diff --git a/e2etests/testcase_test.go b/e2etests/testcase_test.go index f7a07a2cc..b73aab631 100644 --- a/e2etests/testcase_test.go +++ b/e2etests/testcase_test.go @@ -1009,10 +1009,10 @@ var testCases = []testCase{ }, }, { - image: "us.gcr.io/stackrox-ci/qa/apache/server:latest", - registry: "https://us.gcr.io", - username: "_json_key", - password: os.Getenv("GOOGLE_SA_CIRCLECI_SCANNER"), + image: "quay.io/rhacs-eng/qa:apache-server-scannerci", + registry: "https://quay.io", + username: os.Getenv("QUAY_RHACS_ENG_RO_USERNAME"), + password: os.Getenv("QUAY_RHACS_ENG_RO_PASSWORD"), source: "NVD", namespace: "ubuntu:14.04", expectedFeatures: []apiV1.Feature{ @@ -1435,7 +1435,7 @@ var testCases = []testCase{ }, { Name: "CVE-2020-1597", - Description: "

A denial of service vulnerability exists when ASP.NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against an ASP.NET Core web application. The vulnerability can be exploited remotely, without authentication.

\n

A remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the ASP.NET Core application.

\n

The update addresses the vulnerability by correcting how the ASP.NET Core web application handles web requests.

\n", + Description: "A denial of service vulnerability exists when ASP.NET Core improperly handles web requests. An attacker who successfully exploited this vulnerability could cause a denial of service against an ASP.NET Core web application. The vulnerability can be exploited remotely, without authentication.\nA remote unauthenticated attacker could exploit this vulnerability by issuing specially crafted requests to the ASP.NET Core application.\nThe update addresses the vulnerability by correcting how the ASP.NET Core web application handles web requests.\n", Link: "https://nvd.nist.gov/vuln/detail/CVE-2020-1597", Metadata: map[string]interface{}{ "NVD": map[string]interface{}{ @@ -3511,7 +3511,7 @@ var testCases = []testCase{ NamespaceName: "rhel:9", Version: "1:3.0.1-23.el9_0.x86_64", VersionFormat: "rpm", - FixedBy: "1:3.0.7-16.el9_2", + FixedBy: "1:3.0.7-25.el9_3", Vulnerabilities: []apiV1.Vulnerability{ { Name: "RHSA-2022:7288", @@ -3553,7 +3553,7 @@ For more details about the security issue(s), including the impact, a CVSS score NamespaceName: "rhel:9", Version: "1:3.0.1-23.el9_0.x86_64", VersionFormat: "rpm", - FixedBy: "1:3.0.7-16.el9_2", + FixedBy: "1:3.0.7-25.el9_3", Vulnerabilities: []apiV1.Vulnerability{ { Name: "RHSA-2022:7288", @@ -3595,6 +3595,7 @@ For more details about the security issue(s), including the impact, a CVSS score NamespaceName: "rhel:9", Version: "1.26.5-3.el9.noarch", VersionFormat: "rpm", + FixedBy: "1.26.5-3.el9_3.1", }, { AddedBy: "sha256:2412e60e610160d090f7e974a208c6ffd26b2d530361b7c9aa8967e160ac7996", @@ -3656,7 +3657,7 @@ For more details about the security issue(s), including the impact, a CVSS score NamespaceName: "rhel:8", VersionFormat: "rpm", Version: "6.0.6-1.el8_6.x86_64", - FixedBy: "6.0.26-1.el8_9", + FixedBy: "6.0.27-1.el8_9", Vulnerabilities: []apiV1.Vulnerability{ { Name: "RHBA-2022:5747", @@ -3695,7 +3696,7 @@ Bug Fix(es) and Enhancement(s): NamespaceName: "rhel:8", VersionFormat: "rpm", Version: "6.0.6-1.el8_6.x86_64", - FixedBy: "6.0.26-1.el8_9", + FixedBy: "6.0.27-1.el8_9", Vulnerabilities: []apiV1.Vulnerability{ { Name: "RHBA-2022:5747", @@ -3841,7 +3842,7 @@ Applications using RegexRequestMatcher with '.' in the regular expression are po FixedBy: "3.0.2-0ubuntu1.7", }, }, - FixedBy: "3.0.2-0ubuntu1.12", + FixedBy: "3.0.2-0ubuntu1.14", // This image installs the openssl pacakge in the second layer; // however, the first layer already installed libssl3 whose source package is openssl. // Therefore, we claim openssl was installed in the first layer. diff --git a/image/scanner/dump/genesis_manifests.json b/image/scanner/dump/genesis_manifests.json index 611ccd6dc..c4a2b7240 100644 --- a/image/scanner/dump/genesis_manifests.json +++ b/image/scanner/dump/genesis_manifests.json @@ -446,6 +446,16 @@ "dumpLocationInGS": "gs://stackrox-scanner-ci-vuln-dump/genesis-20231025151131.zip", "timestamp": "2023-10-25T15:11:31.926496239Z", "uuid": "93AEC554-29EE-4E24-96D6-744092A98444" + }, + { + "dumpLocationInGS": "gs://stackrox-scanner-ci-vuln-dump/genesis-20240228002053.zip", + "timestamp": "2024-02-28T00:20:53.211664833Z", + "uuid": "c73d1bf5-49cb-48cb-b475-46702de2be73" + }, + { + "dumpLocationInGS": "gs://stackrox-scanner-ci-vuln-dump/genesis-20240424180825.zip", + "timestamp": "2024-04-24T18:08:25.500332002Z", + "uuid": "3460152f-270b-4699-b668-688822016735" } ] }