Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

High CVEs in v0.8.18 #904

Closed
mounchin opened this issue Apr 23, 2024 · 8 comments
Closed

High CVEs in v0.8.18 #904

mounchin opened this issue Apr 23, 2024 · 8 comments

Comments

@mounchin
Copy link

Vulnerability scan shows high CVEs for version 0.8.18. This issue to request when might these get fixed.

trivy image --severity LOW,MEDIUM,HIGH,CRITICAL --ignore-unfixed --exit-code 3 --exit-on-eol 7 --scanners vuln registry.k8s.io/node-problem-detector/node-problem-detector:v0.8.18

registry.k8s.io/node-problem-detector/node-problem-detector:v0.8.18 (debian 12.5)

Total: 2 (LOW: 0, MEDIUM: 0, HIGH: 2, CRITICAL: 0)

┌──────────┬───────────────┬──────────┬────────┬───────────────────┬────────────────┬────────────────────────────────────────────────────────┐
│ Library  │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version  │                         Title                          │
├──────────┼───────────────┼──────────┼────────┼───────────────────┼────────────────┼────────────────────────────────────────────────────────┤
│ libc-bin │ CVE-2024-2961 │ HIGH     │ fixed  │ 2.36-9+deb12u4    │ 2.36-9+deb12u6 │ glibc: Out of bounds write in iconv may lead to remote │
│          │               │          │        │                   │                │ code...                                                │
│          │               │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-2961              │
├──────────┤               │          │        │                   │                │                                                        │
│ libc6    │               │          │        │                   │                │                                                        │
│          │               │          │        │                   │                │                                                        │
│          │               │          │        │                   │                │                                                        │
└──────────┴───────────────┴──────────┴────────┴───────────────────┴────────────────┴────────────────────────────────────────────────────────┘

home/kubernetes/bin/log-counter (gobinary)

Total: 1 (LOW: 0, MEDIUM: 1, HIGH: 0, CRITICAL: 0)

┌──────────────────┬────────────────┬──────────┬────────┬───────────────────┬───────────────┬────────────────────────────────────────────────────┐
│     Library      │ Vulnerability  │ Severity │ Status │ Installed Version │ Fixed Version │                       Title                        │
├──────────────────┼────────────────┼──────────┼────────┼───────────────────┼───────────────┼────────────────────────────────────────────────────┤
│ golang.org/x/net │ CVE-2023-45288 │ MEDIUM   │ fixed  │ v0.22.0           │ 0.23.0        │ golang: net/http, x/net/http2: unlimited number of │
│                  │                │          │        │                   │               │ CONTINUATION frames causes DoS                     │
│                  │                │          │        │                   │               │ https://avd.aquasec.com/nvd/cve-2023-45288         │
└──────────────────┴────────────────┴──────────┴────────┴───────────────────┴───────────────┴────────────────────────────────────────────────────┘

node-problem-detector (gobinary)

Total: 1 (LOW: 0, MEDIUM: 1, HIGH: 0, CRITICAL: 0)

┌──────────────────┬────────────────┬──────────┬────────┬───────────────────┬───────────────┬────────────────────────────────────────────────────┐
│     Library      │ Vulnerability  │ Severity │ Status │ Installed Version │ Fixed Version │                       Title                        │
├──────────────────┼────────────────┼──────────┼────────┼───────────────────┼───────────────┼────────────────────────────────────────────────────┤
│ golang.org/x/net │ CVE-2023-45288 │ MEDIUM   │ fixed  │ v0.22.0           │ 0.23.0        │ golang: net/http, x/net/http2: unlimited number of │
│                  │                │          │        │                   │               │ CONTINUATION frames causes DoS                     │
│                  │                │          │        │                   │               │ https://avd.aquasec.com/nvd/cve-2023-45288         │
└──────────────────┴────────────────┴──────────┴────────┴───────────────────┴───────────────┴────────────────────────────────────────────────────┘
@rishabh-11
Copy link

There are two more CVEs

Found two more CVEs

perl 5.36.0-7+deb12u1

NVD
CVE-2023-47100
Published: 2023-12-02 - Modified: 2023-12-14
CVSS v3: 9.8
Description
In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.


glibc 2.36-9+deb12u3

NVD
CVE-2023-6246
Published: 2024-01-31 - Modified: 2024-02-16
CVSS v3: 7.8
Description
A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.
Please try to address them in the next release as well

I had mentioned it in #887 (comment) but it is still not included.

@mounchin
Copy link
Author

mounchin commented May 6, 2024

Found one new high CVE finding(CVE-2024-33599).

Total: 10 (LOW: 0, MEDIUM: 6, HIGH: 4, CRITICAL: 0)

