From 01aed5e7ee1bcea7827fb6de41387d682b6dc587 Mon Sep 17 00:00:00 2001 From: Tushar Goel Date: Wed, 14 Aug 2024 20:22:11 +0530 Subject: [PATCH 1/2] Add changelog for v34.0.0rc5 Signed-off-by: Tushar Goel --- CHANGELOG.rst | 14 ++++++++++++++ 1 file changed, 14 insertions(+) diff --git a/CHANGELOG.rst b/CHANGELOG.rst index a6a74d165..1835ea943 100644 --- a/CHANGELOG.rst +++ b/CHANGELOG.rst @@ -1,6 +1,20 @@ Release notes ============= +Version v34.0.0rc5 +------------------- + +- Add safetydb importer. +- Add missing width setting for the table in the vulnerability details UI. +- Add KEV support. +- Add UI template for API. +- Use VersionRange.normalize to compare advisory. +- Use integer column to display score. +- Add support for CVSSv4 & SSVC and import the data using vulnrichment. +- Add support for reference_type in the API. +- Add API improvements for the package endpoint. + + Version v34.0.0rc4 ------------------- From 8681540c81faedcad1170ff9bbcaa060a4b1b6a4 Mon Sep 17 00:00:00 2001 From: Tushar Goel Date: Wed, 14 Aug 2024 20:23:20 +0530 Subject: [PATCH 2/2] Add migrations Signed-off-by: Tushar Goel --- ..._known_ransomware_campaign_use_and_more.py | 62 +++++++++++++++++++ vulnerablecode/__init__.py | 2 +- 2 files changed, 63 insertions(+), 1 deletion(-) create mode 100644 vulnerabilities/migrations/0060_alter_kev_known_ransomware_campaign_use_and_more.py diff --git a/vulnerabilities/migrations/0060_alter_kev_known_ransomware_campaign_use_and_more.py b/vulnerabilities/migrations/0060_alter_kev_known_ransomware_campaign_use_and_more.py new file mode 100644 index 000000000..b2951e9a8 --- /dev/null +++ b/vulnerabilities/migrations/0060_alter_kev_known_ransomware_campaign_use_and_more.py @@ -0,0 +1,62 @@ +# Generated by Django 4.1.13 on 2024-08-14 14:52 + +from django.db import migrations, models + + +class Migration(migrations.Migration): + + dependencies = [ + ("vulnerabilities", "0059_vulnerabilityseverity_published_at_and_more"), + ] + + operations = [ + migrations.AlterField( + model_name="kev", + name="known_ransomware_campaign_use", + field=models.BooleanField( + default=False, + help_text="Known if this vulnerability is known to have been leveraged as part of a ransomware campaign;\n or 'Unknown' if CISA lacks confirmation that the vulnerability has been utilized for ransomware.", + ), + ), + migrations.AlterField( + model_name="packagechangelog", + name="software_version", + field=models.CharField( + default="34.0.0rc5", + help_text="Version of the software at the time of change", + max_length=100, + ), + ), + migrations.AlterField( + model_name="vulnerabilitychangelog", + name="software_version", + field=models.CharField( + default="34.0.0rc5", + help_text="Version of the software at the time of change", + max_length=100, + ), + ), + migrations.AlterField( + model_name="vulnerabilityseverity", + name="scoring_system", + field=models.CharField( + choices=[ + ("cvssv2", "CVSSv2 Base Score"), + ("cvssv3", "CVSSv3 Base Score"), + ("cvssv3.1", "CVSSv3.1 Base Score"), + ("cvssv4", "CVSSv4 Base Score"), + ("rhbs", "RedHat Bugzilla severity"), + ("rhas", "RedHat Aggregate severity"), + ("archlinux", "Archlinux Vulnerability Group Severity"), + ("cvssv3.1_qr", "CVSSv3.1 Qualitative Severity Rating"), + ("generic_textual", "Generic textual severity rating"), + ("apache_httpd", "Apache Httpd Severity"), + ("apache_tomcat", "Apache Tomcat Severity"), + ("epss", "Exploit Prediction Scoring System"), + ("ssvc", "Stakeholder-Specific Vulnerability Categorization"), + ], + help_text="Identifier for the scoring system used. Available choices are: cvssv2: CVSSv2 Base Score,\ncvssv3: CVSSv3 Base Score,\ncvssv3.1: CVSSv3.1 Base Score,\ncvssv4: CVSSv4 Base Score,\nrhbs: RedHat Bugzilla severity,\nrhas: RedHat Aggregate severity,\narchlinux: Archlinux Vulnerability Group Severity,\ncvssv3.1_qr: CVSSv3.1 Qualitative Severity Rating,\ngeneric_textual: Generic textual severity rating,\napache_httpd: Apache Httpd Severity,\napache_tomcat: Apache Tomcat Severity,\nepss: Exploit Prediction Scoring System,\nssvc: Stakeholder-Specific Vulnerability Categorization ", + max_length=50, + ), + ), + ] diff --git a/vulnerablecode/__init__.py b/vulnerablecode/__init__.py index e4d5b5f8d..22d19958f 100644 --- a/vulnerablecode/__init__.py +++ b/vulnerablecode/__init__.py @@ -12,7 +12,7 @@ import warnings from pathlib import Path -__version__ = "34.0.0rc4" +__version__ = "34.0.0rc5" def command_line():