Closed amohit1315 closed 5 months ago
Thanks for the report - looks like it's been patched in the upstream base image.
I've rebuilt and it looks to have dealt with the HIGH's being flagged. Shout if you're still seeing issues.
Hey @alexdmoss , i did a docker pull on al3xos/python-distroless:3.10-debian11 After that i run trivy on this, but still it shows same vulnerability
amohit@bng-hb-dev-25:~$ trivy image -s=HIGH,CRITICAL al3xos/python-distroless:3.10-debian11
2024-06-21T00:35:05.262+0530 INFO Vulnerability scanning is enabled
2024-06-21T00:35:05.262+0530 INFO Secret scanning is enabled
2024-06-21T00:35:05.262+0530 INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-06-21T00:35:05.262+0530 INFO Please see also https://aquasecurity.github.io/trivy/v0.48/docs/scanner/secret/#recommendation for faster secret detection
2024-06-21T00:35:05.267+0530 INFO Detected OS: debian
2024-06-21T00:35:05.267+0530 INFO Detecting Debian vulnerabilities...
2024-06-21T00:35:05.271+0530 INFO Number of language-specific files: 1
2024-06-21T00:35:05.271+0530 INFO Detecting python-pkg vulnerabilities...
al3xos/python-distroless:3.10-debian11 (debian 11.8)
Total: 2 (HIGH: 2, CRITICAL: 0)
┌─────────┬────────────────┬──────────┬────────┬───────────────────┬──────────────────┬────────────────────────────────────────────────────────┐
│ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │
├─────────┼────────────────┼──────────┼────────┼───────────────────┼──────────────────┼────────────────────────────────────────────────────────┤
│ libc6 │ CVE-2024-2961 │ HIGH │ fixed │ 2.31-13+deb11u7 │ 2.31-13+deb11u9 │ glibc: Out of bounds write in iconv may lead to remote │
│ │ │ │ │ │ │ code... │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2961 │
│ ├────────────────┤ │ │ ├──────────────────┼────────────────────────────────────────────────────────┤
│ │ CVE-2024-33599 │ │ │ │ 2.31-13+deb11u10 │ glibc: stack-based buffer overflow in netgroup cache │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33599 │
└─────────┴────────────────┴──────────┴────────┴───────────────────┴──────────────────┴────────────────────────────────────────────────────────┘
Can you confirm i can get the latest image for python:3.10 without vulnerability from al3xos/python-distroless:3.10-debian11 ? Also i tried debug container for this, but i was not able to login into the docker image using bash. Ideally the debug containers have bash to exec into it right.
Ah it's because you're using the Python 3.10 image, which it isn't being built by the pipeline any more. Can you upgrade to 3.11 or 3.12?
Those tags are still maintained, and based on debian12.
Re. the debug container - it has busybox
in it, so a standard sh
shell rather than bash.
Sure, Thanks Alex. i can see 0 vulnerability for 3.11
Hi,
i am seeing trivy vulnerability related to libc6.
trivy --version
trivy results:
1) Will this be fixed anytime soon?? 2) Do we have a workaround on how to update libc6 in the image using multi-stage docker build. i tried
this still gives me the same trivy result.