Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

False positive: GHSA-9w8r-397f-prfh (CVE-2021-20270), GHSA-pq64-v7f5-gqh8 (CVE-2021-27291), GHSA-mrwq-x4v8-fh7p (CVE-2022-40896) python3-Pygments in SLES 15.5 #1875

Open
sekveaja opened this issue May 22, 2024 · 0 comments
Labels
bug Something isn't working false-positive

Comments

@sekveaja
Copy link

sekveaja commented May 22, 2024

What happened:
Scan on image that has python3-Pygments-2.6.1-4.3.1.noarch installed.
It generates high vulnerability:

{
"vulnerability": {
"id": "GHSA-9w8r-397f-prfh",
"dataSource": "GHSA-9w8r-397f-prfh",
"namespace": "github:language:python",
"severity": "High",
"urls": [
"https://github.com/advisories/GHSA-9w8r-397f-prfh"
],

:
:
"relatedVulnerabilities": [
{
"id": "CVE-2021-20270",
"dataSource": "https://nvd.nist.gov/vuln/detail/CVE-2021-20270",
"namespace": "nvd:cpe",
"severity": "High",
"urls": [
"https://bugzilla.redhat.com/show_bug.cgi?id=1922136",
"https://lists.debian.org/debian-lts-announce/2021/05/msg00003.html",
"https://lists.debian.org/debian-lts-announce/2021/05/msg00006.html",
"https://www.debian.org/security/2021/dsa-4889",
"https://www.oracle.com/security-alerts/cpuoct2021.html"
],
"description": "An infinite loop in SMLLexer in Pygments versions 1.5 to 2.7.3 may lead to denial of service when performing syntax highlighting of a Standard ML (SML) source file, as demonstrated by input that only contains the "exception" keyword.",

:
:

"artifact": {
"id": "bce8ec0e0a965ed7",
"name": "Pygments",
"version": "2.6.1",
"type": "python",
"locations": [
{
"path": "/usr/lib/python3.6/site-packages/Pygments-2.6.1-py3.6.egg-info/PKG-INFO",
"layerID": "sha256:4bfdb8762be5511b925a34075857d0a0ba0849de7f77ab71b52e15e482cc2b86"
},

"cvss": [

What you expected to happen:

According to SUSE Advisory:
https://www.suse.com/security/cve/CVE-2021-20270.html

SUSE Linux Enterprise Server 15 SP5
python3-Pygments >= 2.6.1-4.3.1
Patchnames:
SUSE Linux Enterprise Module for Basesystem 15 SP5 GA python3-Pygments-2.6.1-4.3.1

Installed version in the container:

rpm -qa | grep python

python3-Pygments-2.6.1-4.3.1.noarch

Conclusion: Installed version meet minimum requirement patch from SLES 15.5 but Grype generate a vulnerability.
Therefore, it is a false positive.

How to reproduce it (as minimally and precisely as possible):

1)Create the Dockerfile with this content:

FROM registry.suse.com/suse/sle15:15.5
RUN zypper in -y --no-recommends python3-Pygments=2.6.1-4.3.1
ENTRYPOINT [""]
CMD ["bash"]

  1. Build an image from Dockerfile

docker build -t "suse15.5_test:v1" .
docker run -it suse15.5_test:v1 bash

e22c80017ab7:/ # rpm -qa | grep -i pygment
python3-Pygments-2.6.1-4.3.1.noarch

  1. Test with Grype

$ grype --distro sles15.5 suse15.5_python-pygment:v1
NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY
Pygments 2.6.1 2.7.4 python GHSA-pq64-v7f5-gqh8 High
Pygments 2.6.1 2.7.4 python GHSA-9w8r-397f-prfh High
Pygments 2.6.1 2.15.0 python GHSA-mrwq-x4v8-fh7p Medium

Anything else we need to know?:

Environment:
$ grype --version
grype 0.76.0

In container image eco-system:
bash-4.4$ cat /etc/release

NAME="SLES"
VERSION="15-SP5"
VERSION_ID="15.5"
PRETTY_NAME="SUSE Linux Enterprise Server 15 SP5"
ID="sles"
ID_LIKE="suse"
ANSI_COLOR="0;32"
CPE_NAME="cpe:/o:suse:sles:15:sp5"
DOCUMENTATION_URL="https://documentation.suse.com/"

@sekveaja sekveaja added the bug Something isn't working label May 22, 2024
@sekveaja sekveaja changed the title False positive: GHSA-9w8r-397f-prfh (CVE-2021-20270) in SLES 15.5 False positive: GHSA-9w8r-397f-prfh (CVE-2021-20270), GHSA-pq64-v7f5-gqh8 (CVE-2021-27291) in SLES 15.5 May 22, 2024
@sekveaja sekveaja changed the title False positive: GHSA-9w8r-397f-prfh (CVE-2021-20270), GHSA-pq64-v7f5-gqh8 (CVE-2021-27291) in SLES 15.5 False positive: GHSA-9w8r-397f-prfh (CVE-2021-20270), GHSA-pq64-v7f5-gqh8 (CVE-2021-27291) python3-Pygments in SLES 15.5 Jun 25, 2024
@sekveaja sekveaja changed the title False positive: GHSA-9w8r-397f-prfh (CVE-2021-20270), GHSA-pq64-v7f5-gqh8 (CVE-2021-27291) python3-Pygments in SLES 15.5 False positive: GHSA-9w8r-397f-prfh (CVE-2021-20270), GHSA-pq64-v7f5-gqh8 (CVE-2021-27291), GHSA-mrwq-x4v8-fh7p (CVE-2022-40896) python3-Pygments in SLES 15.5 Jun 25, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working false-positive
Projects
Status: No status
Development

No branches or pull requests

2 participants