🤬
  • cve-2022-0847: fixed false positives for rhel

  • Loading...
  • exploide committed 2 years ago
    47aaff99
    1 parent 8d67b81a
Revision indexing in progress... (symbol navigation in revisions will be accurate after indexed)
  • ■ ■ ■ ■ ■ ■
    cve/cve-2022-0847.sh
    skipped 65 lines
    66 66   debian)
    67 67   # get debian upstream kernel version
    68 68   kernel=$(uname -v | cut -d' ' -f4 | cut -d- -f1)
    69  - if lse_is_version_bigger "$kernel" "5.10.92"; then
    70  - # Not vulnerable
    71  - exit 1
    72  - fi
     69 + lse_is_version_bigger "$kernel" "5.10.92" && exit 1
    73 70   ;;
    74 71   ubuntu)
    75  - if lse_is_version_bigger "$kernel_distro" "5.13.0-35.39"; then
    76  - # Not vulnerable
    77  - exit 1
    78  - fi
     72 + lse_is_version_bigger "$kernel_distro" "5.13.0-35.39" && exit 1
     73 + ;;
     74 + redhat)
     75 + [ -r "/etc/os-release" ] && distro_release=$(grep -E '^VERSION_ID=' /etc/os-release | cut -f2 -d=)
     76 + kernel_package=$(lse_get_pkg_version kernel)
     77 + case "$distro_release" in
     78 + 8.1)
     79 + lse_is_version_bigger 4.18.0-147.64.1.el8_1 "$kernel_package" || exit 1
     80 + ;;
     81 + 8.2)
     82 + lse_is_version_bigger 4.18.0-193.79.1.el8_2 "$kernel_package" || exit 1
     83 + ;;
     84 + 8.4)
     85 + lse_is_version_bigger 4.18.0-305.40.2.el8_4 "$kernel_package" || exit 1
     86 + ;;
     87 + 8.*)
     88 + lse_is_version_bigger 4.18.0-348.20.1.el8_5 "$kernel_package" || exit 1
     89 + ;;
     90 + *)
     91 + lse_is_version_bigger "$distro_release" 8 && exit 1
     92 + ;;
     93 + esac
    79 94   ;;
    80 95   esac
    81 96   
    82 97   # Vulnerable
    83  - echo "$kernel_distro"
     98 + echo "Vulnerable! kernel version: $kernel_distro"
    84 99  } #)
    85 100   
    86 101  # Uncomment this line for testing the lse_cve_test function
    skipped 2 lines
Please wait...
Page is in error, reload to recover