openssl1.0: DNE | ||
1699 | 44 | devel_openssl1.0: DNE | ||
1700 | 45 | |||
1701 | 46 | Patches_nodejs: | ||
1702 | 47 | upstream_nodejs: needs-triage | ||
1703 | 48 | trusty_nodejs: ignored (end of standard support) | ||
1704 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
1705 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
1706 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
1707 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
1708 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
1709 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
1710 | 55 | esm-apps/focal_nodejs: needs-triage | ||
1711 | 56 | jammy_nodejs: needed | ||
1712 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
1713 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
1714 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
1715 | 60 | |||
1716 | 61 | Patches_edk2: | ||
1717 | 62 | upstream_edk2: needs-triage | ||
1718 | 63 | trusty_edk2: ignored (end of standard support) | ||
1719 | 64 | xenial_edk2: ignored (end of standard support) | ||
1720 | 65 | esm-apps/xenial_edk2: needs-triage | ||
1721 | 66 | bionic_edk2: ignored (end of standard support) | ||
1722 | 67 | esm-apps/bionic_edk2: needs-triage | ||
1723 | 68 | focal_edk2: needs-triage | ||
1724 | 69 | jammy_edk2: needs-triage | ||
1725 | 70 | mantic_edk2: needs-triage | ||
1726 | 71 | devel_edk2: needs-triage | ||
1727 | diff --git a/scripts/testfiles/cve_lib_test_6.in b/scripts/testfiles/cve_lib_test_6.in | |||
1728 | 0 | new file mode 100644 | 72 | new file mode 100644 |
1729 | index 0000000..aa830d9 | |||
1730 | --- /dev/null | |||
1731 | +++ b/scripts/testfiles/cve_lib_test_6.in | |||
1732 | @@ -0,0 +1,70 @@ | |||
1733 | 1 | Candidate: CVE-2024-TEST | ||
1734 | 2 | PublicDate: 2024-02-16 | ||
1735 | 3 | References: | ||
1736 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
1737 | 5 | Description: | ||
1738 | 6 | Some flaw description | ||
1739 | 7 | Ubuntu-Description: | ||
1740 | 8 | Notes: | ||
1741 | 9 | Mitigation: | ||
1742 | 10 | Bugs: | ||
1743 | 11 | Priority: medium | ||
1744 | 12 | Discovered-by: | ||
1745 | 13 | Assigned-to: | ||
1746 | 14 | CVSS: | ||
1747 | 15 | |||
1748 | 16 | Patches_openssl: | ||
1749 | 17 | upstream_openssl: needs-triage | ||
1750 | 18 | trusty_openssl: ignored (end of standard support) | ||
1751 | 19 | trusty/esm_openssl: needs-triage | ||
1752 | 20 | xenial_openssl: ignored (end of standard support) | ||
1753 | 21 | esm-infra/xenial_openssl: needs-triage | ||
1754 | 22 | fips-updates/xenial_openssl: needs-triage | ||
1755 | 23 | fips/xenial_openssl: needs-triage | ||
1756 | 24 | bionic_openssl: ignored (end of standard support) | ||
1757 | 25 | esm-infra/bionic_openssl: needs-triage | ||
1758 | 26 | fips-updates/bionic_openssl: needs-triage | ||
1759 | 27 | fips/bionic_openssl: needs-triage | ||
1760 | 28 | focal_openssl: needs-triage | ||
1761 | 29 | fips-updates/focal_openssl: needs-triage | ||
1762 | 30 | fips/focal_openssl: needs-triage | ||
1763 | 31 | jammy_openssl: needs-triage | ||
1764 | 32 | devel_openssl: needs-triage | ||
1765 | 33 | |||
1766 | 34 | Patches_openssl1.0: | ||
1767 | 35 | upstream_openssl1.0: needs-triage | ||
1768 | 36 | trusty_openssl1.0: DNE | ||
1769 | 37 | xenial_openssl1.0: DNE | ||
1770 | 38 | bionic_openssl1.0: ignored (end of standard support) | ||
1771 | 39 | esm-infra/bionic_openssl1.0: needs-triage | ||
1772 | 40 | focal_openssl1.0: DNE | ||
1773 | 41 | jammy_openssl1.0: DNE | ||
1774 | 42 | mantic_openssl1.0: DNE | ||
1775 | 43 | devel_openssl1.0: DNE | ||
1776 | 44 | |||
1777 | 45 | Patches_nodejs: | ||
1778 | 46 | upstream_nodejs: needs-triage | ||
1779 | 47 | trusty_nodejs: ignored (end of standard support) | ||
1780 | 48 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
1781 | 49 | xenial_nodejs: not-affected (uses system openssl) | ||
1782 | 50 | esm-apps/xenial_nodejs: needs-triage | ||
1783 | 51 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
1784 | 52 | esm-apps/bionic_nodejs: needs-triage | ||
1785 | 53 | focal_nodejs: not-affected (uses system openssl) | ||
1786 | 54 | esm-apps/focal_nodejs: needs-triage | ||
1787 | 55 | jammy_nodejs: needed | ||
1788 | 56 | esm-apps/jammy_nodejs: needs-triage | ||
1789 | 57 | mantic_nodejs: not-affected (uses system openssl) | ||
1790 | 58 | devel_nodejs: not-affected (uses system openssl) | ||
1791 | 59 | |||
1792 | 60 | Patches_edk2: | ||
1793 | 61 | upstream_edk2: needs-triage | ||
1794 | 62 | trusty_edk2: ignored (end of standard support) | ||
1795 | 63 | xenial_edk2: ignored (end of standard support) | ||
1796 | 64 | esm-apps/xenial_edk2: needs-triage | ||
1797 | 65 | bionic_edk2: ignored (end of standard support) | ||
1798 | 66 | esm-apps/bionic_edk2: needs-triage | ||
1799 | 67 | focal_edk2: needs-triage | ||
1800 | 68 | jammy_edk2: needs-triage | ||
1801 | 69 | mantic_edk2: needs-triage | ||
1802 | 70 | devel_edk2: needs-triage | ||
1803 | diff --git a/scripts/testfiles/cve_lib_test_6.result b/scripts/testfiles/cve_lib_test_6.result | |||
1804 | 0 | new file mode 100644 | 71 | new file mode 100644 |
1805 | index 0000000..2dad463 | |||
1806 | --- /dev/null | |||
1807 | +++ b/scripts/testfiles/cve_lib_test_6.result | |||
1808 | @@ -0,0 +1,71 @@ | |||
1809 | 1 | Candidate: CVE-2024-TEST | ||
1810 | 2 | PublicDate: 2024-02-16 | ||
1811 | 3 | References: | ||
1812 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
1813 | 5 | Description: | ||
1814 | 6 | Some flaw description | ||
1815 | 7 | Ubuntu-Description: | ||
1816 | 8 | Notes: | ||
1817 | 9 | Mitigation: | ||
1818 | 10 | Bugs: | ||
1819 | 11 | Priority: medium | ||
1820 | 12 | Discovered-by: | ||
1821 | 13 | Assigned-to: | ||
1822 | 14 | CVSS: | ||
1823 | 15 | |||
1824 | 16 | Patches_openssl: | ||
1825 | 17 | upstream_openssl: needs-triage | ||
1826 | 18 | trusty_openssl: ignored (end of standard support) | ||
1827 | 19 | trusty/esm_openssl: needs-triage | ||
1828 | 20 | xenial_openssl: ignored (end of standard support) | ||
1829 | 21 | esm-infra/xenial_openssl: needs-triage | ||
1830 | 22 | fips-updates/xenial_openssl: needs-triage | ||
1831 | 23 | fips/xenial_openssl: needs-triage | ||
1832 | 24 | bionic_openssl: ignored (end of standard support) | ||
1833 | 25 | esm-infra/bionic_openssl: needs-triage | ||
1834 | 26 | fips-updates/bionic_openssl: needs-triage | ||
1835 | 27 | fips/bionic_openssl: needs-triage | ||
1836 | 28 | focal_openssl: needs-triage | ||
1837 | 29 | fips-updates/focal_openssl: needs-triage | ||
1838 | 30 | fips/focal_openssl: needs-triage | ||
1839 | 31 | jammy_openssl: needs-triage | ||
1840 | 32 | mantic_openssl: needs-triage | ||
1841 | 33 | devel_openssl: needs-triage | ||
1842 | 34 | |||
1843 | 35 | Patches_openssl1.0: | ||
1844 | 36 | upstream_openssl1.0: needs-triage | ||
1845 | 37 | trusty_openssl1.0: DNE | ||
1846 | 38 | xenial_openssl1.0: DNE | ||
1847 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
1848 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
1849 | 41 | focal_openssl1.0: DNE | ||
1850 | 42 | jammy_openssl1.0: DNE | ||
1851 | 43 | mantic_openssl1.0: DNE | ||
1852 | 44 | devel_openssl1.0: DNE | ||
1853 | 45 | |||
1854 | 46 | Patches_nodejs: | ||
1855 | 47 | upstream_nodejs: needs-triage | ||
1856 | 48 | trusty_nodejs: ignored (end of standard support) | ||
1857 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
1858 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
1859 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
1860 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
1861 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
1862 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
1863 | 55 | esm-apps/focal_nodejs: needs-triage | ||
1864 | 56 | jammy_nodejs: needed | ||
1865 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
1866 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
1867 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
1868 | 60 | |||
1869 | 61 | Patches_edk2: | ||
1870 | 62 | upstream_edk2: needs-triage | ||
1871 | 63 | trusty_edk2: ignored (end of standard support) | ||
1872 | 64 | xenial_edk2: ignored (end of standard support) | ||
1873 | 65 | esm-apps/xenial_edk2: needs-triage | ||
1874 | 66 | bionic_edk2: ignored (end of standard support) | ||
1875 | 67 | esm-apps/bionic_edk2: needs-triage | ||
1876 | 68 | focal_edk2: needs-triage | ||
1877 | 69 | jammy_edk2: needs-triage | ||
1878 | 70 | mantic_edk2: needs-triage | ||
1879 | 71 | devel_edk2: needs-triage | ||
1880 | diff --git a/scripts/testfiles/cve_lib_test_7.in b/scripts/testfiles/cve_lib_test_7.in | |||
1881 | 0 | new file mode 100644 | 72 | new file mode 100644 |
1882 | index 0000000..2dad463 | |||
1883 | --- /dev/null | |||
1884 | +++ b/scripts/testfiles/cve_lib_test_7.in | |||
1885 | @@ -0,0 +1,71 @@ | |||
1886 | 1 | Candidate: CVE-2024-TEST | ||
1887 | 2 | PublicDate: 2024-02-16 | ||
1888 | 3 | References: | ||
1889 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
1890 | 5 | Description: | ||
1891 | 6 | Some flaw description | ||
1892 | 7 | Ubuntu-Description: | ||
1893 | 8 | Notes: | ||
1894 | 9 | Mitigation: | ||
1895 | 10 | Bugs: | ||
1896 | 11 | Priority: medium | ||
1897 | 12 | Discovered-by: | ||
1898 | 13 | Assigned-to: | ||
1899 | 14 | CVSS: | ||
1900 | 15 | |||
1901 | 16 | Patches_openssl: | ||
1902 | 17 | upstream_openssl: needs-triage | ||
1903 | 18 | trusty_openssl: ignored (end of standard support) | ||
1904 | 19 | trusty/esm_openssl: needs-triage | ||
1905 | 20 | xenial_openssl: ignored (end of standard support) | ||
1906 | 21 | esm-infra/xenial_openssl: needs-triage | ||
1907 | 22 | fips-updates/xenial_openssl: needs-triage | ||
1908 | 23 | fips/xenial_openssl: needs-triage | ||
1909 | 24 | bionic_openssl: ignored (end of standard support) | ||
1910 | 25 | esm-infra/bionic_openssl: needs-triage | ||
1911 | 26 | fips-updates/bionic_openssl: needs-triage | ||
1912 | 27 | fips/bionic_openssl: needs-triage | ||
1913 | 28 | focal_openssl: needs-triage | ||
1914 | 29 | fips-updates/focal_openssl: needs-triage | ||
1915 | 30 | fips/focal_openssl: needs-triage | ||
1916 | 31 | jammy_openssl: needs-triage | ||
1917 | 32 | mantic_openssl: needs-triage | ||
1918 | 33 | devel_openssl: needs-triage | ||
1919 | 34 | |||
1920 | 35 | Patches_openssl1.0: | ||
1921 | 36 | upstream_openssl1.0: needs-triage | ||
1922 | 37 | trusty_openssl1.0: DNE | ||
1923 | 38 | xenial_openssl1.0: DNE | ||
1924 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
1925 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
1926 | 41 | focal_openssl1.0: DNE | ||
1927 | 42 | jammy_openssl1.0: DNE | ||
1928 | 43 | mantic_openssl1.0: DNE | ||
1929 | 44 | devel_openssl1.0: DNE | ||
1930 | 45 | |||
1931 | 46 | Patches_nodejs: | ||
1932 | 47 | upstream_nodejs: needs-triage | ||
1933 | 48 | trusty_nodejs: ignored (end of standard support) | ||
1934 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
1935 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
1936 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
1937 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
1938 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
1939 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
1940 | 55 | esm-apps/focal_nodejs: needs-triage | ||
1941 | 56 | jammy_nodejs: needed | ||
1942 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
1943 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
1944 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
1945 | 60 | |||
1946 | 61 | Patches_edk2: | ||
1947 | 62 | upstream_edk2: needs-triage | ||
1948 | 63 | trusty_edk2: ignored (end of standard support) | ||
1949 | 64 | xenial_edk2: ignored (end of standard support) | ||
1950 | 65 | esm-apps/xenial_edk2: needs-triage | ||
1951 | 66 | bionic_edk2: ignored (end of standard support) | ||
1952 | 67 | esm-apps/bionic_edk2: needs-triage | ||
1953 | 68 | focal_edk2: needs-triage | ||
1954 | 69 | jammy_edk2: needs-triage | ||
1955 | 70 | mantic_edk2: needs-triage | ||
1956 | 71 | devel_edk2: needs-triage | ||
1957 | diff --git a/scripts/testfiles/cve_lib_test_7.result b/scripts/testfiles/cve_lib_test_7.result | |||
1958 | 0 | new file mode 100644 | 72 | new file mode 100644 |
1959 | index 0000000..d101117 | |||
1960 | --- /dev/null | |||
1961 | +++ b/scripts/testfiles/cve_lib_test_7.result | |||
1962 | @@ -0,0 +1,71 @@ | |||
1963 | 1 | Candidate: CVE-2024-TEST | ||
1964 | 2 | PublicDate: 2024-02-16 | ||
1965 | 3 | References: | ||
1966 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
1967 | 5 | Description: | ||
1968 | 6 | Some flaw description | ||
1969 | 7 | Ubuntu-Description: | ||
1970 | 8 | Notes: | ||
1971 | 9 | Mitigation: | ||
1972 | 10 | Bugs: | ||
1973 | 11 | Priority: medium | ||
1974 | 12 | Discovered-by: | ||
1975 | 13 | Assigned-to: | ||
1976 | 14 | CVSS: | ||
1977 | 15 | |||
1978 | 16 | Patches_openssl: | ||
1979 | 17 | upstream_openssl: needs-triage | ||
1980 | 18 | trusty_openssl: ignored (end of standard support) | ||
1981 | 19 | trusty/esm_openssl: needs-triage | ||
1982 | 20 | xenial_openssl: ignored (end of standard support) | ||
1983 | 21 | esm-infra/xenial_openssl: needs-triage | ||
1984 | 22 | fips-updates/xenial_openssl: needs-triage | ||
1985 | 23 | fips/xenial_openssl: needs-triage | ||
1986 | 24 | bionic_openssl: ignored (end of standard support) | ||
1987 | 25 | esm-infra/bionic_openssl: needs-triage | ||
1988 | 26 | fips-updates/bionic_openssl: needs-triage | ||
1989 | 27 | fips/bionic_openssl: needs-triage | ||
1990 | 28 | focal_openssl: needs-triage | ||
1991 | 29 | fips-updates/focal_openssl: needs-triage | ||
1992 | 30 | fips/focal_openssl: needs-triage | ||
1993 | 31 | jammy_openssl: needs-triage | ||
1994 | 32 | mantic_openssl: not-affected | ||
1995 | 33 | devel_openssl: needs-triage | ||
1996 | 34 | |||
1997 | 35 | Patches_openssl1.0: | ||
1998 | 36 | upstream_openssl1.0: needs-triage | ||
1999 | 37 | trusty_openssl1.0: DNE | ||
2000 | 38 | xenial_openssl1.0: DNE | ||
2001 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
2002 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
2003 | 41 | focal_openssl1.0: DNE | ||
2004 | 42 | jammy_openssl1.0: DNE | ||
2005 | 43 | mantic_openssl1.0: DNE | ||
2006 | 44 | devel_openssl1.0: DNE | ||
2007 | 45 | |||
2008 | 46 | Patches_nodejs: | ||
2009 | 47 | upstream_nodejs: needs-triage | ||
2010 | 48 | trusty_nodejs: ignored (end of standard support) | ||
2011 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
2012 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
2013 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
2014 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
2015 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
2016 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
2017 | 55 | esm-apps/focal_nodejs: needs-triage | ||
2018 | 56 | jammy_nodejs: needed | ||
2019 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
2020 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
2021 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
2022 | 60 | |||
2023 | 61 | Patches_edk2: | ||
2024 | 62 | upstream_edk2: needs-triage | ||
2025 | 63 | trusty_edk2: ignored (end of standard support) | ||
2026 | 64 | xenial_edk2: ignored (end of standard support) | ||
2027 | 65 | esm-apps/xenial_edk2: needs-triage | ||
2028 | 66 | bionic_edk2: ignored (end of standard support) | ||
2029 | 67 | esm-apps/bionic_edk2: needs-triage | ||
2030 | 68 | focal_edk2: needs-triage | ||
2031 | 69 | jammy_edk2: needs-triage | ||
2032 | 70 | mantic_edk2: needs-triage | ||
2033 | 71 | devel_edk2: needs-triage | ||
2034 | diff --git a/scripts/testfiles/cve_lib_test_8.in b/scripts/testfiles/cve_lib_test_8.in | |||
2035 | 0 | new file mode 100644 | 72 | new file mode 100644 |
2036 | index 0000000..2dad463 | |||
2037 | --- /dev/null | |||
2038 | +++ b/scripts/testfiles/cve_lib_test_8.in | |||
2039 | @@ -0,0 +1,71 @@ | |||
2040 | 1 | Candidate: CVE-2024-TEST | ||
2041 | 2 | PublicDate: 2024-02-16 | ||
2042 | 3 | References: | ||
2043 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
2044 | 5 | Description: | ||
2045 | 6 | Some flaw description | ||
2046 | 7 | Ubuntu-Description: | ||
2047 | 8 | Notes: | ||
2048 | 9 | Mitigation: | ||
2049 | 10 | Bugs: | ||
2050 | 11 | Priority: medium | ||
2051 | 12 | Discovered-by: | ||
2052 | 13 | Assigned-to: | ||
2053 | 14 | CVSS: | ||
2054 | 15 | |||
2055 | 16 | Patches_openssl: | ||
2056 | 17 | upstream_openssl: needs-triage | ||
2057 | 18 | trusty_openssl: ignored (end of standard support) | ||
2058 | 19 | trusty/esm_openssl: needs-triage | ||
2059 | 20 | xenial_openssl: ignored (end of standard support) | ||
2060 | 21 | esm-infra/xenial_openssl: needs-triage | ||
2061 | 22 | fips-updates/xenial_openssl: needs-triage | ||
2062 | 23 | fips/xenial_openssl: needs-triage | ||
2063 | 24 | bionic_openssl: ignored (end of standard support) | ||
2064 | 25 | esm-infra/bionic_openssl: needs-triage | ||
2065 | 26 | fips-updates/bionic_openssl: needs-triage | ||
2066 | 27 | fips/bionic_openssl: needs-triage | ||
2067 | 28 | focal_openssl: needs-triage | ||
2068 | 29 | fips-updates/focal_openssl: needs-triage | ||
2069 | 30 | fips/focal_openssl: needs-triage | ||
2070 | 31 | jammy_openssl: needs-triage | ||
2071 | 32 | mantic_openssl: needs-triage | ||
2072 | 33 | devel_openssl: needs-triage | ||
2073 | 34 | |||
2074 | 35 | Patches_openssl1.0: | ||
2075 | 36 | upstream_openssl1.0: needs-triage | ||
2076 | 37 | trusty_openssl1.0: DNE | ||
2077 | 38 | xenial_openssl1.0: DNE | ||
2078 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
2079 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
2080 | 41 | focal_openssl1.0: DNE | ||
2081 | 42 | jammy_openssl1.0: DNE | ||
2082 | 43 | mantic_openssl1.0: DNE | ||
2083 | 44 | devel_openssl1.0: DNE | ||
2084 | 45 | |||
2085 | 46 | Patches_nodejs: | ||
2086 | 47 | upstream_nodejs: needs-triage | ||
2087 | 48 | trusty_nodejs: ignored (end of standard support) | ||
2088 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
2089 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
2090 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
2091 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
2092 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
2093 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
2094 | 55 | esm-apps/focal_nodejs: needs-triage | ||
2095 | 56 | jammy_nodejs: needed | ||
2096 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
2097 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
2098 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
2099 | 60 | |||
2100 | 61 | Patches_edk2: | ||
2101 | 62 | upstream_edk2: needs-triage | ||
2102 | 63 | trusty_edk2: ignored (end of standard support) | ||
