You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
RabbitMQ image 3.9.13-management has vulnerabilities related to Go version. Based on https://groups.google.com/g/rabbitmq-users/c/KryKieu4btg/m/w7cjWp2ZAgAJ, it looks like issue is related to base OS which is used for image build.
Is it possible to update the image to resolve the vulnerabilities?
Vulnerabilities:
Summary
CVEs
Severity
Type
Provider
Component
Go net/http HTTP/2 Request Handling Memory Exhaustion Remote DoS
Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.
Go before 1.15.13 and 1.16.x before 1.16.5 has functions for DNS lookups that do not validate replies from DNS servers, and thus a return value may contain an unsafe injection (e.g., XSS) that does not conform to the RFC1035 format.
go isn't in the image, I imagine the CVE scanner is detecting gosu and extrapolating that to assume go is installed in the image
$ docker run -it --rm rabbitmq:management bashroot@95f118038daf:/# which goroot@95f118038daf:/# apt list | grep -i goWARNING: apt does not have a stable CLI interface. Use with caution in scripts.gosu/now 1.10-1ubuntu0.20.04.1 amd64 [installed,local]
A CVE doesn't imply having an actual vulnerability, and often is even a false positive (given how most distributions handle versioning/security updates in stable releases). If there are actionable items we can resolve, we're happy to do so (and do so actively). We update all Debian based images to include any updates in apt packages at least monthly (we regenerate the base images and then rebuild all dependent images).
TL;DR: The CVE's in the list that are go and golang related are likely extrapolating that since gosu is compiled with an older Go release that it might be vulnerable. You'd have to check gosu to see if it is using the vulnerable functions; like tianon/gosu#91, tianon/gosu#94, tianon/gosu#97, tianon/gosu#98, and tianon/gosu#99. So essentially they're false positives.
RabbitMQ image 3.9.13-management has vulnerabilities related to Go version. Based on https://groups.google.com/g/rabbitmq-users/c/KryKieu4btg/m/w7cjWp2ZAgAJ, it looks like issue is related to base OS which is used for image build.
Is it possible to update the image to resolve the vulnerabilities?
Vulnerabilities:
The text was updated successfully, but these errors were encountered: