-
Notifications
You must be signed in to change notification settings - Fork 14.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
chore: update redis to >= 4.6.0 #27250
Conversation
Hint: checked also other pages with CVE informations. |
This should not have any impact but I don't see https://nvd.nist.gov/vuln/detail/CVE-2023-31655#match-9248899 impacting 4.X. The vulnerability is related with redis server itself |
Codecov ReportAll modified and coverable lines are covered by tests ✅
Additional details and impacted files@@ Coverage Diff @@
## master #27250 +/- ##
==========================================
- Coverage 69.69% 69.57% -0.12%
==========================================
Files 1908 1908
Lines 74530 74530
Branches 8309 8309
==========================================
- Hits 51942 51855 -87
- Misses 20535 20622 +87
Partials 2053 2053
Flags with carried forward coverage won't be shown. Click here to find out more. ☔ View full report in Codecov by Sentry. |
@dpgaspar I am also confused more and more while reading the CVE documentations ... shall I close this pull request, what do you think? I still don't know if it is "redis direct" why the scans show this as bad dependency (refer up the screenshot from docker scout with the docker-scout link) ... |
I checked in multiple repository scans now (JFROG, Harbor, Amazon ECR), seems only docker scout is marking this as "bad" - could also be an issue with docker-scout analyser itself (?) for testing purpose I made a dirty upgrade in the 3.1.1 to use redis 4.6.0 to see if scout is still marking it as bad
=> it is gone in scout then If the update to 4.6.0 is not bad it might still be good to switch to it (even if it might not be a CVE inside) to avoid false-positive findings (if this is a false positive, still this is confusing ...) |
Co-authored-by: Stefan Arnold <[email protected]>
Co-authored-by: Stefan Arnold <[email protected]>
Co-authored-by: Stefan Arnold <[email protected]>
SUMMARY
redis has a fixable high finding in version 4.x
CVE-2023-31655 (7.5)
Depending this webpage version 4.6.0 should not be affected https://scout.docker.com/vulnerabilities/id/CVE-2023-31655?s=pypa&n=redis&t=pypi&vr=%3D4.5.4
BEFORE/AFTER SCREENSHOTS OR ANIMATED GIF
TESTING INSTRUCTIONS
redis 4.6.0 is installed after this change
ADDITIONAL INFORMATION
Hint: CVE-2023-28859 (6.5) is NOT part of this pull request as it is only fixable with redis V5.x.x which is outcluded in setup.py at the moment (<5.0)
Info is based on this page: https://scout.docker.com/vulnerabilities/id/CVE-2023-28859?s=pypa&n=redis&t=pypi&vr=%3C5.0.0b1 (fixed in V5.x)