Debian Bookworm CVE-2023-45853 in zlib 1:1.2.13.dfsg-1 has been marked as ignored, but trivy still shows it as a vulnerability #6722
Replies: 4 comments 1 reply
-
Helllo @superlazyname As you can see - we marked this vulnerability as
It seems that Trivy supports VEX. Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
-
To follow this important discussion... |
Beta Was this translation helpful? Give feedback.
-
Is it important? Why? I don't have mind reading powers so I can't really guess as to what the trivy developers or aqua security's goals are with their product, but whatever outcome they wanted, what they shipped was an easy simplification over the very complex, very judgment call heavy topic of vulnerabilities and how they are handled. Like it or not you have to trust the developers to take vulnerabilities seriously. No tool (not even trivy) can actually go into the package source code and say how well something's been fixed, or if they really fixed it in a good way, so there's no avoiding the trust you must put in the people actually doing the work (whether that work is the actual zlib developers or the distro maintainers at Debian). I'm not saying I agree with how Debian marked this as "ignored" instead of "not affected". If I were them I would have marked it as "not affected", but if the people doing the actual work want to say "this is how we get our job done", and they are an independent project, does trivy have the right to step in and impose a strategy for handling vulnerabilities? If so, why? Is it really better to have a tool that handles every distro (and its different strategies and goals), or is it better to just hear it from Debian themselves? Nobody elected trivy as the manager of Linux, it just provided an easy solution for people looking for an easy solution (no matter how wrong or right it might be). We have to do better. So on one hand, yeah, maybe Debian could have classified this bug better. On the other hand, this may be the sort of squishy human judgement call that scanners like trivy just can't handle right now, and if they're not going to try, if they're going to pretend that security is a cut and dry mathematical formula (and not just a shaky tower of judgement calls from a lot of independent, thinking humans) then maybe it's time to re-evaluate their value-add. I hope in the long run the developers of this tool don't think security is this easy. Maybe scanners like trivy are "better than nothing", as in, people not noticing vulnerabilities at all and not paying attention, and maybe it feels objective to make a scanner like this, but in reality it's still imposing judgement calls and elevating certain organizations who are part of the ecosystem over others, I don't think we should fail to acknowledge that this is picking winners and losers. It's good to make people aware of problems, I don't know if you can do that without collaborating with the distros on a level beyond just how well some automated tools can parse information that wasn't meant for bots. |
Beta Was this translation helpful? Give feedback.
-
Hello everyone, I'm seeing a "CRITICAL" alert for the Extract of the output of the command
|
Beta Was this translation helpful? Give feedback.
-
IDs
CVE-2023-45853
Description
This is related to this bug report https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1071276
Here's some additional context from the Debian maintainers in that bug report
It seems like trivy is not picking up on the CVE being ignored.
Related bug reports:
Semi-related PR from zlib repository: madler/zlib#843 (comment) -- I think the information from this comment is outdated now, though, since the Debian tracker marked this issue as "ignored".
Trivy shows the Debian security tracker as its source. Maybe there's an extra field in the REST API's response that trivy isn't handling, that would indicate that an issue has been ignored?
Similar discussions (not the same issue):
Reproduction Steps
Target
Container Image
Scanner
Vulnerability
Target OS
debian:bookworm
Debug Output
Version
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions