Conversation
|
Thanks for your pull request! It looks like this may be your first contribution to a Google open source project. Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA). View this failed invocation of the CLA check for more information. For the most up to date status, view the checks section at the bottom of the pull request. |
Add code extractor and tests for Linux kernel signature generation. Expand git_commit class to support fetching kernel sources. Using the offline scanner and created signatures, one can scan the kernel source tree.
1c37c41 to
64a0432
Compare
|
Regarding the failing check: I requested access to our company internal Google CLA group. I will rerun the check once I got an answer regarding my request. |
In order to support osv.dev as vulnerability file source, fix urls are added from the "References" field where the vulnerability file does not offer this information in the "Affected" OSV entry.
Add flag "fail_on_missing_field" that controls behaviour when encountering malformed vulnerabilities. If set to false, the error is logged but does not abort the run. This is helpful when running the signature generator for many CVEs where we do not want to lose all progress. Other small improvements (typo, more logs, memory usage).
64a0432 to
2631611
Compare
|
Thanks. I'm taking care of some family emergency, but will take a look right when I get back. |
Is there any update on the CLA? |
First of all, I hope you and your family are doing well after that emergency! We contacted Google a while ago but didn't get an answer yet. We will reach out again, but if this is blocking you in any way I can also sign a personal CLA agreement. |
Linux kernel scanning support
Add code extractor and tests for Linux kernel signature
generation.
Expand git_commit class to support fetching kernel sources.
Using the offline scanner and created signatures, one can
scan the kernel source tree.
Support for malformed cve files
In order to support osv.dev as vulnerability file source,
fix urls are added from the "References" field where the
vulnerability file does not offer this information in the
"Affected" OSV entry.
Fail_on_missing_field flag
Add flag "fail_on_missing_field" that controls behaviour
when encountering malformed vulnerabilities.
If set to false, the error is logged but does not abort the run.
This is helpful when running the signature generator for
many cves where we do not want to loose all progress.
Other small improvements (typo, more logs, memore usage).