We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Our scanner (Trivy) is showing the following critical vulnerabilities:
Vulnerability information: +-------------+-----------+----------+-------------------+--------------------+-------------------------------------------------------------+--------------------------------------------+ | Type | Library | Severity | Installed Version | Fixed Version | Summary | More Details | +-------------+-----------+----------+-------------------+--------------------+-------------------------------------------------------------+--------------------------------------------+ | debian 12.6 | git | CRITICAL | 1:2.39.2-1.1 | 1:2.39.5-0+deb12u1 | git: Recursive clones RCE | https://avd.aquasec.com/nvd/cve-2024-32002 | | debian 12.6 | git-man | CRITICAL | 1:2.39.2-1.1 | 1:2.39.5-0+deb12u1 | git: Recursive clones RCE | https://avd.aquasec.com/nvd/cve-2024-32002 | | debian 12.6 | libexpat1 | CRITICAL | 2.5.0-1 | 2.5.0-1+deb12u1 | libexpat: Negative Length Parsing Vulnerability in libexpat | https://avd.aquasec.com/nvd/cve-2024-45490 | | debian 12.6 | libexpat1 | CRITICAL | 2.5.0-1 | 2.5.0-1+deb12u1 | libexpat: Integer Overflow or Wraparound | https://avd.aquasec.com/nvd/cve-2024-45491 | | debian 12.6 | libexpat1 | CRITICAL | 2.5.0-1 | 2.5.0-1+deb12u1 | libexpat: integer overflow | https://avd.aquasec.com/nvd/cve-2024-45492 | +-------------+-----------+----------+-------------------+--------------------+-------------------------------------------------------------+--------------------------------------------+
I think it's just a matter of rebuilding the existing image:
docker run --rm -ti robustadev/robusta-runner:0.17.0 bash root@b0c8c3d205b6:/app# apt-get update # ... apt-cache policy git git-man libexpat1 git: Installed: 1:2.39.2-1.1 Candidate: 1:2.39.5-0+deb12u1 Version table: 1:2.39.5-0+deb12u1 500 500 http://deb.debian.org/debian-security bookworm-security/main arm64 Packages *** 1:2.39.2-1.1 500 500 http://deb.debian.org/debian bookworm/main arm64 Packages 100 /var/lib/dpkg/status git-man: Installed: 1:2.39.2-1.1 Candidate: 1:2.39.5-0+deb12u1 Version table: 1:2.39.5-0+deb12u1 500 500 http://deb.debian.org/debian-security bookworm-security/main arm64 Packages *** 1:2.39.2-1.1 500 500 http://deb.debian.org/debian bookworm/main arm64 Packages 100 /var/lib/dpkg/status libexpat1: Installed: 2.5.0-1 Candidate: 2.5.0-1+deb12u1 Version table: 2.5.0-1+deb12u1 500 500 http://deb.debian.org/debian-security bookworm-security/main arm64 Packages *** 2.5.0-1 500 500 http://deb.debian.org/debian bookworm/main arm64 Packages 100 /var/lib/dpkg/status
The text was updated successfully, but these errors were encountered:
Hi 👋, thanks for opening an issue! Please note, it may take some time for us to respond, but we'll get back to you as soon as we can!
Sorry, something went wrong.
Thanks for reporting it @cmontemuino
We're releasing a new version in the next few days (hopefully today)
Hey @cmontemuino, We just released a new version 0.18.0 with those cves patched. Thanks for reporting.
No branches or pull requests
Our scanner (Trivy) is showing the following critical vulnerabilities:
Proposed Solution
I think it's just a matter of rebuilding the existing image:
The text was updated successfully, but these errors were encountered: