-
Bug
-
Resolution: Duplicate
-
Undefined
-
None
-
claircore-1.5.33
-
None
-
None
-
False
-
-
False
-
-
[conftest-vulnerabilities] "warnings": [
[conftest-vulnerabilities] {
[conftest-vulnerabilities] "msg": "Found packages with high vulnerabilities. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.",
[conftest-vulnerabilities] "metadata": {
[conftest-vulnerabilities] "details": {
[conftest-vulnerabilities] "description": "Vulnerabilities found: setuptools-65.5.1 (GHSA-cx63-2mw6-8hw5)",
[conftest-vulnerabilities] "name": "clair_high_vulnerabilities",
[conftest-vulnerabilities] "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial"
[conftest-vulnerabilities] },
[conftest-vulnerabilities] "vulnerabilities_number": 1
[conftest-vulnerabilities] }
[conftest-vulnerabilities] }
[conftest-vulnerabilities] ]
GHSA-cx63-2mw6-8hw5/CVE-2024-6345 has been fixed since setuptools-65.5.1-3
podman run -ti --rm registry.redhat.io/rhel9/python-311:9.5 rpm -q --changelog python3.11-setuptools * Wed Jul 24 2024 Lumír Balhar <lbalhar@redhat.com> - 65.5.1-3 - Security fix for CVE-2024-6345 Resolves: RHEL-49992
Not sure how clair-scan knows what setuptools version is installed, but sbom says it's 65.5.1-3
[show-sbom] {
[show-sbom] "bom-ref": "pkg:rpm/rhel/python3.11-setuptools@65.5.1-3.el9?arch=noarch&upstream=python3.11-setuptools-65.5.1-3.el9.src.rpm&distro=rhel-9.5&package-id=956f80a3708936b9",
[show-sbom] "type": "library",
[show-sbom] "publisher": "Red Hat, Inc.",
[show-sbom] "name": "python3.11-setuptools",
[show-sbom] "version": "65.5.1-3.el9",
[show-sbom] "licenses": [
[show-sbom] {
[show-sbom] "license": {
[show-sbom] "name": "MIT and ASL 2.0 and (BSD or ASL 2.0) and Python"
[show-sbom] }
[show-sbom] }
[show-sbom] ],
[show-sbom] "cpe": "cpe:2.3:a:python3.11-setuptools:python3.11-setuptools:65.5.1-3.el9:*:*:*:*:*:*:*",
[show-sbom] "purl": "pkg:rpm/rhel/python3.11-setuptools@65.5.1-3.el9?arch=noarch&upstream=python3.11-setuptools-65.5.1-3.el9.src.rpm&distro=rhel-9.5",
from clair-scan log:
[conftest-vulnerabilities] {
[conftest-vulnerabilities] "msg": "Found packages with high vulnerabilities. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.",
[conftest-vulnerabilities] "metadata": {
[conftest-vulnerabilities] "details": {
[conftest-vulnerabilities] "description": "Vulnerabilities found: setuptools-53.0.0 (GHSA-cx63-2mw6-8hw5, GHSA-r9hx-vwmv-q579)",
[conftest-vulnerabilities] "name": "clair_high_vulnerabilities",
[conftest-vulnerabilities] "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial"
[conftest-vulnerabilities] },
[conftest-vulnerabilities] "vulnerabilities_number": 2
[conftest-vulnerabilities] }
[conftest-vulnerabilities] },
GHSA-r9hx-vwmv-q579/CVE-2022-40897 has been fixed since setuptools-50.0.0-12
GHSA-cx63-2mw6-8hw5/CVE-2024-6345 has been fixed since setuptools-50.0.0-13
podman run -ti --rm registry.redhat.io/rhel9/python-39:9.5 rpm -q --changelog python3-setuptools * Wed Jul 24 2024 Lumír Balhar <lbalhar@redhat.com> - 53.0.0-13 - Security fix for CVE-2024-6345 Resolves: RHEL-49978 * Wed Jan 11 2023 Charalampos Stratakis <cstratak@redhat.com> - 53.0.0-12 - Security fix for CVE-2022-40897 Resolves: rhbz#2158559
[show-sbom] "bom-ref": "pkg:rpm/rhel/python3-setuptools@53.0.0-13.el9?arch=noarch&upstream=python-setuptools-53.0.0-13.el9.src.rpm&distro=rhel-9.5&package-id=c8817cc658f037e2",
[show-sbom] "type": "library",
[show-sbom] "publisher": "Red Hat, Inc.",
[show-sbom] "name": "python3-setuptools",
[show-sbom] "version": "53.0.0-13.el9",
[show-sbom] "licenses": [
[show-sbom] {
[show-sbom] "license": {
[show-sbom] "name": "MIT and (BSD or ASL 2.0)"
[show-sbom] }
[show-sbom] }
[show-sbom] ],
[show-sbom] "cpe": "cpe:2.3:a:python3-setuptools:python3-setuptools:53.0.0-13.el9:*:*:*:*:*:*:*",
[show-sbom] "purl": "pkg:rpm/rhel/python3-setuptools@53.0.0-13.el9?arch=noarch&upstream=python-setuptools-53.0.0-13.el9.src.rpm&distro=rhel-9.5",
It's strange that the python3-setuptools is installed in the ubi9 base image, but the python-39 image is the only one where clair-scan claims it's vulnerable.
All versions of the clair-scan task have been reporting these false-positives.
I'll try to add complete logs to this ticket. Let me know what else you need. Thanks!
- depends on
-
CLAIRDEV-10 Non-RPM content "false positives"
-
- Closed
-