Skip to content

Commit 5a2315a

Browse files
dcaravelRTann
authored andcommitted
fix(ci): qa:apache-server-scannerci (#1750)
1 parent 8a19f90 commit 5a2315a

File tree

1 file changed

+27
-74
lines changed

1 file changed

+27
-74
lines changed

e2etests/testcase_test.go

Lines changed: 27 additions & 74 deletions
Original file line numberDiff line numberDiff line change
@@ -1017,111 +1017,64 @@ var testCases = []testCase{
10171017
namespace: "ubuntu:14.04",
10181018
expectedFeatures: []apiV1.Feature{
10191019
{
1020-
Name: "cron",
1020+
Name: "pam",
10211021
NamespaceName: "ubuntu:14.04",
10221022
VersionFormat: "dpkg",
1023-
Version: "3.0pl1-124ubuntu2",
1023+
Version: "1.1.8-1ubuntu2.2",
10241024
AddedBy: "sha256:bae382666908fd87a3a3646d7eb7176fa42226027d3256cac38ee0b79bdb0491",
1025+
FixedBy: "1.1.8-1ubuntu2.2+esm4",
10251026
Vulnerabilities: []apiV1.Vulnerability{
10261027
{
1027-
Name: "CVE-2017-9525",
1028+
Name: "CVE-2022-28321",
10281029
NamespaceName: "ubuntu:14.04",
1029-
Description: "In the cron package through 3.0pl1-128 on Debian, and through 3.0pl1-128ubuntu2 on Ubuntu, the postinst maintainer script allows for group-crontab-to-root privilege escalation via symlink attacks against unsafe usage of the chown and chmod programs.",
1030-
Link: "https://ubuntu.com/security/CVE-2017-9525",
1030+
Description: "The Linux-PAM package before 1.5.2-6.1 for openSUSE Tumbleweed allows authentication bypass for SSH logins. The pam_access.so module doesn't correctly restrict login if a user tries to connect from an IP address that is not resolvable via DNS. In such conditions, a user with denied access to a machine can still get access. NOTE: the relevance of this issue is largely limited to openSUSE Tumbleweed and openSUSE Factory; it does not affect Linux-PAM upstream.",
1031+
Link: "https://ubuntu.com/security/CVE-2022-28321",
10311032
Severity: "Low",
10321033
Metadata: map[string]interface{}{
10331034
"NVD": map[string]interface{}{
10341035
"CVSSv2": map[string]interface{}{
1035-
"ExploitabilityScore": 3.4,
1036-
"ImpactScore": 10.0,
1037-
"Score": 6.9,
1038-
"Vectors": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
1039-
},
1040-
"CVSSv3": map[string]interface{}{
1041-
"ExploitabilityScore": 0.8,
1042-
"ImpactScore": 5.9,
1043-
"Score": 6.7,
1044-
"Vectors": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
1045-
},
1046-
"LastModifiedDateTime": "2019-03-21T23:29Z",
1047-
"PublishedDateTime": "2017-06-09T16:29Z",
1048-
},
1049-
},
1050-
},
1051-
{
1052-
Name: "CVE-2019-9704",
1053-
NamespaceName: "ubuntu:14.04",
1054-
Description: "Vixie Cron before the 3.0pl1-133 Debian package allows local users to cause a denial of service (daemon crash) via a large crontab file because the calloc return value is not checked.",
1055-
Link: "https://ubuntu.com/security/CVE-2019-9704",
1056-
Severity: "Low",
1057-
Metadata: map[string]interface{}{
1058-
"NVD": map[string]interface{}{
1059-
"CVSSv2": map[string]interface{}{
1060-
"ExploitabilityScore": 3.9,
1061-
"ImpactScore": 2.9,
1062-
"Score": 2.1,
1063-
"Vectors": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
1036+
"ExploitabilityScore": float64(0),
1037+
"ImpactScore": float64(0),
1038+
"Score": float64(0),
