[Git][security-tracker-team/security-tracker][master] Revert "Add links to more CVE search services"

Salvatore Bonaccorso (@carnil) carnil at debian.org
Fri Jan 20 12:57:38 GMT 2023



Salvatore Bonaccorso pushed to branch master at Debian Security Tracker / security-tracker


Commits:
11d59f96 by Salvatore Bonaccorso at 2023-01-20T13:56:23+01:00
Revert "Add links to more CVE search services"

This reverts commit 09544dc04cf8e9df4f76f0848897e59a55d58e32.

Better to discuss possible additions via merge requests. In particular
cvedetails.com is not something we owuld want to link. Other might add
value to the additional sources.

- - - - -


1 changed file:

- bin/tracker_service.py


Changes:

=====================================
bin/tracker_service.py
=====================================
@@ -377,10 +377,6 @@ data source.""")],
                                       "; ",
                                       self.make_cert_bug_ref(url, bug.name, 'CERT'),
                                       ", ",
-                                      self.make_cvedetails_bug_ref(url, bug.name, 'CVE Details'),
-                                      ", ",
-                                      self.make_circl_bug_ref(url, bug.name, 'CIRCL'),
-                                      ", ",
                                       self.make_lwn_bug_ref(url, bug.name, 'LWN'),
                                       ", ",
                                       self.make_osssec_bug_ref(url, bug.name, 'oss-sec'),
@@ -392,28 +388,19 @@ data source.""")],
                                       self.make_edb_bug_ref(url, bug.name, 'EDB'),
                                       ", ",
                                       self.make_metasploit_bug_ref(url, bug.name, 'Metasploit'),
-                                      ", Red Hat ",
-                                      self.make_redhat_bug_ref(url, bug.name, 'bug'),
-                                      "/",
-                                      self.make_redhat_cve_ref(url, bug.name, 'CVE'),
-                                      ", Ubuntu ",
-                                      self.make_ubuntu_bug_ref(url, bug.name, 'bug'),
-                                      "/",
-                                      self.make_ubuntu_cve_ref(url, bug.name, 'CVE'),
+                                      ", ",
+                                      self.make_rhbug_ref(url, bug.name,
+                                                        'Red Hat'),
+                                      ", ",
+                                      self.make_ubuntu_bug_ref(url, bug.name, 'Ubuntu'),
                                       ", ",
                                       self.make_gentoo_bug_ref(url, bug.name, 'Gentoo'),
                                       ", SUSE ",
-                                      self.make_suse_bug_ref(url, bug.name, 'bug'),
+                                      self.make_suse_bug_ref(url, bug.name, 'bugzilla'),
                                       "/",
                                       self.make_suse_cve_ref(url, bug.name, 'CVE'),
                                       ", ",
                                       self.make_mageia_bug_ref(url, bug.name, 'Mageia'),
-                                      ", ",
-                                      self.make_alpine_bug_ref(url, bug.name, 'Alpine'),
-                                      ", Arch Linux ",
-                                      self.make_archlinux_bug_ref(url, bug.name, 'bug'),
-                                      "/",
-                                      self.make_archlinux_cve_ref(url, bug.name, 'CVE'),
                                       ", GitHub ",
                                       self.make_github_advisory_ref(url, bug.name, 'advisories'),
                                       "/",
@@ -1533,10 +1520,6 @@ Debian bug number.'''),
         return url.absolute("https://nvd.nist.gov/vuln/detail/%s" % name)
     def url_cert_bug(self, url, name):
         return url.absolute("https://www.kb.cert.org/vuls/byid", searchview='', query=name)
-    def url_cvedetails_bug(self, url, name):
-        return url.absolute("https://www.cvedetails.com/cve-details.php", cve_id=name)
-    def url_circl_bug(self, url, name):
-        return url.absolute("https://cve.circl.lu/cve/%s" % name)
     def url_lwn_bug(self, url, name):
         return url.absolute("https://lwn.net/Search/DoSearch", words=name)
     def url_osssec_bug(self, url, name):
@@ -1550,13 +1533,10 @@ Debian bug number.'''),
         return url.absolute("https://www.exploit-db.com/search/", action="search", cve=name)
     def url_metasploit_bug(self, url, name):
         return url.absolute("https://www.rapid7.com/db/search", q=name)
-    def url_redhat_bug(self, url, name):
-        return url.absolute("https://bugzilla.redhat.com/show_bug.cgi", id=name)
-    def url_redhat_cve(self, url, name):
-        return url.absolute("https://access.redhat.com/security/cve/%s" % name)
+    def url_rhbug(self, url, name):
+        return url.absolute("https://bugzilla.redhat.com/show_bug.cgi",
+                            id=name)
     def url_ubuntu_bug(self, url, name):
-        return url.absolute("https://launchpad.net/bugs/cve/%s" % name)
-    def url_ubuntu_cve(self, url, name):
         return url.absolute("https://people.canonical.com/~ubuntu-security/cve/%s" % name)
     def url_gentoo_bug(self, url, name):
         return url.absolute("https://bugs.gentoo.org/show_bug.cgi", id=name)
@@ -1567,12 +1547,6 @@ Debian bug number.'''),
         return url.absolute("https://www.suse.com/security/cve/%s/" % name)
     def url_mageia_bug(self, url, name):
         return url.absolute("https://advisories.mageia.org/%s.html" % name)
-    def url_alpine_bug(self, url, name):
-        return url.absolute("https://security.alpinelinux.org/vuln/%s" % name)
-    def url_archlinux_bug(self, url, name):
-        return url.absoluteDict("https://bugs.archlinux.org/", { "status[]": "", "search_in_details": "1", "string": name})
-    def url_archlinux_cve(self, url, name):
-        return url.absolute("https://security.archlinux.org/%s" % name)
     def url_github_advisory_bug(self, url, name):
         return url.absolute("https://github.com/advisories", query=name)
     def url_github_code_bug(self, url, name):
@@ -1655,16 +1629,6 @@ Debian bug number.'''),
             name = cve
         return A(self.url_cert_bug(url, cve), name)
 
-    def make_cvedetails_bug_ref(self, url, cve, name=None):
-        if name is None:
-            name = cve
-        return A(self.url_cvedetails_bug(url, cve), name)
-
-    def make_circl_bug_ref(self, url, cve, name=None):
-        if name is None:
-            name = cve
-        return A(self.url_circl_bug(url, cve), name)
-
     def make_lwn_bug_ref(self, url, cve, name=None):
         if name is None:
             name = cve
@@ -1695,26 +1659,16 @@ Debian bug number.'''),
             name = cve
         return A(self.url_metasploit_bug(url, cve), name)
 
-    def make_redhat_bug_ref(self, url, cve, name=None):
+    def make_rhbug_ref(self, url, cve, name=None):
         if name is None:
             name = cve
-        return A(self.url_redhat_bug(url, cve), name)
-
-    def make_redhat_cve_ref(self, url, cve, name=None):
-        if name is None:
-            name = cve
-        return A(self.url_redhat_cve(url, cve), name)
+        return A(self.url_rhbug(url, cve), name)
 
     def make_ubuntu_bug_ref(self, url, cve, name=None):
         if name is None:
             name = cve
         return A(self.url_ubuntu_bug(url, cve), name)
 
-    def make_ubuntu_cve_ref(self, url, cve, name=None):
-        if name is None:
-            name = cve
-        return A(self.url_ubuntu_cve(url, cve), name)
-
     def make_gentoo_bug_ref(self, url, cve, name=None):
         if name is None:
             name = cve
@@ -1735,21 +1689,6 @@ Debian bug number.'''),
             name = cve
         return A(self.url_mageia_bug(url, cve), name)
 
-    def make_alpine_bug_ref(self, url, cve, name=None):
-        if name is None:
-            name = cve
-        return A(self.url_alpine_bug(url, cve), name)
-
-    def make_archlinux_bug_ref(self, url, cve, name=None):
-        if name is None:
-            name = cve
-        return A(self.url_archlinux_bug(url, cve), name)
-
-    def make_archlinux_cve_ref(self, url, cve, name=None):
-        if name is None:
-            name = cve
-        return A(self.url_archlinux_cve(url, cve), name)
-
     def make_github_advisory_ref(self, url, cve, name=None):
         if name is None:
             name = cve



View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/11d59f964b7cbac7b1c71134b9999e8178901be5

-- 
View it on GitLab: https://salsa.debian.org/security-tracker-team/security-tracker/-/commit/11d59f964b7cbac7b1c71134b9999e8178901be5
You're receiving this email because of your account on salsa.debian.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://alioth-lists.debian.net/pipermail/debian-security-tracker-commits/attachments/20230120/39cd04c8/attachment-0001.htm>


More information about the debian-security-tracker-commits mailing list