-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
go through list of Trivy security findings #236
Comments
I sent this email to [email protected]:
|
Here's a list of Trivy results for docker.elastic.co/logstash/logstash:8.9.1, forwarded to Elastic. |
Response from Elastic:
|
Second email:
|
I've gone through the Trivy security findings as of today and marked some of them as "doesn't apply", fixed some others, and some we'll need to wait for library versions in logstash, opensearch, dashboards, etc. We've gone from 45 or so down to 19 currently open. A few of those are HIGH but looking at how they are used in the various components I don't think any of them are HIGH with regards to how Malcolm functions. I'm satisfied with this for now, and will close this and open another issue again to do another check in a month or so. |
We have code scanning with Trivy enabled for the Malcolm docker images. Currently (in my development branch, at least) there are ~34
critical
orhigh
issues reported.Of these, the vast majority of them are in the Logstash image, with a few in the OpenSearch, Dashboards and Arkime images.
Here are maybe some relevant links:
We need to sort through these and determine what can be done with them. Perhaps open up individual issues or groups of issues as we start to triage them.
Where so many of them are in the Logstash image and elastic doesn't super seem to care (as you can see from the bug I linked there) perhaps we need to look at making our own Logstash image, or replacing the vulnerable libraries in the Logstash image ourselves.
The text was updated successfully, but these errors were encountered: