-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
False Positives being reported from Trivy 0.12.0 - oraclelinux:7-slim image #736
Comments
@masahiro331 Could you look into it? |
@knqyf263 I'll have a look. |
Also these vulnerabilities fixed in ksplice patch only. For example, This case.
This is the oracle security advisory.
The advisory says that OS version is Oracle linux 7 and openssl-libs version less than 2:1.0.2k-19.0.1.ksplice1.el7 will affect ELSA-2019-4754.
I am not familiar with ksplice. Thank you issues!! |
Description
Building Oracle Linux JRE8 image (https://github.com/oracle/docker-images/blob/master/OracleJava/8/Dockerfile). Post build I have scanned this image with AquaSec Trivy0.12.0 and noticed it has multiple vulnerabilities associated to it:
ELSA-2016-3515 | glibc | 2.17-317.0.1.el7 | 2:2.17-106.0.1.ksplice1.el7_2.4
CVE-2016-3075 | glibc | 2.17-317.0.1.el7 | 2:2.17-157.ksplice1.el7
CVE-2017-1000364 | glibc | 2.17-317.0.1.el7 | 2:2.17-157.ksplice1.el7_3.4
ELSA-2017-3601 | glibc | 2.17-317.0.1.el7 | 2:2.17-196.ksplice1.el7
ELSA-2018-4078 | glibc | 2.17-317.0.1.el7 | 2:2.17-222.ksplice1.el7
ELSA-2018-4266 | glibc | 2.17-317.0.1.el7 | 2:2.17-260.0.9.ksplice1.el7
ELSA-2019-4753 | glibc | 2.17-317.0.1.el7 | 2:2.17-292.0.1.ksplice1.el7
ELSA-2016-3515 | glibc-common | 2.17-317.0.1.el7 | 2:2.17-106.0.1.ksplice1.el7_2.4
CVE-2016-3075 | glibc-common | 2.17-317.0.1.el7 | 2:2.17-157.ksplice1.el7
CVE-2017-1000364 | glibc-common | 2.17-317.0.1.el7 | 2:2.17-157.ksplice1.el7_3.4
ELSA-2017-3601 | glibc-common | 2.17-317.0.1.el7 | 2:2.17-196.ksplice1.el7
ELSA-2018-4078 | glibc-common | 2.17-317.0.1.el7 | 2:2.17-222.ksplice1.el7
ELSA-2018-4266 | glibc-common | 2.17-317.0.1.el7 | 2:2.17-260.0.9.ksplice1.el7
ELSA-2019-4753 | glibc-common | 2.17-317.0.1.el7 | 2:2.17-292.0.1.ksplice1.el7
CVE-2016-0799 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.5
CVE-2016-2108 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.5
CVE-2016-2177 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.7
CVE-2016-2182 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.7
CVE-2016-2842 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.5
CVE-2016-2105 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.5
CVE-2016-2106 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.5
CVE-2016-2109 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.5
CVE-2016-2179 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.7
CVE-2016-2180 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.7
CVE-2016-2181 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.7
CVE-2016-6302 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.7
CVE-2016-6304 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.7
ELSA-2016-3523 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.4
ELSA-2018-4077 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.2k-12.0.1.ksplice1.el7
ELSA-2018-4253 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.2k-12.0.3.ksplice1.el7
ELSA-2018-4267 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.2k-16.0.1.ksplice1.el7
ELSA-2019-4581 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.2k-16.0.1.ksplice1.el7_6.1
CVE-2016-2107 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.5
CVE-2016-2178 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.7
CVE-2016-6306 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-51.ksplice1.el7_2.7
ELSA-2017-3518 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.1e-60.ksplice1.el7_3.1
ELSA-2019-4754 | openssl-libs | 1:1.0.2k-19.0.1.el7 | 2:1.0.2k-19.0.1.ksplice1.el7
Checking with Oracle:
I'm not even sure why Trivy is reporting any of those issues. They're all false positives. Also note that we do not use Ksplice for User Space inside our container images, so even the suggested fixed version is wrong here......
The text was updated successfully, but these errors were encountered: