Skip to content

Commit

Permalink
ROX-22889: Cherry pick new genesis dump into 2.32 (targeting ACS 4.3.…
Browse files Browse the repository at this point in the history
…7) (#1489)

Co-authored-by: Yi Li <[email protected]>
Co-authored-by: Ross Tannenbaum <[email protected]>
  • Loading branch information
3 people authored Apr 26, 2024
1 parent d7f0537 commit 42f5b8b
Show file tree
Hide file tree
Showing 2 changed files with 21 additions and 10 deletions.
21 changes: 11 additions & 10 deletions e2etests/testcase_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -1009,10 +1009,10 @@ var testCases = []testCase{
},
},
{
image: "us.gcr.io/stackrox-ci/qa/apache/server:latest",
registry: "https://us.gcr.io",
username: "_json_key",
password: os.Getenv("GOOGLE_SA_CIRCLECI_SCANNER"),
image: "quay.io/rhacs-eng/qa:apache-server-scannerci",
registry: "https://quay.io",
username: os.Getenv("QUAY_RHACS_ENG_RO_USERNAME"),
password: os.Getenv("QUAY_RHACS_ENG_RO_PASSWORD"),
source: "NVD",
namespace: "ubuntu:14.04",
expectedFeatures: []apiV1.Feature{
Expand Down Expand Up @@ -1435,7 +1435,7 @@ var testCases = []testCase{
},
{
Name: "CVE-2020-1597",
Description: "<p>A denial of service vulnerability exists when ASP.NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against an ASP.NET Core web application. The vulnerability can be exploited remotely, without authentication.</p>\n<p>A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the ASP.NET Core application.</p>\n<p>The update addresses the vulnerability by correcting how the ASP.NET Core web application handles web requests.</p>\n",
Description: "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against an ASP.NET Core web application. The vulnerability can be exploited remotely, without authentication.\nA remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the ASP.NET Core application.\nThe update addresses the vulnerability by correcting how the ASP.NET Core web application handles web requests.\n",
Link: "https://nvd.nist.gov/vuln/detail/CVE-2020-1597",
Metadata: map[string]interface{}{
"NVD": map[string]interface{}{
Expand Down Expand Up @@ -3511,7 +3511,7 @@ var testCases = []testCase{
NamespaceName: "rhel:9",
Version: "1:3.0.1-23.el9_0.x86_64",
VersionFormat: "rpm",
FixedBy: "1:3.0.7-16.el9_2",
FixedBy: "1:3.0.7-25.el9_3",
Vulnerabilities: []apiV1.Vulnerability{
{
Name: "RHSA-2022:7288",
Expand Down Expand Up @@ -3553,7 +3553,7 @@ For more details about the security issue(s), including the impact, a CVSS score
NamespaceName: "rhel:9",
Version: "1:3.0.1-23.el9_0.x86_64",
VersionFormat: "rpm",
FixedBy: "1:3.0.7-16.el9_2",
FixedBy: "1:3.0.7-25.el9_3",
Vulnerabilities: []apiV1.Vulnerability{
{
Name: "RHSA-2022:7288",
Expand Down Expand Up @@ -3595,6 +3595,7 @@ For more details about the security issue(s), including the impact, a CVSS score
NamespaceName: "rhel:9",
Version: "1.26.5-3.el9.noarch",
VersionFormat: "rpm",
FixedBy: "1.26.5-3.el9_3.1",
},
{
AddedBy: "sha256:2412e60e610160d090f7e974a208c6ffd26b2d530361b7c9aa8967e160ac7996",
Expand Down Expand Up @@ -3656,7 +3657,7 @@ For more details about the security issue(s), including the impact, a CVSS score
NamespaceName: "rhel:8",
VersionFormat: "rpm",
Version: "6.0.6-1.el8_6.x86_64",
FixedBy: "6.0.26-1.el8_9",
FixedBy: "6.0.27-1.el8_9",
Vulnerabilities: []apiV1.Vulnerability{
{
Name: "RHBA-2022:5747",
Expand Down Expand Up @@ -3695,7 +3696,7 @@ Bug Fix(es) and Enhancement(s):
NamespaceName: "rhel:8",
VersionFormat: "rpm",
Version: "6.0.6-1.el8_6.x86_64",
FixedBy: "6.0.26-1.el8_9",
FixedBy: "6.0.27-1.el8_9",
Vulnerabilities: []apiV1.Vulnerability{
{
Name: "RHBA-2022:5747",
Expand Down Expand Up @@ -3841,7 +3842,7 @@ Applications using RegexRequestMatcher with '.' in the regular expression are po
FixedBy: "3.0.2-0ubuntu1.7",
},
},
FixedBy: "3.0.2-0ubuntu1.12",
FixedBy: "3.0.2-0ubuntu1.14",
// This image installs the openssl pacakge in the second layer;
// however, the first layer already installed libssl3 whose source package is openssl.
// Therefore, we claim openssl was installed in the first layer.
Expand Down
10 changes: 10 additions & 0 deletions image/scanner/dump/genesis_manifests.json
Original file line number Diff line number Diff line change
Expand Up @@ -446,6 +446,16 @@
"dumpLocationInGS": "gs://stackrox-scanner-ci-vuln-dump/genesis-20231025151131.zip",
"timestamp": "2023-10-25T15:11:31.926496239Z",
"uuid": "93AEC554-29EE-4E24-96D6-744092A98444"
},
{
"dumpLocationInGS": "gs://stackrox-scanner-ci-vuln-dump/genesis-20240228002053.zip",
"timestamp": "2024-02-28T00:20:53.211664833Z",
"uuid": "c73d1bf5-49cb-48cb-b475-46702de2be73"
},
{
"dumpLocationInGS": "gs://stackrox-scanner-ci-vuln-dump/genesis-20240424180825.zip",
"timestamp": "2024-04-24T18:08:25.500332002Z",
"uuid": "3460152f-270b-4699-b668-688822016735"
}
]
}

0 comments on commit 42f5b8b

Please sign in to comment.