Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

CVEs needing attention #1713

Open
DavidACastagna opened this issue Feb 23, 2024 · 3 comments
Open

CVEs needing attention #1713

DavidACastagna opened this issue Feb 23, 2024 · 3 comments

Comments

@DavidACastagna
Copy link

I will forward this to hello@kroki.io as well. But:

The latest image (at the time of this issue) has the following vulnerabilities in the kroki JAR file:

com.google.guava:guava (Recommended fix is to upgrade from 30.1-jre to 32.0.0-android):

We're also seeing the following CVE/library in the image (Might be from the base image? I can't find go anywhere in the image though. Not sure why this is showing up.):

golang.org/x/crypto (Recommended fix is to upgrade from v0.16.0 to v0.17.0):

@ggrossetie
Copy link
Member

com.google.guava:guava (Recommended fix is to upgrade from 30.1-jre to 32.0.0-android):

GHSA-7g45-4rm6-3mm3
GHSA-5mg8-w23w-74h3

Use of Java's default temporary directory for file creation in FileBackedOutputStream in Google Guava versions 1.0 to 31.1 on Unix systems

We are not using FileBackedOutputStream and we are not creating temporary directory so we are not affected by this vulnerability.

golang.org/x/crypto (Recommended fix is to upgrade from v0.16.0 to v0.17.0):

GHSA-45x7-px36-x8w8

Terrapin is a prefix truncation attack targeting the SSH protocol. More precisely, Terrapin breaks the integrity of SSH's secure channel

We are not using the SSH protocol.

@DavidACastagna
Copy link
Author

Thanks for the speedy response!

@DavidACastagna
Copy link
Author

Incidentally, the full trivy image scan for kroki 0.24.1 shows all of the following needing attention:
kroki-0.24.1.trivy.json

Is there any plan to address any of these?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants