You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Scan on image that has python3-zipp-0.6.0-150100.3.5.1.noarch installed.
It generates vulnerabilities:
NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY
zipp 0.6.0 3.19.1 python GHSA-jfmj-5v4g-7637 Medium
What you expected to happen:
There are 2 possibilities of error detection:
Issue from Syft noise
The installed package in the container is: python3-zipp-0.6.0-150100.3.5.1.noarch
When run Syft, we can see there are 2 outputs related to *zipp, e.g.
This package python311-zipp has CVE-2024-5569 fixed from version 3.15.0-150400.10.10.1
And python3-zipp has no impact on the CVE-2024-5569.
They are 2 different packages: python311 3.xx.yy-nnn ( this package in not used in the container)
python3-zip 0.6.0-xx.yy.zz-nnn (This is the one install in the container)
Probably Grype see version 0.6.0 is lower than 3.xx.yy, then issue vulnerability detection.
You can reproduce step by step, with below instruction.
How to reproduce it (as minimally and precisely as possible):
Create the Dockerfile with this content:
FROM registry.suse.com/suse/sle15:15.5
RUN zypper in -y --no-recommends python3-zipp=0.6.0-150100.3.5.1
ENTRYPOINT [""]
CMD ["bash"]
Build an image from Dockerfile
$ docker build -t "suse15.5_python3-zipp:v1" .
Verify package in the container
$ docker run -it suse15.5_python3-zipp:v1 bash
rpm -qa | grep zipp
python3-zipp-0.6.0-150100.3.5.1.noarch
Run Syft
$ syft suse15.5_python3-zipp:v1 | grep zipp
What happened:
Scan on image that has python3-zipp-0.6.0-150100.3.5.1.noarch installed.
It generates vulnerabilities:
NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY
zipp 0.6.0 3.19.1 python GHSA-jfmj-5v4g-7637 Medium
What you expected to happen:
There are 2 possibilities of error detection:
The installed package in the container is: python3-zipp-0.6.0-150100.3.5.1.noarch
When run Syft, we can see there are 2 outputs related to *zipp, e.g.
python3-zipp 0.6.0-150100.3.5.1 rpm
zipp 0.6.0 python
The extra zipp 0.6.0 output by Syft may contribute to trigger vulnerability detection.
And, it is not the package installed in the container.
According SUSE Advisory:
https://www.suse.com/security/cve/CVE-2024-5569.html
This package python311-zipp has CVE-2024-5569 fixed from version 3.15.0-150400.10.10.1
And python3-zipp has no impact on the CVE-2024-5569.
They are 2 different packages: python311 3.xx.yy-nnn ( this package in not used in the container)
python3-zip 0.6.0-xx.yy.zz-nnn (This is the one install in the container)
Probably Grype see version 0.6.0 is lower than 3.xx.yy, then issue vulnerability detection.
You can reproduce step by step, with below instruction.
How to reproduce it (as minimally and precisely as possible):
FROM registry.suse.com/suse/sle15:15.5
RUN zypper in -y --no-recommends python3-zipp=0.6.0-150100.3.5.1
ENTRYPOINT [""]
CMD ["bash"]
$ docker build -t "suse15.5_python3-zipp:v1" .
$ docker run -it suse15.5_python3-zipp:v1 bash
rpm -qa | grep zipp
python3-zipp-0.6.0-150100.3.5.1.noarch
$ syft suse15.5_python3-zipp:v1 | grep zipp
python3-zipp 0.6.0-150100.3.5.1 rpm
zipp 0.6.0 python
$ grype --distro sles:15.5 suse15.5_python3-zipp:v1 | grep zipp
zipp 0.6.0 3.19.1 python GHSA-jfmj-5v4g-7637 Medium
Environment:
$ grype --version
grype 0.79.4
In container image eco-system:
bash-4.4$ cat /etc/release
NAME="SLES"
VERSION="15-SP5"
VERSION_ID="15.5"
PRETTY_NAME="SUSE Linux Enterprise Server 15 SP5"
ID="sles"
ID_LIKE="suse"
ANSI_COLOR="0;32"
CPE_NAME="cpe:/o:suse:sles:15:sp5"
DOCUMENTATION_URL="https://documentation.suse.com/"
The text was updated successfully, but these errors were encountered: