-
Notifications
You must be signed in to change notification settings - Fork 1
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
builder-noble-java-tiny contains openssl-3.0.13 flagged with CVE-2024-5535 CVE-2024-6119 CVE-2024-4741 #37
Comments
I clicked through on the CVEs you referenced, and they are all still listed as awaiting analysis. Have you confirmed that these are patched in the latest Ubuntu Noble release? As policy states here, Paketo cannot update until Ubuntu has done so first. We will strive to push out updates for high and critical issues in 48 hours and two weeks for medium and low issues. Please also be aware that this is an OSS project. We cannot and do not have enough volunteers to take every report a scanner generates and debug it for you. If you're seeing an issue with an automated scanning report, the first thing you should do is assume that it's wrong until proven otherwise. Then investigate and confirm that it is in fact an issue. The expectation is that you will do the leg work, like making sure upstream Ubuntu has patched so that a fix is available. If you require a higher degree of help, then I would suggest looking for a paid support contract with buildpacks. I am writing this because we've had a similar conversation on another issue where the tooling you run generated false positives. I'm sympathetic because the BOM material that we generated was not very clear, but that is exactly why we ask for a manual investigation of scanner-flagged issues before reporting them to the project. Thanks |
The steps that I would suggest for someone to investigate a scanner-reported issue are:
|
Hello @dmikusa , Thank you for the writing. "I clicked through on the CVEs you referenced, and they are all still listed as awaiting analysis. Have you confirmed that these are patched in the latest Ubuntu Noble release?" NVD data is being enhanced by CISA "Then investigate and confirm that it is in fact an issue" At this point, there are engineers from 3 different companies for security analysis who took the container and confirmed the vulnerability. "I'm sympathetic because the BOM material that we generated was not very clear," One of the many companies we are working with is actually Anchore, which maintains Syft. We have the highest tier of license with them. I would like to help with the Syft issue, as it seems the way it is currently used might not be optimal. Could you please let me know what version of syft are you guys using? Do you have any specific configuration being used? (By the way, Anchore also confirmed this vulnerability is not a false positive) Thank you in advance for the answers. |
Can you provide the specific information listed in this comment? Saying it's vulnerable isn't sufficient, we need specifics in relation to the images in question. If you can answer those three questions, that should be enough. |
Check the upstream Ubuntu image. Is it also flagged? Has Ubuntu reported a fix? https://ubuntu.com/security/notices => https://ubuntu.com/security/notices/USN-6937-1 They also mentioned 3.0.13-0ubuntu3.4 should be good |
If there is a fix, has the fix been incorporated into the corresponding Paketo stack image? i.e. if check the image, has it been updated to include the fixed package? See the stack repo for details, https://github.com/paketo-buildpacks/noble-tiny-stack. => I am not sure how to check that. How can each and every buildpack users check if a fix is included in which version of which buildpack? ![]() |
With that said, this seems not to be an Ubuntu problem, but a buildpack-specific problem, where the buildpack includes two different versions of openssl, and that is possible. For instance, this is from an older example, but a vulnerable and a non-vulnerable version can exist. apt show openssl
There is one that is vulnerable, and one that is not. In total, two. |
Can you also confirm both versions are existing together please @dmikusa ? |
The release notes include the USNs that have been patched in each release. See https://github.com/paketo-buildpacks/noble-tiny-stack/releases/tag/v0.0.6 which is where USN-6937-1 was patched. |
Thank you for the answer @dmikusa . With that said, several container scan companies think there are two different files. One that is patched and safe (as you showed) another one, a second, that is vulnerable. The proof is that it is possible to have two files in one same layer, as shown here: apt show openssl
|
And if you believe it is not a "two files, one vulnerable and one not" issue, but a Syft issue, here is the issue tracker: |
Hello team,
We have many paid software programs that scan the content of the container to detect vulnerabilities.
All of our tools flag the following:
https://nvd.nist.gov/vuln/detail/CVE-2024-4741
https://nvd.nist.gov/vuln/detail/CVE-2024-6119
https://nvd.nist.gov/vuln/detail/CVE-2024-5535
Looking at the Deb/dpkg package, the vulnerable version is being confirmed.
I have verified that the binary exists in the container.
The text was updated successfully, but these errors were encountered: