Skip to content
This repository has been archived by the owner on Apr 24, 2023. It is now read-only.

The image has CVE #53

Open
igajsin opened this issue May 23, 2022 · 3 comments
Open

The image has CVE #53

igajsin opened this issue May 23, 2022 · 3 comments

Comments

@igajsin
Copy link

igajsin commented May 23, 2022

Hi. I've tried to run the security scanner trivy against the fluent/fluent-bit image and it found multiple CVEs including critical onese.

How to reproduce

  1. Install the vulnerability scanner trivy like described here https://aquasecurity.github.io/trivy/v0.17.0/installation/
  2. Run it against an image like
trivy i --severity CRITICAL fluent/fluent-bit:1.8.11    
2022-05-23T13:32:17.936+0200    INFO    Detected OS: debian
2022-05-23T13:32:17.936+0200    INFO    Detecting Debian vulnerabilities...
2022-05-23T13:32:17.938+0200    INFO    Number of language-specific files: 0

fluent/fluent-bit:1.8.11 (debian 10.11)

Total: 4 (CRITICAL: 4)

┌─────────┬────────────────┬──────────┬───────────────────┬───────────────┬──────────────────────────────────────────────────────────────┐
│ Library │ Vulnerability  │ Severity │ Installed Version │ Fixed Version │                            Title                             │
├─────────┼────────────────┼──────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ libc6   │ CVE-2021-33574 │ CRITICAL │ 2.28-10           │               │ glibc: mq_notify does not handle separately allocated thread │
│         │                │          │                   │               │ attributes                                                   │
│         │                │          │                   │               │ https://avd.aquasec.com/nvd/cve-2021-33574                   │
├─────────┼────────────────┼──────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ libc6   │ CVE-2021-35942 │ CRITICAL │ 2.28-10           │               │ glibc: Arbitrary read in wordexp()                           │
│         │                │          │                   │               │ https://avd.aquasec.com/nvd/cve-2021-35942                   │
├─────────┼────────────────┼──────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ libc6   │ CVE-2022-23218 │ CRITICAL │ 2.28-10           │               │ glibc: Stack-based buffer overflow in svcunix_create via     │
│         │                │          │                   │               │ long pathnames                                               │
│         │                │          │                   │               │ https://avd.aquasec.com/nvd/cve-2022-23218                   │
│         ├────────────────┤          │                   ├───────────────┼──────────────────────────────────────────────────────────────┤
│         │ CVE-2022-23219 │          │                   │               │ glibc: Stack-based buffer overflow in sunrpc clnt_create via │
│         │                │          │                   │               │ a long pathname                                              │
│         │                │          │                   │               │ https://avd.aquasec.com/nvd/cve-2022-23219                   │
└─────────┴────────────────┴──────────┴───────────────────┴───────────────┴──────────────────────────────────────────────────────────────┘

Expected behavior

No CVEs (at least with HIGH or CRITICAL severity) found

Actual behavior

There are CVEs.

@edsiper
Copy link
Member

edsiper commented May 26, 2022 via email

@edsiper
Copy link
Member

edsiper commented May 27, 2022 via email

@igajsin
Copy link
Author

igajsin commented Jun 9, 2022

OK, the latest image looks much better, no critical CVEs: https://pastebin.com/PwyiFP6A

Probably can close the issue.

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants