-
Notifications
You must be signed in to change notification settings - Fork 615
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2024-53104 (Redhat 9.4) #2446
Comments
Hi @pkeecom thanks for the issue! I'll do some digging and get back to you. The fixed version showing in grype output is from https://access.redhat.com/errata/RHSA-2025:1262, which is listed as the RHEL 9 fix for the CVE at https://access.redhat.com/security/cve/cve-2024-53104, so I think the issue is that Grype is treating the image as regular RHEL 9, not as RHEL 9.4 EUS. |
Hi @pkeecom can you give us one bit of additional information about the image you are scanning? What are the contents of |
`cat /etc/os-release REDHAT_BUGZILLA_PRODUCT="Red Hat Enterprise Linux 9" [root@myhost~] $ cat /etc/redhat-release |
Yeah @willmurphyscode I'm fairly certain this is going to require querying and surfacing the enabled rpm repos in syft, it isn't going to be in the distro files. https://www.redhat.com/en/blog/how-update-red-hat-enterprise-linux-tvia-minor-releases-and-extended-update-support might help some I thought we had a syft issue about this. I know @wagoodman and I have discussed it many times. It might be captured some in anchore/syft#2549, but I thought there was a more specific one somewhere |
@willmurphyscode @westonsteimel I don't think there's a reliable way of determining if it is under EUS or not. We mirror repos - so it may not have the word "eus" in the repo name either. May be a setting in grype yaml or a command line option for a user to set if it is EUS or not? |
Any movement on this @willmurphyscode ? It's a bit tedious trying to add CVEs to ignore list as more and more CVEs are being flagged with every run. Is there a workaround? |
Hi @pkeecom, I'm planning to pick this up next. I like the idea of providing a config option that lets users specify that they're scanning a At present, I don't believe there's a great workaround. |
Thanks @willmurphyscode . Looking forward to the fix. |
What happened: Redhat has issued a new kernel 5.14.0-427.50.2.el9_4 which fixes the CVE
What you expected to happen: Grype should not report the issue as High on the fixed kernel
How to reproduce it (as minimally and precisely as possible): Install Kernel [kernel-headers-5.14.0-427.50.2.el9_4.x86_64.rpm]
Anything else we need to know?:
Environment:
grype version
: Latest Availablecat /etc/os-release
or similar): RHEL 9.4The text was updated successfully, but these errors were encountered: