False positive:GHSA-wf44-4mgj-rwvx( CVE-2015-3221) neutron 17.x.x, recommend fixed with 2014.x older versioning convention #7933
sekveaja
started this conversation in
False Detection
Replies: 1 comment
-
Hello @sekveaja Trivy has options for ignoring and filtering vulnerabilities. Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
IDs
GHSA-wf44-4mgj-rwvx( CVE-2015-3221)
Description
Scan on image that has python3-neutron-17.1.3.dev3-1000.R12A04.noarch installed.
It generates vulnerabilities:
neutron (PKG-INFO) │ CVE-2015-3221 │ MEDIUM │ fixed │ 17.3.0 │ 2014.2.4, 2015.1.1 │ openstack-neutron: L2 agent DoS through incorrect allowed │
OpenStack changed versioning system between Kilo and Liberty in 2015. Up to Kilo they used the year as a base resulting in 20xx.x.x versions. From Liberty they started to use semantic versioning in every project.
This resulted lower version numbers for the newer projects that the tools cannot handle now.
e.g. Neutron became 7.0.0 in Liberty after the 2015.1.4 Kilo version
https://releases.openstack.org/liberty/index.html
https://releases.openstack.org/kilo/index.html
The recommend fixed refer to 2014.2.4, 2015.1.1 which is old version naming convention. We are using 17.x.x which the new version convention.
We believe this is a bug or false positive.
Attached is spec file for reproduction
neutron.spec.txt
Reproduction Steps
Target
Container Image
Scanner
Vulnerability
Target OS
SUSE 15 SP5
Debug Output
Version
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions