Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Possible False Negatives on Amazon-Linux-Based Systems #776

Open
mattlorimor opened this issue Feb 26, 2025 · 2 comments
Open

Possible False Negatives on Amazon-Linux-Based Systems #776

mattlorimor opened this issue Feb 26, 2025 · 2 comments
Labels
enhancement New feature or request

Comments

@mattlorimor
Copy link

mattlorimor commented Feb 26, 2025

What would you like to be added:

Further hydration of AL vuln data using explore.alas.aws.amazon.com (or something better if Amazon maintains it).

Currently, for Amazon-Linux-Based distributions, the ALAS Advisories seem to be the only thing parsed. This seems to result in situations where CVEs exist in system packages on Amazon Linux but do not surface up in scanners like Grype, Trivy, Wiz, etc. The crux of this is that Amazon does not seem to issue an ALAS Advisory unless a fix is also being released. However, the data for whether their distros/lineages are affected exists and seems to be consumable.

Why is this needed:

CVE scanners should strive to be as correct as possible with respect to which CVEs exist on any given system.

I tested all of this looking for this curl CVE on amazonlinux:2. Grype, Trivy, and Wiz all do not find it. This is all despite the fact that a vulnerable version does appear to be installed:

docker run -it amazonlinux@sha256:bccc33f13237edc45012bb061400858907dd21dfcfdb0fb803b5b34d333e6d20 /bin/bash
bash-4.2# curl --version
curl 8.3.0 (aarch64-koji-linux-gnu) libcurl/8.3.0 OpenSSL/1.0.2k-fips zlib/1.2.7 libidn2/2.3.0 libpsl/0.21.5 (+libidn2/2.3.0) libssh2/1.4.3 nghttp2/1.41.0 OpenLDAP/2.4.44
Release-Date: 2023-09-13
Protocols: dict file ftp ftps gopher gophers http https imap imaps ldap ldaps mqtt pop3 pop3s rtsp scp sftp smb smbs smtp smtps telnet tftp ws wss
Features: alt-svc AsynchDNS GSS-API HSTS HTTP2 HTTPS-proxy IDN IPv6 Kerberos Largefile libz NTLM NTLM_WB PSL SPNEGO SSL threadsafe UnixSockets

Additional context:
It has always been my understanding that scanners are at the mercy of what ALAS (and other distro vuln databases) tell them. In this case, there certainly seems to be more data/signal that could be consumed and used to populate the Grype vuln db.

I'm curious whether this has ever been discussed and that not consuming the data surfaced at explore.alas.aws.amazon.com is a conscious choice that has been made.

@mattlorimor mattlorimor added the enhancement New feature or request label Feb 26, 2025
@mattlorimor
Copy link
Author

mattlorimor commented Feb 27, 2025

I'm assuming that there would be a potential problem when utilizing data from explore.alas.aws.amazon.com because Grype's entire trigger around building any vuln entry at all with respect to Amazon Linux is whether an ALAS advisory has been issued. It's almost like a db of CVEs should be being built up (and regularly rebuilt) based on the explore.alas.aws.amazon.com data that can be utilized. It's not great that there is a lack of info on the explore. page. Specifically, it doesn't list the Amazon Linux 1/2/2023 package name that is affected. It simply lists whether that particular version of Amazon Linux is waiting on a fix, not affected, fixed, or some other status from the table listed here:

Image

This all started when I saw that table in the FAQs because I knew that none of that status information was in the ALAS advisories. So, I wanted to know where it was. I didn't actually know about explore.alas.aws.amazon.com's existence until a few hours ago.

It's odd to me that scanners (I guess I can't ask you to speak for all scanners) would stop short after consuming ALAS data when the extra data saying whether a particular CVE affects AL, AL2, or AL2023 is right there. I just don't know how to marry the two data sets into something that can be turned into actual scan results.

@mattlorimor
Copy link
Author

Related: anchore/grype#368

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
Status: No status
Development

No branches or pull requests

1 participant