-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Critical & High Security vulnerability issue with Trivy Scan in postgres 16 #1297
Comments
See #1295 (comment) |
While I completely agree that the root cause here is the naive "security scanners" inability to delve into the details and work out if there is a real vulnerability, the reality is that this is where many of these tools are at the moment. One such "naive" scanner is Docker Scout. A glance at the Docker Hub tags page for this image lights up like a Christmas tree with High and Critical (all of which I believe are false positive): As an image that is part of the Docker Official Image which is supposed to serve as the starting point for the majority of users, is it realistic to expect users to know they need to delve into The Docker Official Image page goes on to say:
So there's a certain expectation being built up here, which is at odds with what users see via the Docker Scout output. While it certainly seems true that these reports are false positive, that's not the perception people will get from what is arguably the primary location people will be picking this image up from (Docker Hub). Granted the Docker FAQ entry Why does my security scanner show that an image has CVEs? does say:
Is there a way to prod Docker Scout to be smarter or otherwise mark false positives there? |
I agree about false positive but my Org doesn't. They kept publishing as a Vul and asked me to fix before we put it in Prod. |
Thanks for your workaround. I agree that our companies vuln policies are stricter and it takes unnecessary resources if everybody have to assess false positives all the time. If possible, could you:
|
Hi Team,
Postgres 16.x and 17.x has some Critical and high vulnerability reported. Can you confirm if there are any fixes planned in pipelines or these issues are false positive.
Thanks.
Postgres 17.2:
Postgres 16.6:
The text was updated successfully, but these errors were encountered: