1import collections 2import re 3import itertools 4import functools 5 6_Version = collections.namedtuple( 7 "_Version", ["release", "patch_l", "pre_l", "pre_v"] 8) 9 10@functools.total_ordering 11class Version(): 12 13 def __init__(self, version, suffix=None): 14 15 suffixes = ["alphabetical", "patch"] 16 17 if str(suffix) == "alphabetical": 18 version_pattern = r"""r?v?(?:(?P<release>[0-9]+(?:[-\.][0-9]+)*)(?P<patch>[-_\.]?(?P<patch_l>[a-z]))?(?P<pre>[-_\.]?(?P<pre_l>(rc|alpha|beta|pre|preview|dev))[-_\.]?(?P<pre_v>[0-9]+)?)?)(.*)?""" 19 elif str(suffix) == "patch": 20 version_pattern = r"""r?v?(?:(?P<release>[0-9]+(?:[-\.][0-9]+)*)(?P<patch>[-_\.]?(p|patch)(?P<patch_l>[0-9]+))?(?P<pre>[-_\.]?(?P<pre_l>(rc|alpha|beta|pre|preview|dev))[-_\.]?(?P<pre_v>[0-9]+)?)?)(.*)?""" 21 else: 22 version_pattern = r"""r?v?(?:(?P<release>[0-9]+(?:[-\.][0-9]+)*)(?P<pre>[-_\.]?(?P<pre_l>(rc|alpha|beta|pre|preview|dev))[-_\.]?(?P<pre_v>[0-9]+)?)?)(.*)?""" 23 regex = re.compile(r"^\s*" + version_pattern + r"\s*$", re.VERBOSE | re.IGNORECASE) 24 25 match = regex.search(version) 26 if not match: 27 raise Exception("Invalid version: '{0}'".format(version)) 28 29 self._version = _Version( 30 release=tuple(int(i) for i in match.group("release").replace("-",".").split(".")), 31 patch_l=match.group("patch_l") if str(suffix) in suffixes and match.group("patch_l") else "", 32 pre_l=match.group("pre_l"), 33 pre_v=match.group("pre_v") 34 ) 35 36 self._key = _cmpkey( 37 self._version.release, 38 self._version.patch_l, 39 self._version.pre_l, 40 self._version.pre_v 41 ) 42 43 def __eq__(self, other): 44 if not isinstance(other, Version): 45 return NotImplemented 46 return self._key == other._key 47 48 def __gt__(self, other): 49 if not isinstance(other, Version): 50 return NotImplemented 51 return self._key > other._key 52 53def _cmpkey(release, patch_l, pre_l, pre_v): 54 # remove leading 0 55 _release = tuple( 56 reversed(list(itertools.dropwhile(lambda x: x == 0, reversed(release)))) 57 ) 58 59 _patch = patch_l.upper() 60 61 if pre_l is None and pre_v is None: 62 _pre = float('inf') 63 else: 64 _pre = float(pre_v) if pre_v else float('-inf') 65 return _release, _patch, _pre 66 67 68def get_patched_cves(d): 69 """ 70 Get patches that solve CVEs using the "CVE: " tag. 71 """ 72 73 import re 74 import oe.patch 75 76 pn = d.getVar("PN") 77 cve_match = re.compile("CVE:( CVE\-\d{4}\-\d+)+") 78 79 # Matches the last "CVE-YYYY-ID" in the file name, also if written 80 # in lowercase. Possible to have multiple CVE IDs in a single 81 # file name, but only the last one will be detected from the file name. 82 # However, patch files contents addressing multiple CVE IDs are supported 83 # (cve_match regular expression) 84 85 cve_file_name_match = re.compile(".*([Cc][Vv][Ee]\-\d{4}\-\d+)") 86 87 patched_cves = set() 88 bb.debug(2, "Looking for patches that solves CVEs for %s" % pn) 89 for url in oe.patch.src_patches(d): 90 patch_file = bb.fetch.decodeurl(url)[2] 91 92 # Remote compressed patches may not be unpacked, so silently ignore them 93 if not os.path.isfile(patch_file): 94 bb.warn("%s does not exist, cannot extract CVE list" % patch_file) 95 continue 96 97 # Check patch file name for CVE ID 98 fname_match = cve_file_name_match.search(patch_file) 99 if fname_match: 100 cve = fname_match.group(1).upper() 101 patched_cves.add(cve) 102 bb.debug(2, "Found CVE %s from patch file name %s" % (cve, patch_file)) 103 104 with open(patch_file, "r", encoding="utf-8") as f: 105 try: 106 patch_text = f.read() 107 except UnicodeDecodeError: 108 bb.debug(1, "Failed to read patch %s using UTF-8 encoding" 109 " trying with iso8859-1" % patch_file) 110 f.close() 111 with open(patch_file, "r", encoding="iso8859-1") as f: 112 patch_text = f.read() 113 114 # Search for one or more "CVE: " lines 115 text_match = False 116 for match in cve_match.finditer(patch_text): 117 # Get only the CVEs without the "CVE: " tag 118 cves = patch_text[match.start()+5:match.end()] 119 for cve in cves.split(): 120 bb.debug(2, "Patch %s solves %s" % (patch_file, cve)) 121 patched_cves.add(cve) 122 text_match = True 123 124 if not fname_match and not text_match: 125 bb.debug(2, "Patch %s doesn't solve CVEs" % patch_file) 126 127 return patched_cves 128 129 130def get_cpe_ids(cve_product, version): 131 """ 132 Get list of CPE identifiers for the given product and version 133 """ 134 135 version = version.split("+git")[0] 136 137 cpe_ids = [] 138 for product in cve_product.split(): 139 # CVE_PRODUCT in recipes may include vendor information for CPE identifiers. If not, 140 # use wildcard for vendor. 141 if ":" in product: 142 vendor, product = product.split(":", 1) 143 else: 144 vendor = "*" 145 146 cpe_id = f'cpe:2.3:a:{vendor}:{product}:{version}:*:*:*:*:*:*:*' 147 cpe_ids.append(cpe_id) 148 149 return cpe_ids 150 151def cve_check_merge_jsons(output, data): 152 """ 153 Merge the data in the "package" property to the main data file 154 output 155 """ 156 if output["version"] != data["version"]: 157 bb.error("Version mismatch when merging JSON outputs") 158 return 159 160 for product in output["package"]: 161 if product["name"] == data["package"][0]["name"]: 162 bb.error("Error adding the same package twice") 163 return 164 165 output["package"].append(data["package"][0]) 166 167def update_symlinks(target_path, link_path): 168 """ 169 Update a symbolic link link_path to point to target_path. 170 Remove the link and recreate it if exist and is different. 171 """ 172 if link_path != target_path and os.path.exists(target_path): 173 if os.path.exists(os.path.realpath(link_path)): 174 os.remove(link_path) 175 os.symlink(os.path.basename(target_path), link_path) 176