Skip to content
This repository was archived by the owner on Apr 24, 2023. It is now read-only.
This repository was archived by the owner on Apr 24, 2023. It is now read-only.

The image has CVE #53

@igajsin

Description

@igajsin

Hi. I've tried to run the security scanner trivy against the fluent/fluent-bit image and it found multiple CVEs including critical onese.

How to reproduce

  1. Install the vulnerability scanner trivy like described here https://aquasecurity.github.io/trivy/v0.17.0/installation/
  2. Run it against an image like
trivy i --severity CRITICAL fluent/fluent-bit:1.8.11    
2022-05-23T13:32:17.936+0200    INFO    Detected OS: debian
2022-05-23T13:32:17.936+0200    INFO    Detecting Debian vulnerabilities...
2022-05-23T13:32:17.938+0200    INFO    Number of language-specific files: 0

fluent/fluent-bit:1.8.11 (debian 10.11)

Total: 4 (CRITICAL: 4)

┌─────────┬────────────────┬──────────┬───────────────────┬───────────────┬──────────────────────────────────────────────────────────────┐
│ Library │ Vulnerability  │ Severity │ Installed Version │ Fixed Version │                            Title                             │
├─────────┼────────────────┼──────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ libc6   │ CVE-2021-33574 │ CRITICAL │ 2.28-10           │               │ glibc: mq_notify does not handle separately allocated thread │
│         │                │          │                   │               │ attributes                                                   │
│         │                │          │                   │               │ https://avd.aquasec.com/nvd/cve-2021-33574                   │
├─────────┼────────────────┼──────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ libc6   │ CVE-2021-35942 │ CRITICAL │ 2.28-10           │               │ glibc: Arbitrary read in wordexp()                           │
│         │                │          │                   │               │ https://avd.aquasec.com/nvd/cve-2021-35942                   │
├─────────┼────────────────┼──────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ libc6   │ CVE-2022-23218 │ CRITICAL │ 2.28-10           │               │ glibc: Stack-based buffer overflow in svcunix_create via     │
│         │                │          │                   │               │ long pathnames                                               │
│         │                │          │                   │               │ https://avd.aquasec.com/nvd/cve-2022-23218                   │
│         ├────────────────┤          │                   ├───────────────┼──────────────────────────────────────────────────────────────┤
│         │ CVE-2022-23219 │          │                   │               │ glibc: Stack-based buffer overflow in sunrpc clnt_create via │
│         │                │          │                   │               │ a long pathname                                              │
│         │                │          │                   │               │ https://avd.aquasec.com/nvd/cve-2022-23219                   │
└─────────┴────────────────┴──────────┴───────────────────┴───────────────┴──────────────────────────────────────────────────────────────┘

Expected behavior

No CVEs (at least with HIGH or CRITICAL severity) found

Actual behavior

There are CVEs.

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions