You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
SUSE Linux Enterprise Server 15 SP5 and SLES 15 SP6
python311-gunicorn >= 20.1.0-150400.12.6.1
Patchnames:
SUSE-SLE-Module-Python3-15-SP5-2024-1440
SUSE Linux Enterprise Module for Python 3 15 SP6 GA python311-gunicorn-20.1.0-150400.12.6.1
We are using the right version that comply with SUSE recommendation.
Therefore, this CVE is a FP as Grype does not recognize the patch from SUSE.
This is due to syft output where every python package, Syft generates 2 entries.
First, is the base version and second is the backport from the OS provider.
This is Syft output:
gunicorn 20.1.0 python
python311-gunicorn 20.1.0-150400.12.6.1 rpm
How to reproduce it (as minimally and precisely as possible):
What happened:
Scan on image that has python311-gunicorn-20.1.0-150400.12.6.1.noarch installed.
It generates high vulnerability:
$ grype --distro <custom_image:version> | grep gunicorn
NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY
gunicorn 20.1.0 2.0.0 python GHSA-w3h3-4rj7-4ph4 High
What you expected to happen:
According to SUSE Advisory CVE-2024-1135
Patch for this CVE is applied from version python311-gunicorn >= 20.1.0-150400.12.6.1
See with this link: https://www.suse.com/security/cve/CVE-2024-1135.html
SUSE Linux Enterprise Server 15 SP5 and SLES 15 SP6
python311-gunicorn >= 20.1.0-150400.12.6.1
Patchnames:
SUSE-SLE-Module-Python3-15-SP5-2024-1440
SUSE Linux Enterprise Module for Python 3 15 SP6 GA python311-gunicorn-20.1.0-150400.12.6.1
We are using the right version that comply with SUSE recommendation.
Therefore, this CVE is a FP as Grype does not recognize the patch from SUSE.
This is due to syft output where every python package, Syft generates 2 entries.
First, is the base version and second is the backport from the OS provider.
This is Syft output:
gunicorn 20.1.0 python
python311-gunicorn 20.1.0-150400.12.6.1 rpm
How to reproduce it (as minimally and precisely as possible):
FROM registry.suse.com/suse/sle15:15.6
ADD https://rpmfind.net/linux/opensuse/distribution/leap/15.6/repo/oss/noarch/python311-gunicorn-20.1.0-150400.12.6.1.noarch.rpm /tmp
RUN rpm -ivh --nodeps /tmp/python311-gunicorn-20.1.0-150400.12.6.1.noarch.rpm
ENTRYPOINT [""]
CMD ["bash"]
$ docker build -t "suse15.6_python311-gunicorn:v1" .
$ docker run -it suse15.6_python311-gunicorn:v1 bash
rpm -qa | grep gunicorn
python311-gunicorn-20.1.0-150400.12.6.1.noarch
$ syft suse15.6_python311-gunicorn:v1 | grep gunicorn
gunicorn 20.1.0 python
python311-gunicorn 20.1.0-150400.1 rpm
$ grype suse15.6_python311-gunicorn:v1
NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY
gunicorn 20.1.0 22.0.0 python GHSA-w3h3-4rj7-4ph4 High
Environment:
$ grype --version
grype 0.86.1
In container image eco-system:
NAME="SLES"
VERSION="15-SP6"
VERSION_ID="15.6"
PRETTY_NAME="SUSE Linux Enterprise Server 15 SP6"
ID="sles"
ID_LIKE="suse"
ANSI_COLOR="0;32"
CPE_NAME="cpe:/o:suse:sles:15:sp6"
DOCUMENTATION_URL="https://documentation.suse.com/"
The text was updated successfully, but these errors were encountered: