Skip to content

Commit

Permalink
e2e: fix tests
Browse files Browse the repository at this point in the history
  • Loading branch information
RTann committed Oct 13, 2023
1 parent ffabf37 commit 91d6629
Show file tree
Hide file tree
Showing 2 changed files with 10 additions and 9 deletions.
6 changes: 3 additions & 3 deletions e2etests/node_scan_rhcos_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -22,10 +22,10 @@ var vulnLibksba = &v1.Vulnerability{
LastModifiedDateTime: "",
CvssV2: nil,
CvssV3: &v1.CVSSMetadata{
Score: 9.8,
Vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
Score: 8.6,
Vector: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
ExploitabilityScore: 3.9,
ImpactScore: 5.9,
ImpactScore: 4.7,
},
},
FixedBy: "0:1.3.5-8.el8_6",
Expand Down
13 changes: 7 additions & 6 deletions e2etests/testcase_test.go
Original file line number Diff line number Diff line change
Expand Up @@ -2808,7 +2808,7 @@ var testCases = []testCase{
},
},
AddedBy: "sha256:2408cc74d12b6cd092bb8b516ba7d5e290f485d3eb9672efc00f0583730179e8",
FixedBy: "1.1.1q-r0",
FixedBy: "1.1.1v-r0",
},
},
},
Expand Down Expand Up @@ -3799,9 +3799,9 @@ Applications using RegexRequestMatcher with '.' in the regular expression are po
},
"CVSSv3": map[string]interface{}{
"ExploitabilityScore": 3.9,
"ImpactScore": 5.9,
"Score": 9.8,
"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"ImpactScore": 3.6,
"Score": 7.5,
"Vectors": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
},
},
},
Expand All @@ -3810,7 +3810,7 @@ Applications using RegexRequestMatcher with '.' in the regular expression are po
{
Name: "CVE-2022-3786",
NamespaceName: "ubuntu:22.04",
Description: "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects. Fixed in OpenSSL 3.0.7 (Affected 3.0.0,3.0.1,3.0.2,3.0.3,3.0.4,3.0.5,3.0.6).",
Description: "A buffer overrun can be triggered in X.509 certificate verification, specifically in name constraint checking. Note that this occurs after certificate chain signature verification and requires either a CA to have signed a malicious certificate or for an application to continue certificate verification despite failure to construct a path to a trusted issuer. An attacker can craft a malicious email address in a certificate to overflow an arbitrary number of bytes containing the `.' character (decimal 46) on the stack. This buffer overflow could result in a crash (causing a denial of service). In a TLS client, this can be triggered by connecting to a malicious server. In a TLS server, this can be triggered if the server requests client authentication and a malicious client connects.",
Link: "https://ubuntu.com/security/CVE-2022-3786",
Severity: "Important",
Metadata: map[string]interface{}{
Expand All @@ -3832,7 +3832,7 @@ Applications using RegexRequestMatcher with '.' in the regular expression are po
FixedBy: "3.0.2-0ubuntu1.7",
},
},
FixedBy: "3.0.2-0ubuntu1.7",
FixedBy: "3.0.2-0ubuntu1.10",
// This image installs the openssl pacakge in the second layer;
// however, the first layer already installed libssl3 whose source package is openssl.
// Therefore, we claim openssl was installed in the first layer.
Expand All @@ -3855,6 +3855,7 @@ Applications using RegexRequestMatcher with '.' in the regular expression are po
NamespaceName: "ubuntu:22.10",
VersionFormat: "dpkg",
Version: "3.0.5-2ubuntu2",
FixedBy: "3.0.5-2ubuntu2.3",
AddedBy: "sha256:2b441754735ea7decb684ef19d54115fc309c270fe7b87ed36aa3773ce50b78b",
},
},
Expand Down

0 comments on commit 91d6629

Please sign in to comment.