Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

False positive: GHSA-g3rq-g295-4j3m (CVE-2020-28493) python3-Jinja2 in SLES 15.5 Ecosystem #1988

Open
sekveaja opened this issue Jul 11, 2024 · 4 comments
Labels
blocked Progress is being stopped by something bug Something isn't working

Comments

@sekveaja
Copy link

What happened:
Scan on image that has python3-Jinja2-2.10.1-3.10.2.noarch installed.
It generates vulnerabilities:

NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY
Jinja2 2.10.1 3.1.4 python GHSA-h75v-3vvj-5mfj Medium
Jinja2 2.10.1 3.1.3 python GHSA-h5c8-rqwp-cp95 Medium
Jinja2 2.10.1 2.11.3 python GHSA-g3rq-g295-4j3m Medium

What you expected to happen:

According to SUSE Advisory CVE-2020-28493
Patch for this CVE is applied from version python3-Jinja2-2.10.1-3.10.2

See with this link: https://www.suse.com/security/cve/CVE-2020-28493.html

 SUSE Linux Enterprise Server 15 SP5
 python3-Jinja2 >= 2.10.1-3.10.2
 Patchnames:
 SUSE Linux Enterprise Module for Basesystem 15 SP5 GA python-Jinja2-2.10.1-3.10.2

Installed version in the container: python3-Jinja2-2.10.1-3.10.2.noarch

  # rpm -qf /usr/lib/python3.6/site-packages/Jinja2-2.10.1-py3.6.egg-info/PKG-INFO
  python3-Jinja2-2.10.1-3.10.2.noarch

Conclusion: Installed version meet the minimal requirement patch from SLES 15.5 but Grype generate vulnerabilities.

How to reproduce it (as minimally and precisely as possible):

  1. Create the Dockerfile with this content:

FROM registry.suse.com/suse/sle15:15.5
ADD https://rpmfind.net/linux/opensuse/distribution/leap/15.5/repo/oss/noarch/python3-Jinja2-2.10.1-3.10.2.noarch.rpm /tmp
RUN zypper in -y --no-recommends /tmp/python3-Jinja2-2.10.1-3.10.2.noarch.rpm

ENTRYPOINT [""]
CMD ["bash"]

  1. Build an image from Dockerfile

$ docker build -t "suse15.5_python3-jinja:v1" .

  1. Test with Grype now

$ grype --distro sles:15.5 suse15.5_python3-jinja:v1

NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY
Jinja2 2.10.1 3.1.4 python GHSA-h75v-3vvj-5mfj Medium
Jinja2 2.10.1 3.1.3 python GHSA-h5c8-rqwp-cp95 Medium
Jinja2 2.10.1 2.11.3 python GHSA-g3rq-g295-4j3m Medium

Environment:
$ grype --version
grype 0.78.0

In container image eco-system:
bash-4.4$ cat /etc/release
NAME="SLES"
VERSION="15-SP5"
VERSION_ID="15.5"
PRETTY_NAME="SUSE Linux Enterprise Server 15 SP5"
ID="sles"
ID_LIKE="suse"
ANSI_COLOR="0;32"
CPE_NAME="cpe:/o:suse:sles:15:sp5"
DOCUMENTATION_URL="https://documentation.suse.com/"

@sekveaja sekveaja added the bug Something isn't working label Jul 11, 2024
@willmurphyscode
Copy link
Contributor

Hi @sekveaja this will be fixed by anchore/vunnel#626

@sekveaja
Copy link
Author

sekveaja commented Aug 6, 2024

Thanks @willmurphyscode for the update.
Would you know what is the estimated timeframe that will be implemented.

@kzantow kzantow moved this to Backlog in OSS Sep 16, 2024
@kzantow kzantow added the blocked Progress is being stopped by something label Sep 16, 2024
@kzantow
Copy link
Contributor

kzantow commented Sep 16, 2024

Blocked on anchore/vunnel#626

@willmurphyscode
Copy link
Contributor

@sekveaja - I don't have a particular time estimate right now. We just learned that SUSE also has a CSAF 2.0 vulnerability feed, and were recommended to migrate to it. We may end up switching to parsing CSAF and fixing the logic to include the "affected" (i.e. not fixed / wont fix) and not just patched/released vulnerabilities and switch parser at the same time.

The CSAF work has become more urgent because there are other providers that want to only provider the data we need in CSAF.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
blocked Progress is being stopped by something bug Something isn't working
Projects
Status: Backlog
Development

No branches or pull requests

3 participants