Open ns-pmistry opened 2 weeks ago
I understand your concern about security vulnerabilities. We regularly update our images with the latest system packages; however, certain CVEs may persist until they are patched in the OS or application. Additionally, some CVEs remain unfixed due to the absence of available patches. In vulnerability scanners like Trivy, you can use the --ignore-unfixed
flag to ignore such CVEs. You can learn more about our CVE policy here.
The Bitnami Application Catalog (OpenSource) is built on Debian 12 (Debian 11 was discontinued from the public catalog a long time ago). Additionally, as part of VMware, Bitnami offers a custom container and Helm Charts catalog based on various base images, such as Debian 11 & 12, PhotonOS 5, Ubuntu 22.04 & 24.04, RedHat UBI 8 & 9, and custom golden images. You can explore these options through the VMware Tanzu Application Catalog.
For instance, in this case, the latest version contains some fixable CVEs in the Go binary itself, which is something that needs to be fixed by a new upstream release:
$ trivy image bitnami/postgres-exporter --scanners vuln --ignore-unfixed
2024-10-28T17:29:05+01:00 INFO [vuln] Vulnerability scanning is enabled
2024-10-28T17:29:12+01:00 INFO Detected OS family="debian" version="12.7"
2024-10-28T17:29:12+01:00 INFO [debian] Detecting vulnerabilities... os_version="12" pkg_num=100
2024-10-28T17:29:12+01:00 INFO Number of language-specific files num=3
2024-10-28T17:29:12+01:00 INFO [gobinary] Detecting vulnerabilities...
2024-10-28T17:29:12+01:00 INFO [bitnami] Detecting vulnerabilities...
2024-10-28T17:29:12+01:00 WARN Using severities from other vendors for some vulnerabilities. Read https://aquasecurity.github.io/trivy/v0.56/docs/scanner/vulnerability#severity-selection for details.
bitnami/postgres-exporter (debian 12.7)
Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)
2024-10-28T17:29:12+01:00 INFO Table result includes only package filenames. Use '--format json' option to get the full path to the package file.
(gobinary)
Total: 3 (UNKNOWN: 0, LOW: 0, MEDIUM: 3, HIGH: 0, CRITICAL: 0)
┌────────────────────────────────────────────────┬────────────────┬──────────┬────────┬───────────────────┬───────────────┬──────────────────────────────────────────────────────────────┐
│ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │
├────────────────────────────────────────────────┼────────────────┼──────────┼────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ golang.org/x/crypto (postgres-exporter) │ CVE-2023-48795 │ MEDIUM │ fixed │ v0.14.0 │ 0.17.0 │ ssh: Prefix truncation attack on Binary Packet Protocol │
│ │ │ │ │ │ │ (BPP) │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-48795 │
├────────────────────────────────────────────────┼────────────────┤ │ ├───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ golang.org/x/net (postgres-exporter) │ CVE-2023-45288 │ │ │ v0.17.0 │ 0.23.0 │ golang: net/http, x/net/http2: unlimited number of │
│ │ │ │ │ │ │ CONTINUATION frames causes DoS │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45288 │
├────────────────────────────────────────────────┼────────────────┤ │ ├───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ google.golang.org/protobuf (postgres-exporter) │ CVE-2024-24786 │ │ │ v1.31.0 │ 1.33.0 │ golang-protobuf: encoding/protojson, internal/encoding/json: │
│ │ │ │ │ │ │ infinite loop in protojson.Unmarshal when unmarshaling │
│ │ │ │ │ │ │ certain forms of... │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-24786 │
└────────────────────────────────────────────────┴────────────────┴──────────┴────────┴───────────────────┴───────────────┴──────────────────────────────────────────────────────────────┘
This Issue has been automatically marked as "stale" because it has not had recent activity (for 15 days). It will be closed if no further activity occurs. Thanks for the feedback.
Name and Version
bitnami/postgres-exporter:0.12.0-debian-11-r86
What architecture are you using?
None
What steps will reproduce the bug?
setup jfrog scan for docker run jf docker scan <>:<>
I'm attaching the result below
postgres-exporter-0.12.0-debian-11-r86-CVE-report.txt
These issues are blocking us to deploy in fedramp environment
What is the expected behavior?
No response
What do you see instead?
CVE attached
Additional information
No response