Skip to content

LineageOS/cve_tracker

 
 

Repository files navigation

cve_tracker

  1. Use Python 3.2 or higher
  2. Run pip3 install -r requirements.txt
  3. Generate a GitHub personal access token here. You don't need to select any scopes, just give it a name.
  4. Have access to a MongoDB instance and the IP address of the box (Install guide)
  5. Start the MongoDB instance with sudo service mongod start
  6. Copy app.cfg.example to app.cfg and provide the token you added above along with the IP of the MongoDB server.
  7. Seed your database initially by running python3 seed.py.
  8. Once you're set up, run: ./run to start the service.

This is a WIP, cats will be eaten.

v1 API

GET /api/v1/kernels

Query parameters

  • deprecated (int) (optional)
    • 0 will return all kernels that are not deprecated
    • 1 will return all deprecated kernels
    • any other value will return all kernels

Response

{
  "android_kernel_acer_t20-common": {
    "deprecated": true,
    "device": "t20-common",
    "last_github_update": {
      "$date": 1480952365000
    },
    "progress": 0,
    "repo_name": "android_kernel_acer_t20-common",
    "vendor": "acer"
  },
  ...
}

GET /api/v1/kernels/<kernel_name>

Response

{
  "deprecated": false,
  "device": "t20-common",
  "last_github_update": {
    "$date": 1480952365000
  },
  "progress": 0,
  "repo_name": "android_kernel_acer_t20-common",
  "statuses": {
    "CVE-2012-6657": 1,
    "CVE-2012-6689": 1,
    "CVE-2014-0196": 1,
    "CVE-2014-2523": 1,
    "CVE-2014-2851": 1,
    "CVE-2014-4014": 1,
    .
    .
    .
    "CVE-2016-9806": 1
  },
  "vendor": "acer"
}

GET /api/v1/kernels/<kernel_name>/<cve_name>

Response

{
  "description": "unpatched",
  "status": 1
}

GET /api/v1/cves

Response

{
  "CVE-2012-6657": {
    "cve_name": "CVE-2012-6657",
    "cvss_score": 2.0,
    "links": [
      {
        "cve_id": {
          "$oid": "5990886c092e37063df5d10e"
        },
        "link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6657"
      },
      {
        "cve_id": {
          "$oid": "5990886c092e37063df5d10e"
        },
        "desc": "d",
        "link": "https://www.google.ro/"
      }
    ],
    "notes": "adsadadasdasdasdasdasd"
  },
  ...

GET /api/v1/cves/<cve_name>

Response

{
  "cve_name": "CVE-2012-6657",
  "cvss_score": 2.0,
  "links": [
    {
      "cve_id": {
        "$oid": "5990886c092e37063df5d10e"
      },
      "link": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-6657"
    },
    {
      "cve_id": {
        "$oid": "5990886c092e37063df5d10e"
      },
      "desc": "d",
      "link": "https://www.google.ro/"
    }
  ],
  "notes": "adsadadasdasdasdasdasd",
  "statuses": {
    "android_kernel_acer_t20-common": 1,
    "android_kernel_acer_t30": 2,
    "android_kernel_alcatel_msm8916": 1,
    "android_kernel_amazon_bowser-common": 1,
    .
    .
    .
    "sony-kernel-u8500": 1,
    "zte-kernel-msm7x27":
  },
  "tags": [
    "some_tag"
  ]
}

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • JavaScript 38.2%
  • Python 26.8%
  • HTML 24.0%
  • CSS 11.0%