-
Notifications
You must be signed in to change notification settings - Fork 632
False positive: CVE-2021-46848 detected on patched version of libtasn #2620
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Thanks for filing the issue @dbrugman A few things come up: That container is a year old according to dockerhub. You're about 20 releases behind the latest which is v0.44.2. As a result of being old, that container is also built on an unsupported (non LTS) version of Ubuntu.
So, aside from this bug, I would recommend you update to a more modern grafana agent. v0.44.2 doesn't have this vulnerability.
... and uses a more modern (and supported) release of Ubuntu as a base.
We consider 'out of support' entries in the grype database as potentially vulnerable too. |
Hi @popey, asking for a quick clarification -- is my understanding correct that Grype marks packages from EOL versions of Linux distributions as potentially vulnerable AND that this report is is a valid false positive that should not be reported as vulnerable? |
Thanks @popey - I'm very much aware of this image being very old. We keep a large catalog of SBOMs of all our current and previous images, and scan all those SBOMs for vulnerabilities on a daily basis. The resulting data sets are normalized in a relational schema which we use for our vulnerability dashboard. As a consequence of this false positive in combination with the relational schema, now all images in our catalog that use the same version of libtasn (which would otherwise not be flagged as vulnerable by Grype) will now show up as a Critical vulnerability on our Dashboard. Anyways - thanks a lot for taking the time to look into this and the comprehensive answer. BTW:
I fully agree with this |
I feel like this would be a good vunnel / grype-db enhancement; What I'm seeing on the canonical side of this is they either have no triaged this or they've declared this EOL. Today we still write these records in but leave the version constraints blank (thus it will match with any version):
But, I agree the NVD record does have the information we need: What we should start doing is to let grype-db fill potentially missing data based off of the status of the ubuntu record (e.g. "needs-triage" or "EOL") and what we find on the NVD record (i.e. Note: the suggestion is not to do this at matching time, but instead, when writing the record into the DB. I think the hard part here is going to make certain we're selecting the CPE record from the NVD node configuration that accurately represents package described by the ubuntu record. Created anchore/grype-db#568 to encapsulate this work --there are probably more cases across more providers. |
What happened:
Vulnerability CVE-2021-46848 was detected on a Docker image. The impacted component was libtasn1-6:4.19.0-2 (deb package, Ubuntu based image). However, this vulnerability only impacts versions < 4.19.0 of this library: https://ubuntu.com/security/CVE-2021-46848#notes.
Quote: "GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der."
Note that Ubuntu classifies this as a Low priority issue, while NVD rated this as a Critical vulnerability. Since we standardize on NVD scores, this causes a Critical false positive for us.
What you expected to happen:
Since the library is not impacted I expected this not to be detected as a vulnerability.
How to reproduce it (as minimally and precisely as possible):
Run:
This will result in:
Anything else we need to know?:
n/a
Environment:
Output of
grype version
:Application: grype
Version: 0.91.1
BuildDate: 2025-04-24T21:19:59Z
GitCommit: 7bf06a8
GitDescription: v0.91.1
Platform: linux/amd64
GoVersion: go1.24.2
Compiler: gc
Syft Version: v1.23.0
Supported DB Schema: 6
OS (e.g:
cat /etc/os-release
or similar):PRETTY_NAME="Ubuntu 22.04.5 LTS"
NAME="Ubuntu"
VERSION_ID="22.04"
VERSION="22.04.5 LTS (Jammy Jellyfish)"
VERSION_CODENAME=jammy
ID=ubuntu
ID_LIKE=debian
HOME_URL="https://www.ubuntu.com/"
SUPPORT_URL="https://help.ubuntu.com/"
BUG_REPORT_URL="https://bugs.launchpad.net/ubuntu/"
PRIVACY_POLICY_URL="https://www.ubuntu.com/legal/terms-and-policies/privacy-policy"
UBUNTU_CODENAME=jammy
The text was updated successfully, but these errors were encountered: