Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(amazon): support amazon linux 2022 #1338

Merged
merged 1 commit into from
Dec 9, 2021
Merged

Conversation

MaineK00n
Copy link
Collaborator

@MaineK00n MaineK00n commented Nov 29, 2021

What did you implement:

Fixes #1336

Amazon Linux2022 is now supported.

Type of change

  • New feature (non-breaking change which adds functionality)
  • This change requires a documentation update

How Has This Been Tested?

Note: OVAL has been partially modified for verification purposes.

$ vuls scan
[Nov 29 14:58:34]  INFO [localhost] vuls-v0.19.0-build-20211129_143746_0c6a892
[Nov 29 14:58:34]  INFO [localhost] Start scanning
[Nov 29 14:58:34]  INFO [localhost] config: /home/mainek00n/github/github.com/MaineK00n/vuls/config.toml
[Nov 29 14:58:34]  INFO [localhost] Validating config...
[Nov 29 14:58:34]  INFO [localhost] Detecting Server/Container OS... 
[Nov 29 14:58:34]  INFO [localhost] Detecting OS of servers... 
[Nov 29 14:58:35]  INFO [localhost] (1/1) Detected: al2022: amazon 2022 (Amazon Linux)
[Nov 29 14:58:35]  INFO [localhost] Detecting OS of containers... 
[Nov 29 14:58:35]  INFO [localhost] Checking Scan Modes... 
[Nov 29 14:58:35]  INFO [localhost] Detecting Platforms... 
[Nov 29 14:58:35]  INFO [localhost] (1/1) al2022 is running on aws
[Nov 29 14:58:35]  INFO [al2022] Scanning OS pkg in fast mode


Scan Summary
================
al2022	amazon2022 (Amazon Linux)	740 installed, 0 updatable





To view the detail, vuls tui is useful.
To send a report, run vuls report -h.

$ vuls report
[Nov 29 14:58:40]  INFO [localhost] vuls-v0.19.0-build-20211129_143746_0c6a892
[Nov 29 14:58:40]  INFO [localhost] Validating config...
[Nov 29 14:58:40]  INFO [localhost] cveDict.type=sqlite3, cveDict.url=, cveDict.SQLite3Path=/usr/share/vuls-data/cve.sqlite3
[Nov 29 14:58:40]  INFO [localhost] ovalDict.type=sqlite3, ovalDict.url=, ovalDict.SQLite3Path=/home/mainek00n/github/github.com/MaineK00n/goval-dictionary/oval.sqlite3
[Nov 29 14:58:40]  INFO [localhost] gost.type=sqlite3, gost.url=, gost.SQLite3Path=/usr/share/vuls-data/gost.sqlite3
[Nov 29 14:58:40]  INFO [localhost] exploit.type=sqlite3, exploit.url=, exploit.SQLite3Path=/usr/share/vuls-data/go-exploitdb.sqlite3
[Nov 29 14:58:40]  INFO [localhost] metasploit.type=sqlite3, metasploit.url=, metasploit.SQLite3Path=/usr/share/vuls-data/go-msfdb.sqlite3
[Nov 29 14:58:40]  INFO [localhost] kevuln.type=sqlite3, kevuln.url=, kevuln.SQLite3Path=/usr/share/vuls-data/go-kev.sqlite3
[Nov 29 14:58:40]  INFO [localhost] Loaded: /home/mainek00n/github/github.com/MaineK00n/vuls/results/2021-11-29T14:58:35+09:00
[Nov 29 14:58:40]  INFO [localhost] OVAL amazon 2022 (Amazon Linux) found. defs: 2
[Nov 29 14:58:40]  INFO [localhost] OVAL amazon 2022 (Amazon Linux) is fresh. lastModified: 2021-11-29T14:44:19+09:00
[Nov 29 14:58:40]  INFO [localhost] al2022: 4 CVEs are detected with OVAL
[Nov 29 14:58:40]  INFO [localhost] al2022: 0 unfixed CVEs are detected with gost
[Nov 29 14:58:40]  INFO [localhost] al2022: 0 CVEs are detected with CPE
[Nov 29 14:58:40]  INFO [localhost] al2022: 0 PoC are detected
[Nov 29 14:58:40]  INFO [localhost] al2022: 0 exploits are detected
[Nov 29 14:58:40]  INFO [localhost] al2022: total 4 CVEs detected
[Nov 29 14:58:40]  INFO [localhost] al2022: 0 CVEs filtered by --confidence-over=80
al2022 (amazon2022 (Amazon Linux))
=======================================
Total: 4 (Critical:0 High:3 Medium:1 Low:0 ?:0)
4/4 Fixed, 4 poc, 0 exploits, cisa: 0, uscert: 0, jpcert: 0 alerts
740 installed

+---------------+------+--------+-----+-----------+---------+------------------------------------------------+
|    CVE-ID     | CVSS | ATTACK | POC |   ALERT   |  FIXED  |                      NVD                       |
+---------------+------+--------+-----+-----------+---------+------------------------------------------------+
| CVE-2021-3796 |  8.2 |  AV:N  | POC |           |   fixed | https://nvd.nist.gov/vuln/detail/CVE-2021-3796 |
| CVE-2021-3778 |  7.8 |  AV:L  | POC |           |   fixed | https://nvd.nist.gov/vuln/detail/CVE-2021-3778 |
| CVE-2021-3872 |  7.8 |  AV:N  | POC |           |   fixed | https://nvd.nist.gov/vuln/detail/CVE-2021-3872 |
| CVE-2021-3875 |  6.9 |  AV:N  | POC |           |   fixed | https://nvd.nist.gov/vuln/detail/CVE-2021-3875 |
+---------------+------+--------+-----+-----------+---------+------------------------------------------------+

tui

Checklist:

You don't have to satisfy all of the following.

  • Write tests
  • Write documentation
  • Check that there aren't other open pull requests for the same issue/feature
  • Format your source code by make fmt
  • Pass the test by make test
  • Provide verification config / commands
  • Enable "Allow edits from maintainers" for this PR
  • Update the messages below

Is this ready for review?: YES

Reference

@MaineK00n MaineK00n self-assigned this Nov 29, 2021
@MaineK00n MaineK00n requested a review from kotakanbe November 29, 2021 07:51
@kotakanbe kotakanbe merged commit 2b7294a into master Dec 9, 2021
@MaineK00n MaineK00n deleted the MaineK00n/support-al2022 branch December 13, 2021 12:56
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Support Amazon linux 22
2 participants