Fix false positive for Oracle Linux (#1227)
* fix(oracle): false-positive(handle arch of pkgs) * fix(oracle): false positive kernel-related CVEs * add a test case for ksplice1 * fix(scan): handle uek kernel for Oracle linux * fix(scan): hanlde uek kernel for reboot required * fix(oracle): false-positive for redis-backend
This commit is contained in:
@@ -131,8 +131,8 @@ func TestScanResult_Sort(t *testing.T) {
|
||||
{AdvisoryID: "adv-2"},
|
||||
},
|
||||
Exploits: []Exploit{
|
||||
{ID: "a"},
|
||||
{ID: "b"},
|
||||
{URL: "a"},
|
||||
{URL: "b"},
|
||||
},
|
||||
Metasploits: []Metasploit{
|
||||
{Name: "a"},
|
||||
@@ -190,8 +190,8 @@ func TestScanResult_Sort(t *testing.T) {
|
||||
{AdvisoryID: "adv-2"},
|
||||
},
|
||||
Exploits: []Exploit{
|
||||
{ID: "a"},
|
||||
{ID: "b"},
|
||||
{URL: "a"},
|
||||
{URL: "b"},
|
||||
},
|
||||
Metasploits: []Metasploit{
|
||||
{Name: "a"},
|
||||
@@ -252,8 +252,8 @@ func TestScanResult_Sort(t *testing.T) {
|
||||
{AdvisoryID: "adv-1"},
|
||||
},
|
||||
Exploits: []Exploit{
|
||||
{ID: "b"},
|
||||
{ID: "a"},
|
||||
{URL: "b"},
|
||||
{URL: "a"},
|
||||
},
|
||||
Metasploits: []Metasploit{
|
||||
{Name: "b"},
|
||||
@@ -311,8 +311,8 @@ func TestScanResult_Sort(t *testing.T) {
|
||||
{AdvisoryID: "adv-2"},
|
||||
},
|
||||
Exploits: []Exploit{
|
||||
{ID: "a"},
|
||||
{ID: "b"},
|
||||
{URL: "a"},
|
||||
{URL: "b"},
|
||||
},
|
||||
Metasploits: []Metasploit{
|
||||
{Name: "a"},
|
||||
|
||||
Reference in New Issue
Block a user