s2i-nodejs-container icon indicating copy to clipboard operation
s2i-nodejs-container copied to clipboard

Clair scan vulnerability for ubi8/nodejs14

Open abhsange opened this issue 4 years ago • 0 comments

Using pretty basic Dockerfile

FROM registry.access.redhat.com/ubi8/nodejs-14:latest
USER root
RUN yum update -y nodejs-nodemon-2.0.3

However, Clair scan always report following error. Tried updating nodejs-nodemon package using various ways, however nothing is resolving issue. From investigation so far, it seems that "RHSA-2021:0549" and "RHSA-2021:0734" are related to nodejs12 hence tried to explicitly update nodejs12 using command RUN yum -y module update nodejs:12 however that also doesn't help. Any suggestion on how this issue can be resolved ?

2021/06/01 11:57:20 [WARN] ▶ Image [test:31may] contains 2 total vulnerabilities
2021/06/01 11:57:20 [ERRO] ▶ Image [test:31may] contains 2 unapproved vulnerabilities
+------------+-----------------------+----------------+--------------------------------------+-------------------------------------------------+
| STATUS     | CVE SEVERITY          | PACKAGE NAME   | PACKAGE VERSION                      | CVE DESCRIPTION                                 |
+------------+-----------------------+----------------+--------------------------------------+-------------------------------------------------+
| Unapproved | High RHSA-2021:0734   | nodejs-nodemon | 2.0.3-1.module+el8.3.0+6519+9f98ed83 | Node.js is a software development platform      |
|            |                       |                |                                      | for building fast and scalable network          |
|            |                       |                |                                      | applications in the JavaScript programming      |
|            |                       |                |                                      | language.  The following packages have          |
|            |                       |                |                                      | been upgraded to a later upstream version:      |
|            |                       |                |                                      | nodejs (12.21.0). Security Fix(es): *           |
|            |                       |                |                                      | nodejs: HTTP2 'unknownProtocol' cause DoS       |
|            |                       |                |                                      | by resource exhaustion (CVE-2021-22883)         |
|            |                       |                |                                      | * nodejs: DNS rebinding in --inspect            |
|            |                       |                |                                      | (CVE-2021-22884) For more details about the     |
|            |                       |                |                                      | security issue(s), including the impact,        |
|            |                       |                |                                      | a CVSS score, acknowledgments, and other        |
|            |                       |                |                                      | related information, refer to the CVE           |
|            |                       |                |                                      | page(s) listed in the References section.       |
|            |                       |                |                                      | https://access.redhat.com/errata/RHSA-2021:0734 |
+------------+-----------------------+----------------+--------------------------------------+-------------------------------------------------+
| Unapproved | Medium RHSA-2021:0549 | nodejs-nodemon | 2.0.3-1.module+el8.3.0+6519+9f98ed83 | Node.js is a software development platform for  |
|            |                       |                |                                      | building fast and scalable network applications |
|            |                       |                |                                      | in the JavaScript programming language.  The    |
|            |                       |                |                                      | following packages have been upgraded to a      |
|            |                       |                |                                      | later upstream version: nodejs (12.20.1),       |
|            |                       |                |                                      | nodejs-nodemon (2.0.3). Security Fix(es):       |
|            |                       |                |                                      | * nodejs-mixin-deep: prototype pollution        |
|            |                       |                |                                      | in function mixin-deep (CVE-2019-10746)         |
|            |                       |                |                                      | * nodejs-set-value: prototype pollution         |
|            |                       |                |                                      | in function set-value (CVE-2019-10747) *        |
|            |                       |                |                                      | nodejs-npm-user-validate: improper input        |
|            |                       |                |                                      | validation when validating user emails          |
|            |                       |                |                                      | leads to ReDoS (CVE-2020-7754) * nodejs-ini:    |
|            |                       |                |                                      | prototype pollution via malicious INI file      |
|            |                       |                |                                      | (CVE-2020-7788) * nodejs: use-after-free        |
|            |                       |                |                                      | in the TLS implementation (CVE-2020-8265)       |
|            |                       |                |                                      | * nodejs: HTTP request smuggling via two        |
|            |                       |                |                                      | copies of a header field in an http request     |
|            |                       |                |                                      | (CVE-2020-8287) For more details about the      |
|            |                       |                |                                      | security issue(s), including the impact,        |
|            |                       |                |                                      | a CVSS score, acknowledgments, and other        |
|            |                       |                |                                      | related information, refer to the CVE           |
|            |                       |                |                                      | page(s) listed in the References section.       |
|            |                       |                |                                      | https://access.redhat.com/errata/RHSA-2021:0549 |
+------------+-----------------------+----------------+--------------------------------------+-------------------------------------------------+
{
    "image": "test:31may",
    "unapproved": [
        "RHSA-2021:0549",
        "RHSA-2021:0734"
    ],
    "vulnerabilities": [
        {
            "featurename": "nodejs-nodemon",
            "featureversion": "2.0.3-1.module+el8.3.0+6519+9f98ed83",
            "vulnerability": "RHSA-2021:0734",
            "namespace": "centos:8",
            "description": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.  The following packages have been upgraded to a later upstream version: nodejs (12.21.0). Security Fix(es): * nodejs: HTTP2 'unknownProtocol' cause DoS by resource exhaustion (CVE-2021-22883) * nodejs: DNS rebinding in --inspect (CVE-2021-22884) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
            "link": "https://access.redhat.com/errata/RHSA-2021:0734",
            "severity": "High",
            "fixedby": "0:2.0.3-1.module+el8.3.0+9715+1718613f"
        },
        {
            "featurename": "nodejs-nodemon",
            "featureversion": "2.0.3-1.module+el8.3.0+6519+9f98ed83",
            "vulnerability": "RHSA-2021:0549",
            "namespace": "centos:8",
            "description": "Node.js is a software development platform for building fast and scalable network applications in the JavaScript programming language.  The following packages have been upgraded to a later upstream version: nodejs (12.20.1), nodejs-nodemon (2.0.3). Security Fix(es): * nodejs-mixin-deep: prototype pollution in function mixin-deep (CVE-2019-10746) * nodejs-set-value: prototype pollution in function set-value (CVE-2019-10747) * nodejs-npm-user-validate: improper input validation when validating user emails leads to ReDoS (CVE-2020-7754) * nodejs-ini: prototype pollution via malicious INI file (CVE-2020-7788) * nodejs: use-after-free in the TLS implementation (CVE-2020-8265) * nodejs: HTTP request smuggling via two copies of a header field in an http request (CVE-2020-8287) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
            "link": "https://access.redhat.com/errata/RHSA-2021:0549",
            "severity": "Medium",
            "fixedby": "0:2.0.3-1.module+el8.3.0+9715+1718613f"
        }
    ]
}%      

abhsange avatar Jun 01 '21 07:06 abhsange