-
Notifications
You must be signed in to change notification settings - Fork 3.1k
[ERROR] [email protected] package contains security issues #1477
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Any updates on this security issue? |
Hi guys we were checking if it was a false-positive, but it looks like those vulns affect all versions of Node. |
Hey @riosje thanks for your response. I did that but the team closed my issue saying that it has to be opened here. See this link for details nodejs/node#45499 (comment) |
Hi @marcossv9 let me discuss this internally. thanks. |
Just an FYI: Node.js v16.19.0 dropped last week on the 14th but not yet available here. Maybe the problem is solved in this latest release. |
Hi @Whobeu if you use the script |
@marcossv9 @Whobeu you can use ubuntu-20.04 with node 16.19.0 Testing vuln-validation...
Organization:
Package manager: deb
Project name: docker-image|vuln-validation
Docker image: vuln-validation
Platform: linux/amd64
Base image: ubuntu:20.04
Licenses: enabled
✔ Tested 158 dependencies for known issues, no vulnerable paths found.
Base Image Vulnerabilities Severity
ubuntu:20.04 9 0 critical, 0 high, 1 medium, 8 low
Recommendations for base image upgrade:
Major upgrades
Base Image Vulnerabilities Severity
ubuntu:rolling 6 0 critical, 0 high, 1 medium, 5 low |
After all performed tests we can conclude those vulns are not directly associated with the Nodejs deb/rpm packages distributed by NODESOURCE. |
Thanks for taking the time of digging into this issue @riosje. |
@marcossv9 let's check this test case.
Dockerimage FROM ubuntu:22.04
RUN apt-get update -y && apt-get upgrade -y && apt-get install -y curl && curl -fsSL https://deb.nodesource.com/setup_16.x | bash - && apt-get install -y nodejs When you run the scan you will get this vulnerability -> NULL Pointer Dereference | CVE-2022-0778 All OpenSSL 1.1.1 versions are affected by this issue. Users of these versions should upgrade to OpenSSL 1.1.1k If you check the openssl version on this build of node is root@4825eaa93942:/# node -e 'console.log(process.versions)' | grep openssl
openssl: '1.1.1s+quic', so, it is supposed the versions higher than |
Thanks. I periodically check https://deb.nodesource.com/node_16.x/pool/main/n/nodejs/ to see when the latest build appears and I did not see 16.19.0. Checked this morning and it has appeared with a date of Dec 19 so it was timing on my part. |
Thanks @riosje. I've tested it and now I can get your point. |
I cant update to 16.19.0 |
Describe your bug
We have found two security issues regarding nodejs deb package while scanning container using snyk tool.
That's because we use latest
ubuntu
container as base, and then we install nodejs using:Distribution Information:
Node Version:
To Reproduce
Steps to reproduce the behavior:
snyk container test <our_ubuntu22:04_based_container> --policy-path=.snyk --severity-threshold=high
Expected behavior
After we run snyk container test command, the nodejs package should not contain any security issue.
Additional context
There is no updated deb package for that version of nodejs, so we can't install a patched version of it.
Please see the available deb versions here
https://security.snyk.io/vuln/SNYK-UBUNTU2204-NODEJS-2782481
https://security.snyk.io/vuln/SNYK-UBUNTU2204-NODEJS-2775540
The text was updated successfully, but these errors were encountered: