-
Notifications
You must be signed in to change notification settings - Fork 0
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(report): update gitlab template to populate operating_system value #1
base: main
Are you sure you want to change the base?
Conversation
4c77969
to
6024306
Compare
6024306
to
a35ddbc
Compare
The existing test was updated to reflect the I did manually test against {
...
"vulnerabilities": [
{
"id": "CVE-2024-24579",
"name": "stereoscope vulnerable to tar path traversal when processing OCI tar archives",
"description": "stereoscope is a go library for processing container images and simulating a squash filesystem. Prior to version 0.0.1, it is possible to craft an OCI tar archive that, when stereoscope attempts to unarchive the contents, will result in writing to paths outside of the unarchive temporary directory. Specifically, use of `github.com/anchore/stereoscope/pkg/file.UntarToDirectory()` function, the `github.com/anchore/stereoscope/pkg/image/oci.TarballImageProvider` struct, or the higher level `github.com/anchore/stereoscope/pkg/image.Image.Read()` function express this vulnerability. As a workaround, if you are using the OCI archive as input into stereoscope then you can switch to using an OCI layout by unarchiving the tar archive and provide the unarchived directory to stereoscope.",
"severity": "Medium",
"solution": "Upgrade github.com/anchore/stereoscope to 0.0.1",
"location": {
"dependency": {
"package": {
"name": "github.com/anchore/stereoscope"
},
"version": "v0.0.0-20210817160504-0f4abc2a5a5a"
},
"operating_system": "Unknown",
"image": "syft"
},
"identifiers": [
{
"type": "cve",
"name": "CVE-2024-24579",
"value": "CVE-2024-24579",
"url": "https://avd.aquasec.com/nvd/cve-2024-24579"
}
],
"links": [{
"url": "https://github.com/anchore/stereoscope"
},{
"url": "https://github.com/anchore/stereoscope/commit/09dacab4d9ee65ee8bc7af8ebf4aa7b5aaa36204"
},{
"url": "https://github.com/anchore/stereoscope/security/advisories/GHSA-hpxr-w9w7-g4gv"
},{
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24579"
}
]
},
...
],
...
} |
94395bd
to
9954714
Compare
9954714
to
7c7c62a
Compare
Description
Update the
gitlab.tpl
container scanning template to populate thevulnerabilities[].location.operating_system
value from theTarget
. The current template extracts theimage
fromTarget
, but the OS is not used and has the value hardcoded as"operating_system": "Unknown"
. This update extracts the OS fromTarget
, if specified (simply checking for(
in theTarget
), to populate theoperating_system
value (for example"operating_system": "alpine 3.10.2"
). If not specified, the default ofUnknown
is used.Related issues
Checklist