-
Notifications
You must be signed in to change notification settings - Fork 493
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Critical & High Security vulnerability issue in Kapacitor Daemon with Trivy Scan #2826
Comments
With Kapacitor Daemon(v1.7.4 and v1.7.5)
|
Thank you for your report.
InfluxData closely follows security alerts across its product line and will issue updates for kapacitor to address issues that affect it. These updates may include updates that happen to make these Trivy issues go away, but as these are false positives for kapacitor, there aren't plans to release a new update for kapacitor for these issues at this time. (cc @srebhan and @davidby-influx). Thanks again for your report |
Hello from team Trivy :) Just chiming in to say that Trivy now allows software maintainers (you) to publish vulnerability analysis for your software (packages, libraries, container images) so that vulnerability scanners will automatically suppress those irrelevant vulnerabilities for end users. You can read more here: |
Hi Team,
We are using kapacitor as part of TICK stack. Recently when we ran trivy scan we found 1 high issue with Kapacitor Daemon(v1.7.4). So we tried the latest version(v1.7.5), same issue was existing. This fixes is essential for our releases. Please a fix the vulnerability issue.
Below is the report from Trivy scan:
Kapacitor Daemon Version 1.7.4
Trivy Vulnerability Scan Results (usr/local/bin/kapacitord)
Kapacitor Daemon Version 1.7.5
Trivy Vulnerability Scan Results (usr/local/bin/kapacitord)
The text was updated successfully, but these errors were encountered: