intel / cve-bin-tool

The CVE Binary Tool helps you determine if your system includes known vulnerabilities. You can scan binaries for over 200 common, vulnerable components (openssl, libpng, libxml2, expat and others), or if you know the components used, you can get a list of known vulnerabilities associated with an SBOM or a list of components and versions.
https://cve-bin-tool.readthedocs.io/en/latest/
GNU General Public License v3.0
1.24k stars 465 forks source link

feat: "language" parser for .deb control data #2917

Open terriko opened 1 year ago

terriko commented 1 year ago

.debs have a set of control fields which contain a bunch of information that looks awfully like the {vendor, product, version} tuplet we use for NVD lookups:

https://www.debian.org/doc/debian-policy/ch-controlfields.html

I think it should be possible to read these files similar to the way we read package lists.

For NVD lookup, we would want to intentionally build in some special cases for things like python files which are all packaged with the prefix python3- and so on rather than just assuming the name is correct, and maybe trying to do some nice parsing of the url included to see if that can be used to better guess the vendor.

The release-monitoring.org website may help you with names across distros. e.g. https://release-monitoring.org/project/3779/

Anyone working on this:

terriko commented 1 year ago

I've added the hacktoberfest link to this, so here's the cut and paste of info for new contributors:

Short tips for new contributors:

Claiming issues:

joydeep049 commented 1 year ago

Can I work on this?

terriko commented 1 year ago

@crazytrain328 feel free!