┌──────────┬────────────────┬──────────┬────────┬───────────────────┬────────────────┬──────────────────────────────────────────────────────────────┐
│ Library  │ Vulnerability  │ Severity │ Status │ Installed Version │ Fixed Version  │                            Title                             │
├──────────┼────────────────┼──────────┼────────┼───────────────────┼────────────────┼──────────────────────────────────────────────────────────────┤
│ libc-bin │ CVE-2024-2961  │ HIGH     │ fixed  │ 2.36-9+deb12u4    │ 2.36-9+deb12u6 │ glibc: Out of bounds write in iconv may lead to remote       │
│          │                │          │        │                   │                │ code...                                                      │
│          │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-2961                    │
│          ├────────────────┤          │        │                   ├────────────────┼──────────────────────────────────────────────────────────────┤
│          │ CVE-2024-33599 │          │        │                   │ 2.36-9+deb12u7 │ glibc: stack-based buffer overflow in netgroup cache         │
│          │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-33599                   │
│          ├────────────────┼──────────┤        │                   │                ├──────────────────────────────────────────────────────────────┤
│          │ CVE-2024-33600 │ MEDIUM   │        │                   │                │ glibc: null pointer dereferences after failed netgroup cache │
│          │                │          │        │                   │                │ insertion                                                    │
│          │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-33600                   │
│          ├────────────────┤          │        │                   │                ├──────────────────────────────────────────────────────────────┤
│          │ CVE-2024-33601 │          │        │                   │                │ glibc: netgroup cache may terminate daemon on memory         │
│          │                │          │        │                   │                │ allocation failure                                           │
│          │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-33601                   │
│          ├────────────────┤          │        │                   │                ├──────────────────────────────────────────────────────────────┤
│          │ CVE-2024-33602 │          │        │                   │                │ glibc: netgroup cache assumes NSS callback uses in-buffer    │
│          │                │          │        │                   │                │ strings                                                      │
│          │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-33602                   │
├──────────┼────────────────┼──────────┤        │                   ├────────────────┼──────────────────────────────────────────────────────────────┤
│ libc6    │ CVE-2024-2961  │ HIGH     │        │                   │ 2.36-9+deb12u6 │ glibc: Out of bounds write in iconv may lead to remote       │
│          │                │          │        │                   │                │ code...                                                      │
│          │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-2961                    │
│          ├────────────────┤          │        │                   ├────────────────┼──────────────────────────────────────────────────────────────┤
│          │ CVE-2024-33599 │          │        │                   │ 2.36-9+deb12u7 │ glibc: stack-based buffer overflow in netgroup cache         │
│          │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-33599                   │
│          ├────────────────┼──────────┤        │                   │                ├──────────────────────────────────────────────────────────────┤
│          │ CVE-2024-33600 │ MEDIUM   │        │                   │                │ glibc: null pointer dereferences after failed netgroup cache │
│          │                │          │        │                   │                │ insertion                                                    │
│          │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-33600                   │
│          ├────────────────┤          │        │                   │                ├──────────────────────────────────────────────────────────────┤
│          │ CVE-2024-33601 │          │        │                   │                │ glibc: netgroup cache may terminate daemon on memory         │
│          │                │          │        │                   │                │ allocation failure                                           │
│          │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-33601                   │
│          ├────────────────┤          │        │                   │                ├──────────────────────────────────────────────────────────────┤
│          │ CVE-2024-33602 │          │        │                   │                │ glibc: netgroup cache assumes NSS callback uses in-buffer    │
│          │                │          │        │                   │                │ strings                                                      │
│          │                │          │        │                   │                │ https://avd.aquasec.com/nvd/cve-2024-33602                   │
└──────────┴────────────────┴──────────┴────────┴───────────────────┴────────────────┴──────────────────────────────────────────────────────────────┘

@hakman
Copy link
Member

hakman commented May 14, 2024

#908 should fix all known issues.
@wangzhen127 any thoughts on when you could do a new release?

> trivy image --severity LOW,MEDIUM,HIGH,CRITICAL --ignore-unfixed --exit-code 3 --exit-on-eol 7 --scanners vuln gcr.io/k8s-staging-npd/node-problem-detector:master          
2024-05-14T03:30:12.979+0300	INFO	Vulnerability scanning is enabled
2024-05-14T03:30:22.471+0300	INFO	Detected OS: debian
2024-05-14T03:30:22.472+0300	INFO	Detecting Debian vulnerabilities...
2024-05-14T03:30:22.480+0300	INFO	Number of language-specific files: 3
2024-05-14T03:30:22.480+0300	INFO	Detecting gobinary vulnerabilities...

gcr.io/k8s-staging-npd/node-problem-detector:master (debian 12.5)

Total: 0 (LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

@wangzhen127
Copy link
Member

I could do a release later this week.

@ankychow
Copy link

High CVE's reported. Can we have fix for these CVE's at the earliest.

CVE-2023-45288 HIGH stdlib partner gobinary The Go Vulnerability Database https://pkg.go.dev/vuln/
CVE-2024-24788 HIGH stdlib partner gobinary The Go Vulnerability Database https://pkg.go.dev/vuln/
CVE-2024-33599 HIGH libc6 partner debian Debian Security Tracker https://salsa.debian.org/security-tracker-team/security-tracker
CVE-2024-2961 HIGH libc6 partner debian Debian Security Tracker https://salsa.debian.org/security-tracker-team/security-tracker
CVE-2024-33599 HIGH libc-bin partner debian Debian Security Tracker https://salsa.debian.org/security-tracker-team/security-tracker
CVE-2024-2961 HIGH libc-bin partner debian Debian Security Tracker https://salsa.debian.org/security-tracker-team/security-tracker

@hakman
Copy link
Member

hakman commented May 17, 2024

@ankychow Could you check gcr.io/k8s-staging-npd/node-problem-detector:master ?

@hakman
Copy link
Member

hakman commented May 18, 2024

Closed via #914. Thanks @wangzhen127!
/close

@k8s-ci-robot
Copy link
Contributor

@hakman: Closing this issue.

In response to this:

Closed via #914. Thanks @wangzhen127!
/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

6 participants