1039+
"Vectors": "",
10641040
},
10651041
"CVSSv3": map[string]interface{}{
1066-
"ExploitabilityScore": 1.8,
1067-
"ImpactScore": 3.6,
1068-
"Score": 5.5,
1069-
"Vectors": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
1070-
},
1071-
"LastModifiedDateTime": "2021-11-30T19:53Z",
1072-
"PublishedDateTime": "2019-03-12T01:29Z",
1073-
},
1074-
},
1075-
},
1076-
{
1077-
Name: "CVE-2019-9705",
1078-
NamespaceName: "ubuntu:14.04",
1079-
Description: "Vixie Cron before the 3.0pl1-133 Debian package allows local users to cause a denial of service (memory consumption) via a large crontab file because an unlimited number of lines is accepted.",
1080-
Link: "https://ubuntu.com/security/CVE-2019-9705",
1081-
Severity: "Low",
1082-
Metadata: map[string]interface{}{
1083-
"NVD": map[string]interface{}{
1084-
"CVSSv2": map[string]interface{}{
10851042
"ExploitabilityScore": 3.9,
1086-
"ImpactScore": 2.9,
1087-
"Score": 2.1,
1088-
"Vectors": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
1089-
},
1090-
"CVSSv3": map[string]interface{}{
1091-
"ExploitabilityScore": 1.8,
1092-
"ImpactScore": 3.6,
1093-
"Score": 5.5,
1094-
"Vectors": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
1043+
"ImpactScore": 5.9,
1044+
"Score": 9.8,
1045+
"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
10951046
},
1096-
"LastModifiedDateTime": "2021-11-30T18:50Z",
1097-
"PublishedDateTime": "2019-03-12T01:29Z",
1047+
"LastModifiedDateTime": "2024-11-21T06:57:00Z",
1048+
"PublishedDateTime": "2022-09-19T22:15:00Z",
10981049
},
10991050
},
1051+
FixedBy: "1.1.8-1ubuntu2.2+esm1",
11001052
},
11011053
{
1102-
Name: "CVE-2019-9706",
1054+
Name: "CVE-2024-22365",
11031055
NamespaceName: "ubuntu:14.04",
1104-
Description: "Vixie Cron before the 3.0pl1-133 Debian package allows local users to cause a denial of service (use-after-free and daemon crash) because of a force_rescan_user error.",
1105-
Link: "https://ubuntu.com/security/CVE-2019-9706",
1106-
Severity: "Low",
1056+
Description: "linux-pam (aka Linux PAM) before 1.6.0 allows attackers to cause a denial of service (blocked login process) via mkfifo because the openat call (for protect_dir) lacks O_DIRECTORY.",
1057+
Link: "https://ubuntu.com/security/CVE-2024-22365",
1058+
Severity: "Moderate",
11071059
Metadata: map[string]interface{}{
11081060
"NVD": map[string]interface{}{
11091061
"CVSSv2": map[string]interface{}{
1110-
"ExploitabilityScore": 3.9,
1111-
"ImpactScore": 2.9,
1112-
"Score": 2.1,
1113-
"Vectors": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
1062+
"ExploitabilityScore": float64(0),
1063+
"ImpactScore": float64(0),
1064+
"Score": float64(0),
1065+
"Vectors": "",
11141066
},
11151067
"CVSSv3": map[string]interface{}{
11161068
"ExploitabilityScore": 1.8,
11171069
"ImpactScore": 3.6,
11181070
"Score": 5.5,
11191071
"Vectors": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
11201072
},
1121-
"LastModifiedDateTime": "2021-11-30T18:50Z",
1122-
"PublishedDateTime": "2019-03-12T01:29Z",
1073+
"LastModifiedDateTime": "2024-11-21T08:56:00Z",
1074+
"PublishedDateTime": "2024-02-06T08:15:00Z",
11231075
},
11241076
},
1077+
FixedBy: "1.1.8-1ubuntu2.2+esm4",
11251078
},
11261079
},
11271080
},

0 commit comments

Comments
 (0)