Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

vulnerable packages in v1.12.4-debian-1.0 #3409

Closed
airkewld opened this issue Jun 3, 2021 · 1 comment
Closed

vulnerable packages in v1.12.4-debian-1.0 #3409

airkewld opened this issue Jun 3, 2021 · 1 comment

Comments

@airkewld
Copy link

airkewld commented Jun 3, 2021

Check CONTRIBUTING guideline first and here is the list to help us investigate the problem.

Describe the bug
trivy vul scanner found vul packages

To Reproduce
trivy image --ignore-unfixed --severity HIGH,CRITICAL fluent/fluentd:v1.12.4-debian-1.0

Expected behavior
All packages included in container are free from high or critical vuls

Your Environment

managed k8s env running fluentd daemonset v1.12.4

Your Configuration

NA

Your Error Log

usr/local/bundle/gems/http_parser.rb-0.6.0/Gemfile.lock
=======================================================
Total: 6 (HIGH: 6, CRITICAL: 0)

+-----------+------------------+----------+-------------------+---------------+-----------------------------------------+
|  LIBRARY  | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION |                  TITLE                  |
+-----------+------------------+----------+-------------------+---------------+-----------------------------------------+
| ffi       | CVE-2018-1000201 | HIGH     | 1.0.11            | 1.9.24        | ruby-ffi DDL loading                    |
|           |                  |          |                   |               | issue on Windows OS                     |
|           |                  |          |                   |               | -->avd.aquasec.com/nvd/cve-2018-1000201 |
+           +                  +          +-------------------+               +                                         +
|           |                  |          | 1.0.11-java       |               |                                         |
|           |                  |          |                   |               |                                         |
|           |                  |          |                   |               |                                         |
+-----------+------------------+          +-------------------+---------------+-----------------------------------------+
| json      | CVE-2020-10663   |          | 1.8.0             | 2.3.0         | rubygem-json: Unsafe object             |
|           |                  |          |                   |               | creation vulnerability in JSON          |
|           |                  |          |                   |               | -->avd.aquasec.com/nvd/cve-2020-10663   |
+           +                  +          +-------------------+               +                                         +
|           |                  |          | 1.8.0-java        |               |                                         |
|           |                  |          |                   |               |                                         |
|           |                  |          |                   |               |                                         |
+-----------+------------------+          +-------------------+---------------+-----------------------------------------+
| rake      | CVE-2020-8130    |          | 0.9.2             | 12.3.3        | rake: OS Command Injection              |
|           |                  |          |                   |               | via egrep in Rake::FileList             |
|           |                  |          |                   |               | -->avd.aquasec.com/nvd/cve-2020-8130    |
+-----------+------------------+          +-------------------+---------------+-----------------------------------------+
| yajl-ruby | CVE-2017-16516   |          | 1.1.0             | 1.3.1         | rubygem-yajl-ruby:                      |
|           |                  |          |                   |               | Yajl::Parser.new.parse                  |
|           |                  |          |                   |               | incorrect parsing                       |
|           |                  |          |                   |               | -->avd.aquasec.com/nvd/cve-2017-16516   |
+-----------+------------------+----------+-------------------+---------------+-----------------------------------------+

Additional context

@ashie
Copy link
Member

ashie commented Jun 3, 2021

usr/local/bundle/gems/http_parser.rb-0.6.0/Gemfile.lock

This file isn't used.
See also: #3374

@ashie ashie closed this as completed Jun 3, 2021
ashie added a commit that referenced this issue Jul 8, 2021
http_parser.rb 0.6.0 includes a garbage Gemfile.lock and it causes false
positive detection by security scanning tools. 0.7.0 fixes this issue.

See also: #3374 #3409 #3437

Signed-off-by: Takuro Ashie <ashie@clear-code.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants