Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix container vulnerabilities listed on Docker Hub (v2.10.3) #9994

Closed
2 tasks done
bluepuma77 opened this issue Jun 27, 2023 · 1 comment
Closed
2 tasks done

Fix container vulnerabilities listed on Docker Hub (v2.10.3) #9994

bluepuma77 opened this issue Jun 27, 2023 · 1 comment

Comments

@bluepuma77
Copy link

Welcome!

  • Yes, I've searched similar issues on GitHub and didn't find any.
  • Yes, I've searched similar issues on the Traefik community forum and didn't find any.

What did you do?

When checking Docker Hub for Traefik, I see 10 detected vulnerabilities.

Probably just dependencies in the Dockerfile need to be upgraded, see details view.

What did you see instead?

n/a

What version of Traefik are you using?

v2.10.3

What is your environment & configuration?

n/a

If applicable, please paste the log output in DEBUG level

No response

@ldez
Copy link
Member

ldez commented Jun 27, 2023

Hello,

we are not affected by those CVEs because they affect pieces of code that we don't use.
The Consul CVE is about the Consul server but we are only using the client API.
The Docker CVEs are about the daemon and the API server, we are only using the client API.
The AWS CVEs are about AWS S3 Crypto, we are only using the DNS API.

Also, the problem related to updating a dependency because of a false positive is the impact of transitive dependencies. For example, an update of Consul can produce an update of gRPC, but gRPC is known to break things between patch/minor versions.
Any update has side effects.

We are not the only ones that complain about false positives related to vulnerability scanning tools:

The core of the problem is that vulnerability scanning tools don't share the same knowledge.
The best solution is to have a shared, free, and open-source security database with a way to report false positives.
Without a global place to report false positives, no tool that only does dependency analysis can be guaranteed without false positives.

Please be sure that we analyze all the CVEs related to Traefik and guarantee their treatment in the shortest possible time when we are impacted by them.

@ldez ldez closed this as completed Jun 27, 2023
@ldez ldez added kind/question a question and removed status/0-needs-triage labels Jun 27, 2023
@traefik traefik locked and limited conversation to collaborators Jul 28, 2023
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

No branches or pull requests

3 participants