-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Velero image vulnerability fix #8436
Comments
Unless we switch to a different run image, no. And in fact, these are false postives.
Fixed 3.0.2-0ubuntu1.17, this image uses
Fixed 3.0.2-0ubuntu1.5 this image uses
Fixed 3.0.2-0ubuntu1.1, this image uses The latest jammy:v0.2.55 also contain similar false positives. |
bumping to latest jammy:v0.2.55 also would not increase openssl version beyond current image.. |
We used the "bom-ref": "pkg:deb/ubuntu/[email protected]?arch=amd64&upstream=openssl&distro=ubuntu-22.04&package-id=5f2fab720655414a",
"type": "library",
"publisher": "Ubuntu Developers <[email protected]>",
"name": "libssl-dev",
"version": "3.0.2-0ubuntu1.18",
"licenses": [
{ "license": { "id": "Apache-2.0" } },
{ "license": { "id": "GPL-1.0-only" } },
{ "license": { "id": "GPL-1.0-or-later" } },
{ "license": { "name": "Artistic" } }
],
"cpe": "cpe:2.3:a:libssl-dev:libssl-dev:3.0.2-0ubuntu1.18:*:*:*:*:*:*:*",
"purl": "pkg:deb/ubuntu/[email protected]?arch=amd64&upstream=openssl&distro=ubuntu-22.04", |
grype correctly detected 3.0.2-0ubuntu1.18 as shown in user output above. |
I think there are enhancements to be done for jammy to eliminate this false positive. |
@kaovilai after the enhancements from jammy, velero will also need to be updated with jammy's new image ? |
Yes but I'm not sure if they'll ever do it cause it'll increase image size and only accommodates one scanner that you used. Other scanners were said to be smarter and do not have this issue. |
@dbebarta in the meantime, try use snyk instead. It does not contain false positives like grype.
Please also track grype fix at anchore/grype#520 |
The new image of velero has high vulnerabilties of openssl
Can we try to fix them and generate a new image?
The text was updated successfully, but these errors were encountered: