fix: Patch version uplift for Docker + GRPC #2219
Closed
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Description
Related issues
Before:
10:24:03 |base|m@bl460c-9 trivy-operator ±|main|→ trivy fs .
2024-08-08T10:24:05-05:00 INFO [vuln] Vulnerability scanning is enabled
2024-08-08T10:24:05-05:00 INFO [secret] Secret scanning is enabled
2024-08-08T10:24:05-05:00 INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-08T10:24:05-05:00 INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-08T10:24:11-05:00 INFO Number of language-specific files num=1
2024-08-08T10:24:11-05:00 INFO [gomod] Detecting vulnerabilities...
go.mod (gomod)
Total: 2 (UNKNOWN: 0, LOW: 1, MEDIUM: 0, HIGH: 0, CRITICAL: 1)
┌──────────────────────────┬─────────────────────┬──────────┬────────┬─────────────────────┬─────────────────────────────────┬───────────────────────────────────────────────────────────┐
│ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │
├──────────────────────────┼─────────────────────┼──────────┼────────┼─────────────────────┼─────────────────────────────────┼───────────────────────────────────────────────────────────┤
│ github.com/docker/docker │ CVE-2024-41110 │ CRITICAL │ fixed │ 26.1.3+incompatible │ 23.0.14, 26.1.4, 27.1.0, 25.0.6 │ moby: Authz zero length regression │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-41110 │
├──────────────────────────┼─────────────────────┼──────────┤ ├─────────────────────┼─────────────────────────────────┼───────────────────────────────────────────────────────────┤
│ google.golang.org/grpc │ GHSA-xr7q-jx4m-x55m │ LOW │ │ 1.64.0 │ 1.64.1 │ Private tokens could appear in logs if context containing │
│ │ │ │ │ │ │ gRPC metadata is... │
│ │ │ │ │ │ │ GHSA-xr7q-jx4m-x55m │
└──────────────────────────┴─────────────────────┴──────────┴────────┴─────────────────────┴─────────────────────────────────┴───────────────────────────────────────────────────────────┘
After :
10:20:32 |base|m@bl460c-9 trivy-operator ±|hacks4snacks/vulnpatch ✗|→ trivy fs .
2024-08-08T10:21:05-05:00 INFO [vuln] Vulnerability scanning is enabled
2024-08-08T10:21:05-05:00 INFO [secret] Secret scanning is enabled
2024-08-08T10:21:05-05:00 INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-08T10:21:05-05:00 INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.54/docs/scanner/secret#recommendation for faster secret detection
2024-08-08T10:21:12-05:00 INFO Number of language-specific files num=1
2024-08-08T10:21:12-05:00 INFO [gomod] Detecting vulnerabilities...
No detections
Checklist