Closed mounchin closed 1 month ago
There are two more CVEs
Found two more CVEs
perl 5.36.0-7+deb12u1
NVD
CVE-2023-47100
Published: 2023-12-02 - Modified: 2023-12-14
CVSS v3: 9.8
Description
In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.
glibc 2.36-9+deb12u3
NVD
CVE-2023-6246
Published: 2024-01-31 - Modified: 2024-02-16
CVSS v3: 7.8
Description
A heap-based buffer overflow was found in the __vsyslog_internal function of the glibc library. This function is called by the syslog and vsyslog functions. This issue occurs when the openlog function was not called, or called with the ident argument set to NULL, and the program name (the basename of argv[0]) is bigger than 1024 bytes, resulting in an application crash or local privilege escalation. This issue affects glibc 2.36 and newer.
Please try to address them in the next release as well
I had mentioned it in https://github.com/kubernetes/node-problem-detector/issues/887#issuecomment-2031411396 but it is still not included.
Found one new high CVE finding(CVE-2024-33599
).
Total: 10 (LOW: 0, MEDIUM: 6, HIGH: 4, CRITICAL: 0)
┌──────────┬────────────────┬──────────┬────────┬───────────────────┬────────────────┬──────────────────────────────────────────────────────────────┐
│ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │
├──────────┼────────────────┼──────────┼────────┼───────────────────┼────────────────┼──────────────────────────────────────────────────────────────┤
│ libc-bin │ CVE-2024-2961 │ HIGH │ fixed │ 2.36-9+deb12u4 │ 2.36-9+deb12u6 │ glibc: Out of bounds write in iconv may lead to remote │
│ │ │ │ │ │ │ code... │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2961 │
│ ├────────────────┤ │ │ ├────────────────┼──────────────────────────────────────────────────────────────┤
│ │ CVE-2024-33599 │ │ │ │ 2.36-9+deb12u7 │ glibc: stack-based buffer overflow in netgroup cache │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33599 │
│ ├────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤
│ │ CVE-2024-33600 │ MEDIUM │ │ │ │ glibc: null pointer dereferences after failed netgroup cache │
│ │ │ │ │ │ │ insertion │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33600 │
│ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤
│ │ CVE-2024-33601 │ │ │ │ │ glibc: netgroup cache may terminate daemon on memory │
│ │ │ │ │ │ │ allocation failure │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33601 │
│ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤
│ │ CVE-2024-33602 │ │ │ │ │ glibc: netgroup cache assumes NSS callback uses in-buffer │
│ │ │ │ │ │ │ strings │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33602 │
├──────────┼────────────────┼──────────┤ │ ├────────────────┼──────────────────────────────────────────────────────────────┤
│ libc6 │ CVE-2024-2961 │ HIGH │ │ │ 2.36-9+deb12u6 │ glibc: Out of bounds write in iconv may lead to remote │
│ │ │ │ │ │ │ code... │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-2961 │
│ ├────────────────┤ │ │ ├────────────────┼──────────────────────────────────────────────────────────────┤
│ │ CVE-2024-33599 │ │ │ │ 2.36-9+deb12u7 │ glibc: stack-based buffer overflow in netgroup cache │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33599 │
│ ├────────────────┼──────────┤ │ │ ├──────────────────────────────────────────────────────────────┤
│ │ CVE-2024-33600 │ MEDIUM │ │ │ │ glibc: null pointer dereferences after failed netgroup cache │
│ │ │ │ │ │ │ insertion │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33600 │
│ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤
│ │ CVE-2024-33601 │ │ │ │ │ glibc: netgroup cache may terminate daemon on memory │
│ │ │ │ │ │ │ allocation failure │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33601 │
│ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤
│ │ CVE-2024-33602 │ │ │ │ │ glibc: netgroup cache assumes NSS callback uses in-buffer │
│ │ │ │ │ │ │ strings │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-33602 │
└──────────┴────────────────┴──────────┴────────┴───────────────────┴────────────────┴──────────────────────────────────────────────────────────────┘
@wangzhen127 any thoughts on when you could do a new release?
> trivy image --severity LOW,MEDIUM,HIGH,CRITICAL --ignore-unfixed --exit-code 3 --exit-on-eol 7 --scanners vuln gcr.io/k8s-staging-npd/node-problem-detector:master
2024-05-14T03:30:12.979+0300 INFO Vulnerability scanning is enabled
2024-05-14T03:30:22.471+0300 INFO Detected OS: debian
2024-05-14T03:30:22.472+0300 INFO Detecting Debian vulnerabilities...
2024-05-14T03:30:22.480+0300 INFO Number of language-specific files: 3
2024-05-14T03:30:22.480+0300 INFO Detecting gobinary vulnerabilities...
gcr.io/k8s-staging-npd/node-problem-detector:master (debian 12.5)
Total: 0 (LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)
I could do a release later this week.
High CVE's reported. Can we have fix for these CVE's at the earliest.
CVE-2023-45288 HIGH stdlib partner gobinary The Go Vulnerability Database https://pkg.go.dev/vuln/ CVE-2024-24788 HIGH stdlib partner gobinary The Go Vulnerability Database https://pkg.go.dev/vuln/ CVE-2024-33599 HIGH libc6 partner debian Debian Security Tracker https://salsa.debian.org/security-tracker-team/security-tracker CVE-2024-2961 HIGH libc6 partner debian Debian Security Tracker https://salsa.debian.org/security-tracker-team/security-tracker CVE-2024-33599 HIGH libc-bin partner debian Debian Security Tracker https://salsa.debian.org/security-tracker-team/security-tracker CVE-2024-2961 HIGH libc-bin partner debian Debian Security Tracker https://salsa.debian.org/security-tracker-team/security-tracker
@ankychow Could you check gcr.io/k8s-staging-npd/node-problem-detector:master ?
Closed via https://github.com/kubernetes/node-problem-detector/pull/914. Thanks @wangzhen127! /close
@hakman: Closing this issue.
Vulnerability scan shows high CVEs for version 0.8.18. This issue to request when might these get fixed.
trivy image --severity LOW,MEDIUM,HIGH,CRITICAL --ignore-unfixed --exit-code 3 --exit-on-eol 7 --scanners vuln registry.k8s.io/node-problem-detector/node-problem-detector:v0.8.18