2103 | 64 | xenial_edk2: ignored (end of standard support) | ||
2104 | 65 | esm-apps/xenial_edk2: needs-triage | ||
2105 | 66 | bionic_edk2: ignored (end of standard support) | ||
2106 | 67 | esm-apps/bionic_edk2: needs-triage | ||
2107 | 68 | focal_edk2: needs-triage | ||
2108 | 69 | jammy_edk2: needs-triage | ||
2109 | 70 | mantic_edk2: needs-triage | ||
2110 | 71 | devel_edk2: needs-triage | ||
2111 | diff --git a/scripts/testfiles/cve_lib_test_8.result b/scripts/testfiles/cve_lib_test_8.result | |||
2112 | 0 | new file mode 100644 | 72 | new file mode 100644 |
2113 | index 0000000..0464b30 | |||
2114 | --- /dev/null | |||
2115 | +++ b/scripts/testfiles/cve_lib_test_8.result | |||
2116 | @@ -0,0 +1,71 @@ | |||
2117 | 1 | Candidate: CVE-2024-TEST | ||
2118 | 2 | PublicDate: 2024-02-16 | ||
2119 | 3 | References: | ||
2120 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
2121 | 5 | Description: | ||
2122 | 6 | Some flaw description | ||
2123 | 7 | Ubuntu-Description: | ||
2124 | 8 | Notes: | ||
2125 | 9 | Mitigation: | ||
2126 | 10 | Bugs: | ||
2127 | 11 | Priority: medium | ||
2128 | 12 | Discovered-by: | ||
2129 | 13 | Assigned-to: | ||
2130 | 14 | CVSS: | ||
2131 | 15 | |||
2132 | 16 | Patches_openssl: | ||
2133 | 17 | upstream_openssl: needs-triage | ||
2134 | 18 | trusty_openssl: ignored (end of standard support) | ||
2135 | 19 | trusty/esm_openssl: needs-triage | ||
2136 | 20 | xenial_openssl: ignored (end of standard support) | ||
2137 | 21 | esm-infra/xenial_openssl: needs-triage | ||
2138 | 22 | fips-updates/xenial_openssl: needs-triage | ||
2139 | 23 | fips/xenial_openssl: needs-triage | ||
2140 | 24 | bionic_openssl: ignored (end of standard support) | ||
2141 | 25 | esm-infra/bionic_openssl: needs-triage | ||
2142 | 26 | fips-updates/bionic_openssl: needs-triage | ||
2143 | 27 | fips/bionic_openssl: needs-triage | ||
2144 | 28 | focal_openssl: needs-triage | ||
2145 | 29 | fips-updates/focal_openssl: needs-triage | ||
2146 | 30 | fips/focal_openssl: needs-triage | ||
2147 | 31 | jammy_openssl: needs-triage | ||
2148 | 32 | mantic_openssl: not-affected (code not present) | ||
2149 | 33 | devel_openssl: needs-triage | ||
2150 | 34 | |||
2151 | 35 | Patches_openssl1.0: | ||
2152 | 36 | upstream_openssl1.0: needs-triage | ||
2153 | 37 | trusty_openssl1.0: DNE | ||
2154 | 38 | xenial_openssl1.0: DNE | ||
2155 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
2156 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
2157 | 41 | focal_openssl1.0: DNE | ||
2158 | 42 | jammy_openssl1.0: DNE | ||
2159 | 43 | mantic_openssl1.0: DNE | ||
2160 | 44 | devel_openssl1.0: DNE | ||
2161 | 45 | |||
2162 | 46 | Patches_nodejs: | ||
2163 | 47 | upstream_nodejs: needs-triage | ||
2164 | 48 | trusty_nodejs: ignored (end of standard support) | ||
2165 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
2166 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
2167 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
2168 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
2169 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
2170 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
2171 | 55 | esm-apps/focal_nodejs: needs-triage | ||
2172 | 56 | jammy_nodejs: needed | ||
2173 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
2174 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
2175 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
2176 | 60 | |||
2177 | 61 | Patches_edk2: | ||
2178 | 62 | upstream_edk2: needs-triage | ||
2179 | 63 | trusty_edk2: ignored (end of standard support) | ||
2180 | 64 | xenial_edk2: ignored (end of standard support) | ||
2181 | 65 | esm-apps/xenial_edk2: needs-triage | ||
2182 | 66 | bionic_edk2: ignored (end of standard support) | ||
2183 | 67 | esm-apps/bionic_edk2: needs-triage | ||
2184 | 68 | focal_edk2: needs-triage | ||
2185 | 69 | jammy_edk2: needs-triage | ||
2186 | 70 | mantic_edk2: needs-triage | ||
2187 | 71 | devel_edk2: needs-triage | ||
2188 | diff --git a/scripts/testfiles/cve_lib_test_9.in b/scripts/testfiles/cve_lib_test_9.in | |||
2189 | 0 | new file mode 100644 | 72 | new file mode 100644 |
2190 | index 0000000..babe94b | |||
2191 | --- /dev/null | |||
2192 | +++ b/scripts/testfiles/cve_lib_test_9.in | |||
2193 | @@ -0,0 +1,70 @@ | |||
2194 | 1 | Candidate: CVE-2024-TEST | ||
2195 | 2 | PublicDate: 2024-02-16 | ||
2196 | 3 | References: | ||
2197 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
2198 | 5 | Description: | ||
2199 | 6 | Some flaw description | ||
2200 | 7 | Ubuntu-Description: | ||
2201 | 8 | Notes: | ||
2202 | 9 | Mitigation: | ||
2203 | 10 | Bugs: | ||
2204 | 11 | Priority: medium | ||
2205 | 12 | Discovered-by: | ||
2206 | 13 | Assigned-to: | ||
2207 | 14 | CVSS: | ||
2208 | 15 | |||
2209 | 16 | Patches_openssl: | ||
2210 | 17 | upstream_openssl: needs-triage | ||
2211 | 18 | trusty_openssl: ignored (end of standard support) | ||
2212 | 19 | trusty/esm_openssl: needs-triage | ||
2213 | 20 | xenial_openssl: ignored (end of standard support) | ||
2214 | 21 | esm-infra/xenial_openssl: needs-triage | ||
2215 | 22 | fips-updates/xenial_openssl: needs-triage | ||
2216 | 23 | fips/xenial_openssl: needs-triage | ||
2217 | 24 | bionic_openssl: ignored (end of standard support) | ||
2218 | 25 | esm-infra/bionic_openssl: needs-triage | ||
2219 | 26 | fips-updates/bionic_openssl: needs-triage | ||
2220 | 27 | fips/bionic_openssl: needs-triage | ||
2221 | 28 | focal_openssl: needs-triage | ||
2222 | 29 | fips-updates/focal_openssl: needs-triage | ||
2223 | 30 | fips/focal_openssl: needs-triage | ||
2224 | 31 | mantic_openssl: released (1.1.2-1ubuntu6) | ||
2225 | 32 | devel_openssl: needs-triage | ||
2226 | 33 | |||
2227 | 34 | Patches_openssl1.0: | ||
2228 | 35 | upstream_openssl1.0: needs-triage | ||
2229 | 36 | trusty_openssl1.0: DNE | ||
2230 | 37 | xenial_openssl1.0: DNE | ||
2231 | 38 | bionic_openssl1.0: ignored (end of standard support) | ||
2232 | 39 | esm-infra/bionic_openssl1.0: needs-triage | ||
2233 | 40 | focal_openssl1.0: DNE | ||
2234 | 41 | jammy_openssl1.0: DNE | ||
2235 | 42 | mantic_openssl1.0: DNE | ||
2236 | 43 | devel_openssl1.0: DNE | ||
2237 | 44 | |||
2238 | 45 | Patches_nodejs: | ||
2239 | 46 | upstream_nodejs: needs-triage | ||
2240 | 47 | trusty_nodejs: ignored (end of standard support) | ||
2241 | 48 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
2242 | 49 | xenial_nodejs: not-affected (uses system openssl) | ||
2243 | 50 | esm-apps/xenial_nodejs: needs-triage | ||
2244 | 51 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
2245 | 52 | esm-apps/bionic_nodejs: needs-triage | ||
2246 | 53 | focal_nodejs: not-affected (uses system openssl) | ||
2247 | 54 | esm-apps/focal_nodejs: needs-triage | ||
2248 | 55 | jammy_nodejs: needed | ||
2249 | 56 | esm-apps/jammy_nodejs: needs-triage | ||
2250 | 57 | mantic_nodejs: not-affected (uses system openssl) | ||
2251 | 58 | devel_nodejs: not-affected (uses system openssl) | ||
2252 | 59 | |||
2253 | 60 | Patches_edk2: | ||
2254 | 61 | upstream_edk2: needs-triage | ||
2255 | 62 | trusty_edk2: ignored (end of standard support) | ||
2256 | 63 | xenial_edk2: ignored (end of standard support) | ||
2257 | 64 | esm-apps/xenial_edk2: needs-triage | ||
2258 | 65 | bionic_edk2: ignored (end of standard support) | ||
2259 | 66 | esm-apps/bionic_edk2: needs-triage | ||
2260 | 67 | focal_edk2: needs-triage | ||
2261 | 68 | jammy_edk2: needs-triage | ||
2262 | 69 | mantic_edk2: needs-triage | ||
2263 | 70 | devel_edk2: needs-triage | ||
