diff --git a/plugins/advisors/black-duck/src/funTest/assets/BDSA-2024-5272-parsed.yml b/plugins/advisors/black-duck/src/funTest/assets/BDSA-2024-5272-parsed.yml deleted file mode 100644 index 941dc9b4c05bf..0000000000000 --- a/plugins/advisors/black-duck/src/funTest/assets/BDSA-2024-5272-parsed.yml +++ /dev/null @@ -1,51 +0,0 @@ ---- -id: "BDSA-2024-5272" -description: "Libtiff is vulnerable to a null pointer dereference issue due to a problem\ - \ in its `_TIFFMergeFields` function. This could allow an attacker to trigger memory\ - \ allocation failures, causing a segmentation fault and leading to a crash." -references: -- url: "https://zeiss.app.blackduck.com/api/vulnerabilities/BDSA-2024-5272" - scoring_system: "CVSS:3.1" - severity: "MEDIUM" - score: 4.8 - vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" -- url: "https://zeiss.app.blackduck.com/api/cwes/CWE-476" - scoring_system: "CVSS:3.1" - severity: "MEDIUM" - score: 4.8 - vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" -- url: "https://zeiss.app.blackduck.com/api/vulnerabilities/CVE-2024-7006" - scoring_system: "CVSS:3.1" - severity: "MEDIUM" - score: 4.8 - vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" -- url: "https://zeiss.app.blackduck.com/api/vulnerabilities/BDSA-2024-5272/ranges" - scoring_system: "CVSS:3.1" - severity: "MEDIUM" - score: 4.8 - vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" -- url: "https://access.redhat.com/security/cve/CVE-2024-7006" - scoring_system: "CVSS:3.1" - severity: "MEDIUM" - score: 4.8 - vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" -- url: "https://bugzilla.redhat.com/show_bug.cgi?id=2302996" - scoring_system: "CVSS:3.1" - severity: "MEDIUM" - score: 4.8 - vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" -- url: "https://gitlab.com/libtiff/libtiff/-/commit/818fb8ce" - scoring_system: "CVSS:3.1" - severity: "MEDIUM" - score: 4.8 - vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" -- url: "https://gitlab.com/libtiff/libtiff/-/issues/624" - scoring_system: "CVSS:3.1" - severity: "MEDIUM" - score: 4.8 - vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" -- url: "https://gitlab.com/libtiff/libtiff/-/tags/v4.7.0rc1" - scoring_system: "CVSS:3.1" - severity: "MEDIUM" - score: 4.8 - vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" diff --git a/plugins/advisors/black-duck/src/main/kotlin/BlackDuck.kt b/plugins/advisors/black-duck/src/main/kotlin/BlackDuck.kt index fe730143163b3..551509c8dbfe8 100644 --- a/plugins/advisors/black-duck/src/main/kotlin/BlackDuck.kt +++ b/plugins/advisors/black-duck/src/main/kotlin/BlackDuck.kt @@ -198,7 +198,7 @@ class BlackDuck( } internal fun VulnerabilityView.toOrtVulnerability(): Vulnerability { - val referenceUris = listOf(meta.href.uri(), *meta.links.map { it.href.uri() }.toTypedArray()) + val referenceUris = setOf(meta.href.uri(), *meta.links.map { it.href.uri() }.toTypedArray()) val references = referenceUris.map { uri -> val cvssVector = cvss3?.vector ?: cvss2?.vector diff --git a/plugins/advisors/black-duck/src/test/assets/BDSA-2024-5272-parsed.yml b/plugins/advisors/black-duck/src/test/assets/BDSA-2024-5272-parsed.yml index c95d2c6689a1c..941dc9b4c05bf 100644 --- a/plugins/advisors/black-duck/src/test/assets/BDSA-2024-5272-parsed.yml +++ b/plugins/advisors/black-duck/src/test/assets/BDSA-2024-5272-parsed.yml @@ -44,11 +44,6 @@ references: severity: "MEDIUM" score: 4.8 vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" -- url: "https://gitlab.com/libtiff/libtiff/-/issues/624" - scoring_system: "CVSS:3.1" - severity: "MEDIUM" - score: 4.8 - vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C" - url: "https://gitlab.com/libtiff/libtiff/-/tags/v4.7.0rc1" scoring_system: "CVSS:3.1" severity: "MEDIUM"