Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

fix(report): false positive for kernel-related CVE for RedHat, CentOS, Oracle and Amazon #1199 #1223

Merged
merged 1 commit into from
Apr 22, 2021

Conversation

kotakanbe
Copy link
Member

@kotakanbe kotakanbe commented Apr 22, 2021

What did you implement:

Fixes #1199

Type of change

  • Bug fix (non-breaking change which fixes an issue)
  • New feature (non-breaking change which adds functionality)
  • Breaking change (fix or feature that would cause existing functionality to not work as expected)
  • This change requires a documentation update

How Has This Been Tested?

./vuls server
 ubuntu@dev  │tmp  cat paquets.txt
grub2-common 1 2.02 90.el8 noarch
grub2-pc 1 2.02 90.el8 x86_64
grub2-pc-modules 1 2.02 90.el8 noarch
grub2-tools 1 2.02 90.el8 x86_64
grub2-tools-efi 1 2.02 90.el8 x86_64
grub2-tools-extra 1 2.02 90.el8 x86_64
grub2-tools-minimal 1 2.02 90.el8 x86_64
kernel 0 4.18.0 193.el8 x86_64
kernel 0 4.18.0 240.15.1.el8_3 x86_64
kernel-core 0 4.18.0 193.el8 x86_64
kernel-core 0 4.18.0 240.15.1.el8_3 x86_64
kernel-modules 0 4.18.0 193.el8 x86_64
kernel-modules 0 4.18.0 240.15.1.el8_3 x86_64
 ubuntu@dev  │tmp  cat paquets-2.txt
grub2-common 1 2.02 90.el8 noarch
grub2-pc 1 2.02 90.el8 x86_64
grub2-pc-modules 1 2.02 90.el8 noarch
grub2-tools 1 2.02 90.el8 x86_64
grub2-tools-efi 1 2.02 90.el8 x86_64
grub2-tools-extra 1 2.02 90.el8 x86_64
grub2-tools-minimal 1 2.02 90.el8 x86_64
kernel 0 4.18.0 240.15.1.el8_3 x86_64
kernel 0 4.18.0 193.el8 x86_64
kernel-core 0 4.18.0 240.15.1.el8_3 x86_64
kernel-core 0 4.18.0 193.el8 x86_64
kernel-modules 0 4.18.0 240.15.1.el8_3 x86_64
kernel-modules 0 4.18.0 193.el8 x86_64
 ✗  ubuntu@dev  │tmp  curl -s "http://127.0.0.1:5515/vuls?num=[0-10]" -H 'Content-type: text/plain' -H 'X-Vuls-OS-Family: redhat' -H 'X-Vuls-OS-Release: 8.2
' -H 'X-Vuls-Kernel-Release: 4.18.0-240.15.1.el8_3.x86_64' -H 'X-Vuls-Server-Name: VMrh8' --data-binary @paquets.txt | jq ".[0].scannedCves | length"
55
55
55
55
55
55
55
55
55
55
55
 ubuntu@dev  │tmp  curl -s "http://127.0.0.1:5515/vuls?num=[0-10]" -H 'Content-type: text/plain' -H 'X-Vuls-OS-Family: redhat' -H 'X-Vuls-OS-Release: 8.2' -H 'X-Vuls-Kernel-Release: 4.18.0-240.15.1.el8_3.x86_64' -H 'X-Vuls-Server-Name: VMrh8' --data-binary @paquets-2.txt | jq ".[0].scannedCves | length"
55
55
55
55
55
55
55
55
55
55
55

Checklist:

  • Write tests
  • Write documentation
  • Check that there aren't other open pull requests for the same issue/feature
  • Format your source code by make fmt
  • Pass the test by make test
  • Provide verification config / commands
  • Enable "Allow edits from maintainers" for this PR
  • Update the messages below

Is this ready for review?: YES

@kotakanbe kotakanbe merged commit c36e645 into master Apr 22, 2021
@kotakanbe kotakanbe deleted the fp-rhel branch April 29, 2021 22:34
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Vuls in server mode: the package order in POST request has an effect on vuls CVE report content
1 participant