2264 | diff --git a/scripts/testfiles/cve_lib_test_9.result b/scripts/testfiles/cve_lib_test_9.result | |||
2265 | 0 | new file mode 100644 | 71 | new file mode 100644 |
2266 | index 0000000..ee6f455 | |||
2267 | --- /dev/null | |||
2268 | +++ b/scripts/testfiles/cve_lib_test_9.result | |||
2269 | @@ -0,0 +1,71 @@ | |||
2270 | 1 | Candidate: CVE-2024-TEST | ||
2271 | 2 | PublicDate: 2024-02-16 | ||
2272 | 3 | References: | ||
2273 | 4 | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-NNN1 | ||
2274 | 5 | Description: | ||
2275 | 6 | Some flaw description | ||
2276 | 7 | Ubuntu-Description: | ||
2277 | 8 | Notes: | ||
2278 | 9 | Mitigation: | ||
2279 | 10 | Bugs: | ||
2280 | 11 | Priority: medium | ||
2281 | 12 | Discovered-by: | ||
2282 | 13 | Assigned-to: | ||
2283 | 14 | CVSS: | ||
2284 | 15 | |||
2285 | 16 | Patches_openssl: | ||
2286 | 17 | upstream_openssl: needs-triage | ||
2287 | 18 | trusty_openssl: ignored (end of standard support) | ||
2288 | 19 | trusty/esm_openssl: needs-triage | ||
2289 | 20 | xenial_openssl: ignored (end of standard support) | ||
2290 | 21 | esm-infra/xenial_openssl: needs-triage | ||
2291 | 22 | fips-updates/xenial_openssl: needs-triage | ||
2292 | 23 | fips/xenial_openssl: needs-triage | ||
2293 | 24 | bionic_openssl: ignored (end of standard support) | ||
2294 | 25 | esm-infra/bionic_openssl: needs-triage | ||
2295 | 26 | fips-updates/bionic_openssl: needs-triage | ||
2296 | 27 | fips/bionic_openssl: needs-triage | ||
2297 | 28 | focal_openssl: needs-triage | ||
2298 | 29 | fips-updates/focal_openssl: needs-triage | ||
2299 | 30 | fips/focal_openssl: needs-triage | ||
2300 | 31 | jammy_openssl: released (1.1.2-1ubuntu6) | ||
2301 | 32 | mantic_openssl: released (1.1.2-1ubuntu6) | ||
2302 | 33 | devel_openssl: needs-triage | ||
2303 | 34 | |||
2304 | 35 | Patches_openssl1.0: | ||
2305 | 36 | upstream_openssl1.0: needs-triage | ||
2306 | 37 | trusty_openssl1.0: DNE | ||
2307 | 38 | xenial_openssl1.0: DNE | ||
2308 | 39 | bionic_openssl1.0: ignored (end of standard support) | ||
2309 | 40 | esm-infra/bionic_openssl1.0: needs-triage | ||
2310 | 41 | focal_openssl1.0: DNE | ||
2311 | 42 | jammy_openssl1.0: DNE | ||
2312 | 43 | mantic_openssl1.0: DNE | ||
2313 | 44 | devel_openssl1.0: DNE | ||
2314 | 45 | |||
2315 | 46 | Patches_nodejs: | ||
2316 | 47 | upstream_nodejs: needs-triage | ||
2317 | 48 | trusty_nodejs: ignored (end of standard support) | ||
2318 | 49 | trusty/esm_nodejs: not-affected (uses system openssl) | ||
2319 | 50 | xenial_nodejs: not-affected (uses system openssl) | ||
2320 | 51 | esm-apps/xenial_nodejs: needs-triage | ||
2321 | 52 | bionic_nodejs: not-affected (uses system openssl1.0) | ||
2322 | 53 | esm-apps/bionic_nodejs: needs-triage | ||
2323 | 54 | focal_nodejs: not-affected (uses system openssl) | ||
2324 | 55 | esm-apps/focal_nodejs: needs-triage | ||
2325 | 56 | jammy_nodejs: needed | ||
2326 | 57 | esm-apps/jammy_nodejs: needs-triage | ||
2327 | 58 | mantic_nodejs: not-affected (uses system openssl) | ||
2328 | 59 | devel_nodejs: not-affected (uses system openssl) | ||
2329 | 60 | |||
2330 | 61 | Patches_edk2: | ||
2331 | 62 | upstream_edk2: needs-triage | ||
2332 | 63 | trusty_edk2: ignored (end of standard support) | ||
2333 | 64 | xenial_edk2: ignored (end of standard support) | ||
2334 | 65 | esm-apps/xenial_edk2: needs-triage | ||
2335 | 66 | bionic_edk2: ignored (end of standard support) | ||
2336 | 67 | esm-apps/bionic_edk2: needs-triage | ||
2337 | 68 | focal_edk2: needs-triage | ||
2338 | 69 | jammy_edk2: needs-triage | ||
2339 | 70 | mantic_edk2: needs-triage | ||
2340 | 71 | devel_edk2: needs-triage |
LGTM, thanks for this.
it is of great help that the fix script can now fix all complains at once, and much faster.