Replies: 2 comments 3 replies
-
This (gobinary) also appears on other deployments. For instance, I have a NodeJS application running in the cluster that has some critical and high vulnerabilities. I need to understand if it's something I can do something about or not. I know for sure that the NodeJS app makes no direct use of Golang code but it could be that one of the modules pulled in might. How could I go about learning which module brought it in it Trivy doesn't tell me? |
Beta Was this translation helpful? Give feedback.
-
hi @ak2766! Trivy k8s does a few steps for scanning. my mistake:
this block is the result for image scan. the report for cert-manager-cainjector:v1.16.2trivy i quay.io/jetstack/cert-manager-cainjector:v1.16.2
2025-01-13T11:34:46+06:00 INFO [vuln] Vulnerability scanning is enabled
2025-01-13T11:34:46+06:00 INFO [secret] Secret scanning is enabled
2025-01-13T11:34:46+06:00 INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2025-01-13T11:34:46+06:00 INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.58/docs/scanner/secret#recommendation for faster secret detection
2025-01-13T11:34:53+06:00 INFO Detected OS family="debian" version="12.8"
2025-01-13T11:34:53+06:00 INFO [debian] Detecting vulnerabilities... os_version="12" pkg_num=3
2025-01-13T11:34:53+06:00 INFO Number of language-specific files num=1
2025-01-13T11:34:53+06:00 INFO [gobinary] Detecting vulnerabilities...
quay.io/jetstack/cert-manager-cainjector:v1.16.2 (debian 12.8)
Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)
app/cmd/cainjector/cainjector (gobinary)
Total: 2 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 1, CRITICAL: 1)
┌─────────────────────┬────────────────┬──────────┬────────┬───────────────────┬───────────────┬────────────────────────────────────────────────────────┐
│ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │
├─────────────────────┼────────────────┼──────────┼────────┼───────────────────┼───────────────┼────────────────────────────────────────────────────────┤
│ golang.org/x/crypto │ CVE-2024-45337 │ CRITICAL │ fixed │ v0.27.0 │ 0.31.0 │ golang.org/x/crypto/ssh: Misuse of │
│ │ │ │ │ │ │ ServerConfig.PublicKeyCallback may cause authorization │
│ │ │ │ │ │ │ bypass in golang.org/x/crypto │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-45337 │
├─────────────────────┼────────────────┼──────────┤ ├───────────────────┼───────────────┼────────────────────────────────────────────────────────┤
│ golang.org/x/net │ CVE-2024-45338 │ HIGH │ │ v0.29.0 │ 0.33.0 │ golang.org/x/net/html: Non-linear parsing of │
│ │ │ │ │ │ │ case-insensitive content in golang.org/x/net/html │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-45338 │
└─────────────────────┴────────────────┴──────────┴────────┴───────────────────┴───────────────┴────────────────────────────────────────────────────────┘ you can try to skip the second part with a flag |
Beta Was this translation helpful? Give feedback.
-
Question
I'm trying to clean up my cluster of many (overwhelmingly many) security vulnerabilities as reported by Trivy. However, it appears that most of these CRITICAL vulnerabilities are attached to (gobinary). For instance, I just deployed the latest
cert-manager
and I see all components have a critical vulnerability:Workload Assessment
When I run the
all
report, I get:Cert Manager full report
So, why is it that there are 2 parts(?), namely:
1: the top part shows all is well
2. then the bottom part shows the same info but for (gobinary).
So, what exactly am I looking at and how should I interpret this? I've searched and frankly, there's loads of information out there and I could have missed it. If so, please provide links so I can go read.
Overall, be gentle as I'm only a few weeks old using Trivy.
Target
Kubernetes
Scanner
Vulnerability
Output Format
None
Mode
Standalone
Operating System
I'm on Ubuntu 24.04.1
Version
$ > trivy --version Version: 0.58.0 Vulnerability DB: Version: 2 UpdatedAt: 2025-01-06 06:18:23.609115718 +0000 UTC NextUpdate: 2025-01-07 06:18:23.609115348 +0000 UTC DownloadedAt: 2025-01-06 09:03:02.216498403 +0000 UTC Java DB: Version: 1 UpdatedAt: 2024-12-18 02:53:19.193069252 +0000 UTC NextUpdate: 2024-12-21 02:53:19.193069092 +0000 UTC DownloadedAt: 2024-12-19 12:47:39.311770211 +0000 UTC Check Bundle: Digest: sha256:f6901e03f486a48f47aa17a78d89d18e6c31ded82aff83ed19d0d73935a1a059 DownloadedAt: 2025-01-06 09:02:51.408344975 +0000 UTC
Beta Was this translation helpful? Give feedback.
All reactions