Skip to content
This repository has been archived by the owner on Jan 27, 2023. It is now read-only.

Incorrect reporting of vulnerability against non fips package #1385

Open
navzen2000 opened this issue Jun 23, 2022 · 1 comment
Open

Incorrect reporting of vulnerability against non fips package #1385

navzen2000 opened this issue Jun 23, 2022 · 1 comment

Comments

@navzen2000
Copy link

Is this a request for help?:


Is this a BUG REPORT or a FEATURE REQUEST? (choose one):
BUG

Version of Anchore Engine and Anchore CLI if applicable:

What happened:

Anchore incorrectly reports vulnerability against non-fips packages

        "package": "libgcrypt-1.8.5-6.el8",
        "package_cpe": "None",
        "package_cpe23": "None",
        "package_name": "libgcrypt",
        "package_path": "pkgdb",
        "package_type": "rpm",
        "package_version": "1.8.5-6.el8",
        "severity": "Medium",
        "url": "https://linux.oracle.com/errata/ELSA-2022-9263.html",
        "vendor_data": [],
        "vuln": "ELSA-2022-9263",


        "package": "gnutls-3.6.16-4.el8",
        "package_cpe": "None",
        "package_cpe23": "None",
        "package_name": "gnutls",
        "package_path": "pkgdb",
        "package_type": "rpm",
        "package_version": "3.6.16-4.el8",
        "severity": "Medium",
        "url": "https://linux.oracle.com/errata/ELSA-2022-9221.html",
        "vendor_data": [],
        "vuln": "ELSA-2022-9221",
        "will_not_fix": false

These issues are meant or fips enabled packages
What did you expect to happen:

Any relevant log output from /var/log/anchore:

What docker images are you using:

How to reproduce the issue:

Anything else we need to know:

@navzen2000 navzen2000 changed the title Incorrect reporting vulnerability against non fips package Incorrect reporting of vulnerability against non fips package Jun 23, 2022
@tvierling
Copy link

The fix for this is, for packages with _fips in the version string, scanning against ELSAs for versions also containing _fips, and skipping those advisories for packages that don't have the _fips version tag.

I explained this in detail to the Trivy project here; this advice also applies to Anchore. If you have any additional questions, my contact info is in that issue comment: aquasecurity/trivy#1967 (comment)

Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants