-
Notifications
You must be signed in to change notification settings - Fork 513
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2015-4042 #429
Comments
https://security-tracker.debian.org/tracker/CVE-2015-4042
The coreutils version in the latest $ docker run -it --rm golang:1.18 bash
Unable to find image 'golang:1.18' locally
1.18: Pulling from library/golang
d836772a1c1f: Pull complete
66a9e63c657a: Pull complete
d1989b6e74cf: Pull complete
c28818711e1e: Pull complete
9d6246ba248c: Pull complete
59e23c1b5fe8: Pull complete
4adeeae69874: Pull complete
Digest: sha256:9349ed889adb906efa5ebc06485fe1b6a12fb265a01c9266a137bb1352565560
Status: Downloaded newer image for golang:1.18
root@582a3578a6ff:/go# apt list --installed | grep -i coreutils
WARNING: apt does not have a stable CLI interface. Use with caution in scripts.
coreutils/now 8.32-4+b1 amd64 [installed,local] See also https://github.com/docker-library/faq#why-does-my-security-scanner-show-that-an-image-has-cves A CVE doesn't imply having an actual vulnerability, and often is even a false positive (given how most distributions handle versioning/security updates in stable releases). If there are actionable items we can resolve, we're happy to do so (and do so actively). We update all Debian based images to include any updates in apt packages at least monthly (we regenerate the base images and then rebuild all dependent images). |
@wglambert /usr/local/go/pkg/tool/linux_amd64/link is the file showing with the old coreutils |
|
@yosifkit 1.18.4 still shows the issue: FROM debian:11.4-slim |
The "vulnerable" file is coming from a file from go's download (like As for the Debian package of $ docker run -it --rm --pull=always golang:1.18.4-bullseye bash
1.18.4-bullseye: Pulling from library/golang
Digest: sha256:6689996f4aa27bdb565677edd0914f8147e699a8b613e9c6623c34cce6d0eac6
Status: Image is up to date for golang:1.18.4-bullseye
root@decf0b33524d:/go# dpkg -l | grep coreutils
ii coreutils 8.32-4+b1 amd64 GNU core utilities
root@decf0b33524d:/go# |
@yosifkit do u know anyone in the go repo that can fix it? |
Unfortunately not. 😞 It seems that you already tried to let them know in golang/go#53897. I think to get anywhere, you'll need to show them that the file is just part of the released root@f08197b5db56:/# curl -fsSL https://dl.google.com/go/go1.18.5.linux-amd64.tar.gz | tar -z --list | grep -E 'link$'
go/pkg/tool/linux_amd64/link Edit: From past experience with security scanners, I'd say that it is very likely a false positive from the scanner vendor when they do their "binary" matching. |
in Aqua security scan on golang:1.18.3-bullseye
it says Installed Resource: coreutils 1.8 is affected by this CVE.
It says this is the command bringing it in:
The text was updated successfully, but these errors were encountered: