We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Hey folks, I noticed that the default images for these dependences (kafka 3.1.0, zookeeper 3.7.0) have several critical security vulnerabilities:
⇒ trivy image bitnami/kafka:3.1.0 --severity CRITICAL --ignore-unfixed 2025-01-27T16:53:34-08:00 INFO [vuln] Vulnerability scanning is enabled 2025-01-27T16:53:34-08:00 INFO [secret] Secret scanning is enabled 2025-01-27T16:53:34-08:00 INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning 2025-01-27T16:53:34-08:00 INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.58/docs/scanner/secret#recommendation for faster secret detection 2025-01-27T16:53:35-08:00 INFO Detected OS family="debian" version="10.12" 2025-01-27T16:53:35-08:00 INFO [debian] Detecting vulnerabilities... os_version="10" pkg_num=106 2025-01-27T16:53:35-08:00 INFO Number of language-specific files num=4 2025-01-27T16:53:35-08:00 INFO [gobinary] Detecting vulnerabilities... 2025-01-27T16:53:35-08:00 INFO [jar] Detecting vulnerabilities... 2025-01-27T16:53:35-08:00 WARN Using severities from other vendors for some vulnerabilities. Read https://aquasecurity.github.io/trivy/v0.58/docs/scanner/vulnerability#severity-selection for details. 2025-01-27T16:53:35-08:00 WARN This OS version is no longer supported by the distribution family="debian" version="10.12" 2025-01-27T16:53:35-08:00 WARN The vulnerability detection may be insufficient because security updates are not provided bitnami/kafka:3.1.0 (debian 10.12) Total: 19 (CRITICAL: 19) ┌────────────────┬────────────────┬──────────┬────────┬─────────────────────────┬─────────────────────────┬──────────────────────────────────────────────────────────────┐ │ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │ ├────────────────┼────────────────┼──────────┼────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ curl │ CVE-2022-32221 │ CRITICAL │ fixed │ 7.64.0-4+deb10u2 │ 7.64.0-4+deb10u4 │ curl: POST following PUT confusion │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-32221 │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ dpkg │ CVE-2022-1664 │ │ │ 1.19.7 │ 1.19.8 │ Dpkg::Source::Archive in dpkg, the Debian package management │ │ │ │ │ │ │ │ system, b ... │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1664 │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ libc-bin │ CVE-2021-33574 │ │ │ 2.28-10+deb10u1 │ 2.28-10+deb10u2 │ glibc: mq_notify does not handle separately allocated thread │ │ │ │ │ │ │ │ attributes │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-33574 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2021-35942 │ │ │ │ │ glibc: Arbitrary read in wordexp() │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-35942 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2022-23218 │ │ │ │ │ glibc: Stack-based buffer overflow in svcunix_create via │ │ │ │ │ │ │ │ long pathnames │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-23218 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2022-23219 │ │ │ │ │ glibc: Stack-based buffer overflow in sunrpc clnt_create via │ │ │ │ │ │ │ │ a long pathname │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-23219 │ ├────────────────┼────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ libc6 │ CVE-2021-33574 │ │ │ │ │ glibc: mq_notify does not handle separately allocated thread │ │ │ │ │ │ │ │ attributes │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-33574 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2021-35942 │ │ │ │ │ glibc: Arbitrary read in wordexp() │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-35942 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2022-23218 │ │ │ │ │ glibc: Stack-based buffer overflow in svcunix_create via │ │ │ │ │ │ │ │ long pathnames │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-23218 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2022-23219 │ │ │ │ │ glibc: Stack-based buffer overflow in sunrpc clnt_create via │ │ │ │ │ │ │ │ a long pathname │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-23219 │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ libcurl4 │ CVE-2022-32221 │ │ │ 7.64.0-4+deb10u2 │ 7.64.0-4+deb10u4 │ curl: POST following PUT confusion │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-32221 │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ libldap-2.4-2 │ CVE-2022-29155 │ │ │ 2.4.47+dfsg-3+deb10u6 │ 2.4.47+dfsg-3+deb10u7 │ openldap: OpenLDAP SQL injection │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-29155 │ ├────────────────┤ │ │ │ │ │ │ │ libldap-common │ │ │ │ │ │ │ │ │ │ │ │ │ │ │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ libssl1.1 │ CVE-2022-1292 │ │ │ 1.1.1n-0+deb10u1 │ 1.1.1n-0+deb10u2 │ openssl: c_rehash script allows command injection │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1292 │ │ ├────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ │ CVE-2022-2068 │ │ │ │ 1.1.1n-0+deb10u3 │ openssl: the c_rehash script allows command injection │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-2068 │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ libtasn1-6 │ CVE-2021-46848 │ │ │ 4.13-3 │ 4.13-3+deb10u1 │ libtasn1: Out-of-bound access in ETYPE_OK │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-46848 │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ openssl │ CVE-2022-1292 │ │ │ 1.1.1n-0+deb10u1 │ 1.1.1n-0+deb10u2 │ openssl: c_rehash script allows command injection │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1292 │ │ ├────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ │ CVE-2022-2068 │ │ │ │ 1.1.1n-0+deb10u3 │ openssl: the c_rehash script allows command injection │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-2068 │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ zlib1g │ CVE-2022-37434 │ │ │ 1:1.2.11.dfsg-1+deb10u1 │ 1:1.2.11.dfsg-1+deb10u2 │ zlib: heap-based buffer over-read and overflow in inflate() │ │ │ │ │ │ │ │ in inflate.c via a... │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-37434 │ └────────────────┴────────────────┴──────────┴────────┴─────────────────────────┴─────────────────────────┴──────────────────────────────────────────────────────────────┘
⇒ trivy image bitnami/zookeeper:3.7.0 --ignore-unfixed --severity CRITICAL 2025-01-27T18:50:32-08:00 INFO [vuln] Vulnerability scanning is enabled 2025-01-27T18:50:32-08:00 INFO [secret] Secret scanning is enabled 2025-01-27T18:50:32-08:00 INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning 2025-01-27T18:50:32-08:00 INFO [secret] Please see also https://aquasecurity.github.io/trivy/v0.58/docs/scanner/secret#recommendation for faster secret detection 2025-01-27T18:50:45-08:00 INFO Detected OS family="debian" version="10.12" 2025-01-27T18:50:45-08:00 INFO [debian] Detecting vulnerabilities... os_version="10" pkg_num=108 2025-01-27T18:50:45-08:00 INFO Number of language-specific files num=3 2025-01-27T18:50:45-08:00 INFO [gobinary] Detecting vulnerabilities... 2025-01-27T18:50:45-08:00 INFO [jar] Detecting vulnerabilities... 2025-01-27T18:50:45-08:00 WARN Using severities from other vendors for some vulnerabilities. Read https://aquasecurity.github.io/trivy/v0.58/docs/scanner/vulnerability#severity-selection for details. 2025-01-27T18:50:45-08:00 WARN This OS version is no longer supported by the distribution family="debian" version="10.12" 2025-01-27T18:50:45-08:00 WARN The vulnerability detection may be insufficient because security updates are not provided bitnami/zookeeper:3.7.0 (debian 10.12) Total: 19 (CRITICAL: 19) ┌────────────────┬────────────────┬──────────┬────────┬─────────────────────────┬─────────────────────────┬──────────────────────────────────────────────────────────────┐ │ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │ ├────────────────┼────────────────┼──────────┼────────┼─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ curl │ CVE-2022-32221 │ CRITICAL │ fixed │ 7.64.0-4+deb10u2 │ 7.64.0-4+deb10u4 │ curl: POST following PUT confusion │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-32221 │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ dpkg │ CVE-2022-1664 │ │ │ 1.19.7 │ 1.19.8 │ Dpkg::Source::Archive in dpkg, the Debian package management │ │ │ │ │ │ │ │ system, b ... │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1664 │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ libc-bin │ CVE-2021-33574 │ │ │ 2.28-10+deb10u1 │ 2.28-10+deb10u2 │ glibc: mq_notify does not handle separately allocated thread │ │ │ │ │ │ │ │ attributes │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-33574 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2021-35942 │ │ │ │ │ glibc: Arbitrary read in wordexp() │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-35942 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2022-23218 │ │ │ │ │ glibc: Stack-based buffer overflow in svcunix_create via │ │ │ │ │ │ │ │ long pathnames │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-23218 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2022-23219 │ │ │ │ │ glibc: Stack-based buffer overflow in sunrpc clnt_create via │ │ │ │ │ │ │ │ a long pathname │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-23219 │ ├────────────────┼────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ libc6 │ CVE-2021-33574 │ │ │ │ │ glibc: mq_notify does not handle separately allocated thread │ │ │ │ │ │ │ │ attributes │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-33574 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2021-35942 │ │ │ │ │ glibc: Arbitrary read in wordexp() │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-35942 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2022-23218 │ │ │ │ │ glibc: Stack-based buffer overflow in svcunix_create via │ │ │ │ │ │ │ │ long pathnames │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-23218 │ │ ├────────────────┤ │ │ │ ├──────────────────────────────────────────────────────────────┤ │ │ CVE-2022-23219 │ │ │ │ │ glibc: Stack-based buffer overflow in sunrpc clnt_create via │ │ │ │ │ │ │ │ a long pathname │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-23219 │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ libcurl4 │ CVE-2022-32221 │ │ │ 7.64.0-4+deb10u2 │ 7.64.0-4+deb10u4 │ curl: POST following PUT confusion │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-32221 │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ libldap-2.4-2 │ CVE-2022-29155 │ │ │ 2.4.47+dfsg-3+deb10u6 │ 2.4.47+dfsg-3+deb10u7 │ openldap: OpenLDAP SQL injection │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-29155 │ ├────────────────┤ │ │ │ │ │ │ │ libldap-common │ │ │ │ │ │ │ │ │ │ │ │ │ │ │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ libssl1.1 │ CVE-2022-1292 │ │ │ 1.1.1n-0+deb10u1 │ 1.1.1n-0+deb10u2 │ openssl: c_rehash script allows command injection │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1292 │ │ ├────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ │ CVE-2022-2068 │ │ │ │ 1.1.1n-0+deb10u3 │ openssl: the c_rehash script allows command injection │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-2068 │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ libtasn1-6 │ CVE-2021-46848 │ │ │ 4.13-3 │ 4.13-3+deb10u1 │ libtasn1: Out-of-bound access in ETYPE_OK │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2021-46848 │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ openssl │ CVE-2022-1292 │ │ │ 1.1.1n-0+deb10u1 │ 1.1.1n-0+deb10u2 │ openssl: c_rehash script allows command injection │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-1292 │ │ ├────────────────┤ │ │ ├─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ │ CVE-2022-2068 │ │ │ │ 1.1.1n-0+deb10u3 │ openssl: the c_rehash script allows command injection │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-2068 │ ├────────────────┼────────────────┤ │ ├─────────────────────────┼─────────────────────────┼──────────────────────────────────────────────────────────────┤ │ zlib1g │ CVE-2022-37434 │ │ │ 1:1.2.11.dfsg-1+deb10u1 │ 1:1.2.11.dfsg-1+deb10u2 │ zlib: heap-based buffer over-read and overflow in inflate() │ │ │ │ │ │ │ │ in inflate.c via a... │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2022-37434 │ └────────────────┴────────────────┴──────────┴────────┴─────────────────────────┴─────────────────────────┴──────────────────────────────────────────────────────────────┘
Are there newer versions of these packages that will work or are there known version compatibility issues?
The text was updated successfully, but these errors were encountered:
You could try change images to bitnami/kafka:3.8.1 & bitnami/zookeeper:3.8.4
Sorry, something went wrong.
haorenfsa
No branches or pull requests
Hey folks,
I noticed that the default images for these dependences (kafka 3.1.0, zookeeper 3.7.0) have several critical security vulnerabilities:
Are there newer versions of these packages that will work or are there known version compatibility issues?
The text was updated successfully, but these errors were encountered: