Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

multiple critical CVEs in the image #168

Open
ismail-bertalfilali opened this issue May 9, 2024 · 4 comments
Open

multiple critical CVEs in the image #168

ismail-bertalfilali opened this issue May 9, 2024 · 4 comments

Comments

@ismail-bertalfilali
Copy link

Hello,

We are trying to use the image grokzen/redis-cluster:7.0.10 but it contains several CVEs any plan to upgrade the packages used ? Thank you


Vulnerability Severity CVSS3 Score Package Current Version Fixed in Version Listed In CVE Allowlist
CVE-2022-1664 Critical 9.8 dpkg 1.19.7 1.19.8 No
CVE-2021-33574 Critical 9.8 libc-bin 2.28-10 2.28-10+deb10u2 No
CVE-2021-35942 Critical 9.1 libc-bin 2.28-10 2.28-10+deb10u2 No
CVE-2022-23218 Critical 9.8 libc-bin 2.28-10 2.28-10+deb10u2 No
CVE-2022-23219 Critical 9.8 libc-bin 2.28-10 2.28-10+deb10u2 No
CVE-2021-3520 Critical 9.8 liblz4-1 1.8.3-1 1.8.3-1+deb10u1 No
CVE-2022-1586 Critical 9.1 libpcre2-8-0 10.32-5 10.32-5+deb10u1 No
CVE-2022-1587 Critical 9.1 libpcre2-8-0 10.32-5 10.32-5+deb10u1 No
CVE-2021-3177 Critical 9.8 libpython2.7-minimal 2.7.16-2+deb10u1 2.7.16-2+deb10u2 No
CVE-2021-46848 Critical 9.1 libtasn1-6 4.13-3 4.13-3+deb10u1 No
CVE-2021-3177 Critical 9.8 python2.7 2.7.16-2+deb10u1 2.7.16-2+deb10u2 No
CVE-2022-37434 Critical 9.8 zlib1g 1:1.2.11.dfsg-1 1:1.2.11.dfsg-1+deb10u2 No
CVE-2022-48565 Critical 9.8 libpython2.7-minimal 2.7.16-2+deb10u1 None No
CVE-2021-20231 Critical 9.8 libgnutls30 3.6.7-4+deb10u3 3.6.7-4+deb10u7 No
CVE-2021-20232 Critical 9.8 libgnutls30 3.6.7-4+deb10u3 3.6.7-4+deb10u7 No
CVE-2021-3711 Critical 9.8 libssl1.1 1.1.1d-0+deb10u3 1.1.1d-0+deb10u7 Yes
CVE-2022-1292 Critical 9.8 libssl1.1 1.1.1d-0+deb10u3 1.1.1n-0+deb10u2 No
CVE-2022-2068 Critical 9.8 libssl1.1 1.1.1d-0+deb10u3 1.1.1n-0+deb10u3 No
CVE-2023-25775 Critical 9.8 linux-libc-dev 4.19.260-1 4.19.304-1 No
CVE-2022-1271 High 8.8 gzip 1.9-3 1.9-3+deb10u1 No
CVE-2020-1752 High 7.0 libc-bin 2.28-10 2.28-10+deb10u2 No
CVE-2020-6096 High 8.1 libc-bin 2.28-10 2.28-10+deb10u2 No
CVE-2021-3326 High 7.5 libc-bin 2.28-10 2.28-10+deb10u2 No
CVE-2021-3999 High 7.8 libc-bin 2.28-10 2.28-10+deb10u2 No
CVE-2021-43618 High 7.5 libgmp10 2:6.1.2+dfsg-4 2:6.1.2+dfsg-4+deb10u1 No
CVE-2021-20305 High 8.1 libhogweed4 3.4.1-1 3.4.1-1+deb10u1 Yes
CVE-2021-3580 High 7.5 libhogweed4 3.4.1-1 3.4.1-1+deb10u1 No
CVE-2022-1271 High 8.8 liblzma5 5.2.4-1 5.2.4-1+deb10u1 No
CVE-2021-20305 High 8.1 libnettle6 3.4.1-1 3.4.1-1+deb10u1 Yes
CVE-2021-3580 High 7.5 libnettle6 3.4.1-1 3.4.1-1+deb10u1 No
CVE-2019-20454 High 7.5 libpcre2-8-0 10.32-5 10.32-5+deb10u1 No
CVE-2015-20107 High 7.6 libpython2.7-minimal 2.7.16-2+deb10u1 2.7.16-2+deb10u2 No
CVE-2019-20907 High 7.5 libpython2.7-minimal 2.7.16-2+deb10u1 2.7.16-2+deb10u2 No
CVE-2020-26116 High 7.2 libpython2.7-minimal 2.7.16-2+deb10u1 2.7.16-2+deb10u2 No
CVE-2021-3737 High 7.5 libpython2.7-minimal 2.7.16-2+deb10u1 2.7.16-2+deb10u2 No
CVE-2022-0391 High 7.5 libpython2.7-minimal 2.7.16-2+deb10u1 None No
CVE-2022-45061 High 7.5 libpython2.7-minimal 2.7.16-2+deb10u1 2.7.16-2+deb10u2 No
CVE-2023-24329 High 7.5 libpython2.7-minimal 2.7.16-2+deb10u1 None No
CVE-2015-20107 High 7.6 libpython2.7-stdlib 2.7.16-2+deb10u1 2.7.16-2+deb10u2 No
CVE-2019-20907 High 7.5 libpython2.7-stdlib 2.7.16-2+deb10u1 2.7.16-2+deb10u2 No
CVE-2020-26116 High 7.2 libpython2.7-stdlib 2.7.16-2+deb10u1 2.7.16-2+deb10u2 No
CVE-2021-3737 High 7.5 libpython2.7-stdlib 2.7.16-2+deb10u1 2.7.16-2+deb10u2 No
CVE-2022-0391 High 7.5 libpython2.7-stdlib 2.7.16-2+deb10u1 None No
CVE-2022-45061 High 7.5 libpython2.7-stdlib 2.7.16-2+deb10u1 2.7.16-2+deb10u2 No
CVE-2023-24329 High 7.5 libpython2.7-stdlib 2.7.16-2+deb10u1 None No
@Grokzen
Copy link
Owner

Grokzen commented Jun 30, 2024

@ismail-bertalfilali A new baseimage has been used for all images and re-uploaded to docker.hub, could you please recheck the current images against your list and if the CVE list has been resolved, please close this issue

@ismail-bertalfilali
Copy link
Author

ismail-bertalfilali commented Jul 1, 2024

@Grokzen , thx for you efforts.

No critcal CVEs but there is a lot of High CVEs in this version grokzen/redis-cluster:7.2.5, we are still not allowed to use it by security departement.

Here's the data converted to a markup table format:

Vulnerability Severity CVSS3 Score Package Current Version Fixed in Version
CVE-2023-50387 High 7.5 libsystemd0 252.22-1~deb12u1 252.23-1~deb12u1
CVE-2023-50868 High 7.5 libsystemd0 252.22-1~deb12u1 252.23-1~deb12u1
CVE-2023-50387 High 7.5 libudev1 252.22-1~deb12u1 252.23-1~deb12u1
CVE-2023-50868 High 7.5 libudev1 252.22-1~deb12u1 252.23-1~deb12u1
CVE-2023-24329 High 7.5 libpython3.11-minimal 3.11.2-6 3.11.2-6+deb12u2
CVE-2023-41105 High 7.5 libpython3.11-minimal 3.11.2-6 3.11.2-6+deb12u2
CVE-2023-6597 High 7.8 libpython3.11-minimal 3.11.2-6 3.11.2-6+deb12u2
CVE-2023-24329 High 7.5 libpython3.11-stdlib 3.11.2-6 3.11.2-6+deb12u2
CVE-2023-41105 High 7.5 libpython3.11-stdlib 3.11.2-6 3.11.2-6+deb12u2
CVE-2023-6597 High 7.8 libpython3.11-stdlib 3.11.2-6 3.11.2-6+deb12u2
CVE-2024-36883 High 7.0 linux-libc-dev 6.1.90-1 6.1.94-1
CVE-2024-36886 High 7.1 linux-libc-dev 6.1.90-1 6.1.94-1
CVE-2024-36904 High 7.0 linux-libc-dev 6.1.90-1 6.1.94-1
CVE-2024-36960 High 7.1 linux-libc-dev 6.1.90-1 6.1.94-1
CVE-2024-36971 High 7.8 linux-libc-dev 6.1.90-1 6.1.94-1
CVE-2024-38667 High 7.8 linux-libc-dev 6.1.90-1 6.1.94-1
CVE-2024-39277 High 7.8 linux-libc-dev 6.1.90-1 6.1.94-1
CVE-2023-24329 High 7.5 python3.11 3.11.2-6 3.11.2-6+deb12u2
CVE-2023-41105 High 7.5 python3.11 3.11.2-6 3.11.2-6+deb12u2
CVE-2023-6597 High 7.8 python3.11 3.11.2-6 3.11.2-6+deb12u2
CVE-2023-24329 High 7.5 python3.11-minimal 3.11.2-6 3.11.2-6+deb12u2
CVE-2023-41105 High 7.5 python3.11-minimal 3.11.2-6 3.11.2-6+deb12u2
CVE-2023-6597 High 7.8 python3.11-minimal 3.11.2-6 3.11.2-6+deb12u2

@ismail-bertalfilali
Copy link
Author

@Grokzen images from redhat registry seems to be more secure rhel9/redis-7. I don't know if it is simple to switch to them ?

@Grokzen
Copy link
Owner

Grokzen commented Jul 16, 2024

Yeah i could try that image, also i see that some things really don't need to be in the image, getting python out from it could be an option as well to really push out the last few CVE:s. But i will try the mentioned image @ismail-bertalfilali

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants