-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2021-32760 in trivy binary #1226
Labels
kind/bug
Categorizes issue or PR as related to a bug.
Comments
The container image itself also contains vulnerabilities, some of which are critical: $ podman run --rm ghcr.io/aquasecurity/trivy:0.19.2 fs --no-progress /
2021-09-14T06:14:57.874Z INFO Need to update DB
2021-09-14T06:14:57.874Z INFO Downloading DB...
2021-09-14T06:15:00.972Z INFO Detected OS: alpine
2021-09-14T06:15:00.972Z INFO Detecting Alpine vulnerabilities...
2021-09-14T06:15:00.976Z INFO Number of language-specific files: 1
2021-09-14T06:15:00.977Z INFO Detecting gobinary vulnerabilities...
d9c16c397247 (alpine 3.14.0)
============================
Total: 9 (UNKNOWN: 0, LOW: 1, MEDIUM: 3, HIGH: 2, CRITICAL: 3)
+--------------+------------------+----------+-------------------+---------------+---------------------------------------+
| LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE |
+--------------+------------------+----------+-------------------+---------------+---------------------------------------+
| apk-tools | CVE-2021-36159 | CRITICAL | 2.12.5-r1 | 2.12.6-r0 | libfetch before 2021-07-26, as |
| | | | | | used in apk-tools, xbps, and |
| | | | | | other products, mishandles... |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-36159 |
+--------------+------------------+ +-------------------+---------------+---------------------------------------+
| libcrypto1.1 | CVE-2021-3711 | | 1.1.1k-r0 | 1.1.1l-r0 | openssl: SM2 Decryption |
| | | | | | Buffer Overflow |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-3711 |
+ +------------------+----------+ + +---------------------------------------+
| | CVE-2021-3712 | HIGH | | | openssl: Read buffer overruns |
| | | | | | processing ASN.1 strings |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-3712 |
+--------------+------------------+----------+-------------------+---------------+---------------------------------------+
| libcurl | CVE-2021-22922 | MEDIUM | 7.77.0-r1 | 7.78.0-r0 | curl: Content not matching hash |
| | | | | | in Metalink is not being discarded |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-22922 |
+ +------------------+ + + +---------------------------------------+
| | CVE-2021-22923 | | | | curl: Metalink download |
| | | | | | sends credentials |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-22923 |
+ +------------------+ + + +---------------------------------------+
| | CVE-2021-22925 | | | | curl: Incorrect fix for |
| | | | | | CVE-2021-22898 TELNET |
| | | | | | stack contents disclosure |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-22925 |
+ +------------------+----------+ + +---------------------------------------+
| | CVE-2021-22924 | LOW | | | curl: Bad connection reuse |
| | | | | | due to flawed path name checks |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-22924 |
+--------------+------------------+----------+-------------------+---------------+---------------------------------------+
| libssl1.1 | CVE-2021-3711 | CRITICAL | 1.1.1k-r0 | 1.1.1l-r0 | openssl: SM2 Decryption |
| | | | | | Buffer Overflow |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-3711 |
+ +------------------+----------+ + +---------------------------------------+
| | CVE-2021-3712 | HIGH | | | openssl: Read buffer overruns |
| | | | | | processing ASN.1 strings |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-3712 |
+--------------+------------------+----------+-------------------+---------------+---------------------------------------+
usr/local/bin/trivy (gobinary)
==============================
Total: 1 (UNKNOWN: 0, LOW: 0, MEDIUM: 1, HIGH: 0, CRITICAL: 0)
+----------------------------------+------------------+----------+-------------------+----------------+---------------------------------------+
| LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE |
+----------------------------------+------------------+----------+-------------------+----------------+---------------------------------------+
| github.com/containerd/containerd | CVE-2021-32760 | MEDIUM | v1.4.4 | v1.4.8, v1.5.4 | containerd: pulling and |
| | | | | | extracting crafted container |
| | | | | | image may result in Unix file... |
| | | | | | -->avd.aquasec.com/nvd/cve-2021-32760 |
+----------------------------------+------------------+----------+-------------------+----------------+---------------------------------------+ Same with |
xeaon
added a commit
to xeaon/trivy
that referenced
this issue
Sep 17, 2021
Bump alpine baseimage to 3.14.2 to get rid of most of the vulnerabilities, except CVE-2021-32760 in `usr/local/bin/trivy (gobinary)` (ofc) This fixes aquasecurity#1226
AndreyLevchenko
added a commit
to AndreyLevchenko/trivy
that referenced
this issue
Sep 17, 2021
knqyf263
pushed a commit
that referenced
this issue
Sep 19, 2021
liamg
pushed a commit
that referenced
this issue
Jun 7, 2022
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description
Failing pipeline example
https://gitlab.com/4x0v7/yamllint/-/jobs/1572999553
What did you expect to happen?
No CVEs detected
What happened instead?
CVE-2021-32760 detected in trivy binary
Output of run with
-debug
:Output of
trivy -v
:Additional details (base image name, container registry info...):
The text was updated successfully, but these errors were encountered: