-
Notifications
You must be signed in to change notification settings - Fork 67
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Numerous security vulnerability when the image is sanned #52
Comments
@mbiarnes any guidance is highly appreciated |
@NeelabhKher All deps are coming from wars. These wars (with deps) are downloaded from kiegroups/ to create the docker images. |
This impacts us still 7.55.0 version and being flagged by X-Ray Vulnerability Scanning. |
Does it even impact the 7.56 version ? |
Yes still impacts the 7.56 version. I'm thinking it's something with the current Wildfly version used. |
thanks for information |
Any update on this one ? |
@NeelabhKher HI - I would scan again. Because I think many version have been updated in the meantime. |
In my use case, this is getting scanned against JFrog X-Ray vulnerability scanning. Here are the critical issues that pop up. CVE-2016-2141 Critical | CVE-2016-2141 | org.jgroups:jgroups:3.3.4.Final This was ran on version 7.62 on the image available from Quay |
@NeelabhKher @mpsz76 Hi, would be nice if you guys can advise which versions have no vulnerability. |
In my situation, the company did not scan intranet applications until January 2021. Currently, on 7.37 which was not scanned. The first scan was on 7.54 which has the same vulnerabilities as listed above. |
I need help with security vulnerabilities . We ran scan with Aqua Sec SaaS offering on the latest Image on Docker : https://hub.docker.com/r/jboss/kie-server-showcase/tags?page=1&ordering=last_updated and below are the detailed finding for Security vulnerabilities.
infinispan-core 9.4.18.Final.
Installed Resource
unboundid-ldapsdk 3.2.0
Published by NVD
2018-03-16
4.CVE-2019-20445 : HttpObjectDecoder.java in Netty before 4.1.44 allows a Content-Length header to be accompanied by a second Content-Length header, or by a Transfer-Encoding header. Installed Resource netty 3.10.6.Final.
7.CVE-2019-20444: HttpObjectDecoder.java in Netty before 4.1.44 allows an HTTP header that lacks a colon, which might be interpreted as a separate header with an incorrect syntax, or might be interpreted as an "invalid fold.".Installed Resource
netty 3.10.6.Final. This applicable to lucene core, lucene-queryparser 6.6.1 and
Any direction to mitigate them or mitigate in next release will be help ful.
The text was updated successfully, but these errors were encountered: