Skip to content
This repository has been archived by the owner on Nov 1, 2022. It is now read-only.

Fix critical/high CVEs #2143

Closed
willholley opened this issue Jun 10, 2019 · 13 comments
Closed

Fix critical/high CVEs #2143

willholley opened this issue Jun 10, 2019 · 13 comments
Labels
bug build About the build or test scaffolding

Comments

@willholley
Copy link
Contributor

The flux:1.12.3 image as published on Docker Hub is currently reporting vulnerable to the following CVEs:

Vulnerability ID Severity Affected Packages How to Resolve
CVE-2019-5435 Low libcurl Upgrade libcurl to >= 7.64.0-r2
CVE-2019-5436 Low libcurl Upgrade libcurl to >= 7.64.0-r2
CVE-2019-5018 High sqlite-libs Upgrade sqlite-libs to >= 3.28.0-r0
CVE-2019-8457 Critical sqlite-libs Upgrade sqlite-libs to >= 3.28.0-r0

All issues have been addressed by the upstream packages that introduce them to the container and building the Dockerfile from source resolves the problem.

This is mostly a note to inform the changelog for the next release (assuming a patch release would be created rather than republishing under the existing tag).

@willholley willholley added blocked-needs-validation Issue is waiting to be validated before we can proceed bug labels Jun 10, 2019
@squaremo squaremo removed the blocked-needs-validation Issue is waiting to be validated before we can proceed label Jun 11, 2019
@squaremo squaremo added this to the v1.13.0 milestone Jun 11, 2019
@squaremo
Copy link
Member

Thanks for bringing this up @willholley. Maybe we should have a vulnerabilities addressed section in the changelog -- something to consider.

@squaremo
Copy link
Member

@willholley What did you use to do the scan?

@squaremo squaremo removed this from the v1.13.0 milestone Jun 13, 2019
@squaremo
Copy link
Member

(cleared the milestone so that I can close it; but we can add this info to the changelog in retrospect)

@willholley
Copy link
Contributor Author

willholley commented Jun 14, 2019

@squaremo this was using the IBM Cloud Container Registry, which automatically applies a vulnerability scan. The latest image is currently reporting no issues:

Checking security issues for 'flux:1.13.0'...

Image 'flux:1.13.0' was last scanned on Thu Jun 13 12:02:39 UTC 2019
The scan results show that NO ISSUES were found for the image.

OK

@hiddeco
Copy link
Member

hiddeco commented Jun 14, 2019

@willholley thanks for the info!

We had a scan running when we were still using Quay.io (with a notification to the maintainers), but as we had to move away from Quay.io, this is no longer in place 😞

I will put some thought into an alternative solution.

@nabadger
Copy link

nabadger commented Aug 20, 2019

@hiddeco if it's of any use, the clair-scanner project is pretty useful for this

This project builds a daily DB of vulns, so you can do it all locally via CI.

@ChipWolf
Copy link

@awh could the priority be bumped on this please?

@squaremo squaremo added the build About the build or test scaffolding label May 11, 2020
@squaremo
Copy link
Member

squaremo commented May 11, 2020

This would certainly be a useful part of the build. We don't have a prioritised list of issues to address, at present. @ChipWolf is there a specific CVE that you're hoping to see mitigated?

@geofffranks
Copy link

We're seeing a number of CVEs when scanning the latest image, all related to sqlite-libs + libcurl being out of date. Doesn't look like busybox 3.11 has newer versions of the packages available either.

CVE-2019-19646
CVE-2020-11656
CVE-2019-19317
CVE-2019-19959
CVE-2019-19926
CVE-2019-19923
CVE-2019-19880
CVE-2019-19603
CVE-2019-19925
CVE-2019-20218
CVE-2019-19924
CVE-2019-19645
CVE-2019-17595
CVE-2019-17594
CVE-2019-15601

Additionally, our scanner is flagging CIS_Docker_CE_v1.1.0 - 4.1 - image is built with to run as the root user, vs a less privileged user.

Any objections to a PR that would pull in the new libcurl/sqlite-libs from the edge repo, and set a non-root user for running flux? Are there any special privs flux needs if run as non-root?

@squaremo
Copy link
Member

Any objections to a PR that would pull in the new libcurl/sqlite-libs from the edge repo

Nope! Super helpful, thank you.

and set a non-root user for running flux

This is not so easy because of various files having to get the right permissions when mounted (I am thinking of SSH config; may also apply to GPG things). It was attempted before -- quite a while ago -- and no doubt Kubernetes etc., have moved on since then.

@yebyen
Copy link
Contributor

yebyen commented Dec 13, 2020

There are still high and medium (and low) severity reports described in #3077

From openssl/libcrypto1.1, openldap/libldap, musl/musl-utils, and curl/libcurl, according to snyk in docker scan

As of fluxcd/flux:1.21.0, which is the latest release at this time.

@kingdonb
Copy link
Member

This issue appears to have been resolved by flux v1.21.1, which also closes #3077

I think the idea of adding vulnerabilities addressed to the changelog, I could make a list from snyk scan and add the dependency addressed as an additional task for closing #3400 if there's some value in it. I think #3371 must have been the change that solved it, (while #3371 is already briefly mentioned in the release notes, the CVEs it may have addressed are not.)

I don't know if any of these would have been remotely exploitable, maybe worth a mention. Should we put scans into the release process?

@kingdonb
Copy link
Member

We can close this one now without any objections, as #3400 has closed too

@hiddeco hiddeco closed this as completed Jan 23, 2021
yebyen added a commit to kingdonb/flux that referenced this issue Feb 4, 2021
Includes a bump from Flux Daemon v1.21.0 to v1.21.1 with release notes here:

https://github.com/fluxcd/flux/blob/master/CHANGELOG.md#1211-2021-01-06

Notable changes include update from snap core18 to core20, which includes
updates that silence several CVE warnings (fluxcd#2143), and a chart fix setting the
memcached service's namespace from Release.Namespace that was omitted before.
kingdonb pushed a commit to kingdonb/flux that referenced this issue Feb 4, 2021
Includes a bump from Flux Daemon v1.21.0 to v1.21.1 with release notes here:

https://github.com/fluxcd/flux/blob/master/CHANGELOG.md#1211-2021-01-06

Notable changes include update from snap core18 to core20, which includes
updates that silence several CVE warnings (fluxcd#2143), and a chart fix setting the
memcached service's namespace from Release.Namespace that was omitted before.

Signed-off-by: Kingdon Barrett <[email protected]>
kingdonb pushed a commit to kingdonb/flux that referenced this issue Feb 4, 2021
Includes a bump from Flux Daemon v1.21.0 to v1.21.1 with release notes here:

https://github.com/fluxcd/flux/blob/master/CHANGELOG.md#1211-2021-01-06

Notable changes include update from snap core18 to core20, which includes
updates that silence several CVE warnings (fluxcd#2143), and a chart fix setting the
memcached service's namespace from Release.Namespace that was omitted before.

Signed-off-by: Kingdon Barrett <[email protected]>
kingdonb pushed a commit to kingdonb/flux that referenced this issue Feb 4, 2021
Includes a bump from Flux Daemon v1.21.0 to v1.21.1 with release notes here:

https://github.com/fluxcd/flux/blob/master/CHANGELOG.md#1211-2021-01-06

Notable changes include update from snap core18 to core20, which includes
updates that silence several CVE warnings (fluxcd#2143), and a chart fix setting the
memcached service's namespace from Release.Namespace that was omitted before.

Signed-off-by: Kingdon Barrett <[email protected]>
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
bug build About the build or test scaffolding
Projects
None yet
Development

No branches or pull requests

8 participants