-
Bug
-
Resolution: Duplicate
-
Undefined
-
None
-
claircore-1.5.33
-
None
-
None
-
False
-
-
False
-
-
[conftest-vulnerabilities] "warnings": [ [conftest-vulnerabilities] { [conftest-vulnerabilities] "msg": "Found packages with high vulnerabilities. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.", [conftest-vulnerabilities] "metadata": { [conftest-vulnerabilities] "details": { [conftest-vulnerabilities] "description": "Vulnerabilities found: setuptools-65.5.1 (GHSA-cx63-2mw6-8hw5)", [conftest-vulnerabilities] "name": "clair_high_vulnerabilities", [conftest-vulnerabilities] "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" [conftest-vulnerabilities] }, [conftest-vulnerabilities] "vulnerabilities_number": 1 [conftest-vulnerabilities] } [conftest-vulnerabilities] } [conftest-vulnerabilities] ]
GHSA-cx63-2mw6-8hw5/CVE-2024-6345 has been fixed since setuptools-65.5.1-3
podman run -ti --rm registry.redhat.io/rhel9/python-311:9.5 rpm -q --changelog python3.11-setuptools * Wed Jul 24 2024 Lumír Balhar <lbalhar@redhat.com> - 65.5.1-3 - Security fix for CVE-2024-6345 Resolves: RHEL-49992
Not sure how clair-scan knows what setuptools version is installed, but sbom says it's 65.5.1-3
[show-sbom] { [show-sbom] "bom-ref": "pkg:rpm/rhel/python3.11-setuptools@65.5.1-3.el9?arch=noarch&upstream=python3.11-setuptools-65.5.1-3.el9.src.rpm&distro=rhel-9.5&package-id=956f80a3708936b9", [show-sbom] "type": "library", [show-sbom] "publisher": "Red Hat, Inc.", [show-sbom] "name": "python3.11-setuptools", [show-sbom] "version": "65.5.1-3.el9", [show-sbom] "licenses": [ [show-sbom] { [show-sbom] "license": { [show-sbom] "name": "MIT and ASL 2.0 and (BSD or ASL 2.0) and Python" [show-sbom] } [show-sbom] } [show-sbom] ], [show-sbom] "cpe": "cpe:2.3:a:python3.11-setuptools:python3.11-setuptools:65.5.1-3.el9:*:*:*:*:*:*:*", [show-sbom] "purl": "pkg:rpm/rhel/python3.11-setuptools@65.5.1-3.el9?arch=noarch&upstream=python3.11-setuptools-65.5.1-3.el9.src.rpm&distro=rhel-9.5",
from clair-scan log:
[conftest-vulnerabilities] { [conftest-vulnerabilities] "msg": "Found packages with high vulnerabilities. Consider updating to a newer version of those packages, they may no longer be affected by the reported CVEs.", [conftest-vulnerabilities] "metadata": { [conftest-vulnerabilities] "details": { [conftest-vulnerabilities] "description": "Vulnerabilities found: setuptools-53.0.0 (GHSA-cx63-2mw6-8hw5, GHSA-r9hx-vwmv-q579)", [conftest-vulnerabilities] "name": "clair_high_vulnerabilities", [conftest-vulnerabilities] "url": "https://access.redhat.com/articles/red_hat_vulnerability_tutorial" [conftest-vulnerabilities] }, [conftest-vulnerabilities] "vulnerabilities_number": 2 [conftest-vulnerabilities] } [conftest-vulnerabilities] },
GHSA-r9hx-vwmv-q579/CVE-2022-40897 has been fixed since setuptools-50.0.0-12
GHSA-cx63-2mw6-8hw5/CVE-2024-6345 has been fixed since setuptools-50.0.0-13
podman run -ti --rm registry.redhat.io/rhel9/python-39:9.5 rpm -q --changelog python3-setuptools * Wed Jul 24 2024 Lumír Balhar <lbalhar@redhat.com> - 53.0.0-13 - Security fix for CVE-2024-6345 Resolves: RHEL-49978 * Wed Jan 11 2023 Charalampos Stratakis <cstratak@redhat.com> - 53.0.0-12 - Security fix for CVE-2022-40897 Resolves: rhbz#2158559
[show-sbom] "bom-ref": "pkg:rpm/rhel/python3-setuptools@53.0.0-13.el9?arch=noarch&upstream=python-setuptools-53.0.0-13.el9.src.rpm&distro=rhel-9.5&package-id=c8817cc658f037e2", [show-sbom] "type": "library", [show-sbom] "publisher": "Red Hat, Inc.", [show-sbom] "name": "python3-setuptools", [show-sbom] "version": "53.0.0-13.el9", [show-sbom] "licenses": [ [show-sbom] { [show-sbom] "license": { [show-sbom] "name": "MIT and (BSD or ASL 2.0)" [show-sbom] } [show-sbom] } [show-sbom] ], [show-sbom] "cpe": "cpe:2.3:a:python3-setuptools:python3-setuptools:53.0.0-13.el9:*:*:*:*:*:*:*", [show-sbom] "purl": "pkg:rpm/rhel/python3-setuptools@53.0.0-13.el9?arch=noarch&upstream=python-setuptools-53.0.0-13.el9.src.rpm&distro=rhel-9.5",
It's strange that the python3-setuptools is installed in the ubi9 base image, but the python-39 image is the only one where clair-scan claims it's vulnerable.
All versions of the clair-scan task have been reporting these false-positives.
I'll try to add complete logs to this ticket. Let me know what else you need. Thanks!
- depends on
-
CLAIRDEV-10 Non-RPM content "false positives"
-
- Closed
-