Documentation
¶
Overview ¶
Package cve202233891 implements a detector for CVE-2022-33891. To test, install a vulnerable pyspark version: python3 -m pip install pyspark==3.2.1 Run the spark-shell: spark-shell --conf spark.acls.enable=true If spark-shell crashes with an error, change your java version to an old one: sudo update-alternatives --config java (JAVA 11 works) Run this detector.
Index ¶
- Constants
- func New() detector.Detector
- type Detector
- func (d Detector) DetectedFinding() inventory.Finding
- func (Detector) Name() string
- func (Detector) RequiredExtractors() []string
- func (Detector) Requirements() *plugin.Capabilities
- func (d Detector) Scan(ctx context.Context, scanRoot *scalibrfs.ScanRoot, ...) (inventory.Finding, error)
- func (Detector) Version() int
Constants ¶
View Source
const (
// Name of the detector.
Name = "cve/cve-2022-33891"
)
Variables ¶
This section is empty.
Functions ¶
Types ¶
type Detector ¶
type Detector struct{}
Detector is a SCALIBR Detector for CVE-2022-33891.
func (Detector) DetectedFinding ¶ added in v0.3.1
DetectedFinding returns generic vulnerability information about what is detected.
func (Detector) RequiredExtractors ¶
RequiredExtractors returns the list of OS package extractors needed to detect the presence of the pyspark package in various OSes.
func (Detector) Requirements ¶
func (Detector) Requirements() *plugin.Capabilities
Requirements of the detector.
Click to show internal directories.
Click to hide internal directories.