-
Notifications
You must be signed in to change notification settings - Fork 622
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Posible false positive detection - CVE-2022-1271 - gzip - Ubuntu 22.04 #2527
Comments
Hi @Damian-Mangold . Thanks for the issue. Yes, I have reproduced that here with a simple container: FROM ubuntu:22.04
RUN apt update -y
RUN apt install -y gzip
Grype does know about the Ubuntu patches.
Seems we're matching on nvd though. |
We always match against nvd for packages with package type binary, that is expected. What should be happening though is that the binary package should get a |
So the issue appears to be that the path
|
Hi @westonsteimel @popey Thank you very much for the analysis. One extra piece of information that might be useful. With version 0.87 the vulnerability was not detected. Details
✔ Vulnerability DB [updated]
✔ Loaded image cti_cti:latest
✔ Parsed image sha256:bcde3477e12b7bbd3481bbe90351b890f1e2b6814088423d6aa59d47f48470c9
✔ Cataloged contents 5c64cd1fa7d091d393de1cddd3ab9399b52ebf230d47b80604e01c5a8b3d8884
├── ✔ Packages [190 packages]
├── ✔ File digests [3,317 files]
├── ✔ File metadata [3,317 locations]
└── ✔ Executables [884 executables]
✔ Scanned for vulnerabilities [66 vulnerability matches]
├── by severity: 0 critical, 0 high, 19 medium, 40 low, 7 negligible
└── by status: 23 fixed, 43 not-fixed, 0 ignored
NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY
coreutils 8.32-4.1ubuntu1.2 deb CVE-2016-2781 Low
curl 7.81.0-1ubuntu1.20 deb CVE-2025-0167 Low
gcc-12-base 12.3.0-1ubuntu1~22.04 deb CVE-2023-4039 Low
gcc-12-base 12.3.0-1ubuntu1~22.04 deb CVE-2022-27943 Low
gpgv 2.2.27-3ubuntu2.1 deb CVE-2022-3219 Low
libc-bin 2.35-0ubuntu3.8 2.35-0ubuntu3.9 deb CVE-2025-0395 Medium
libc-bin 2.35-0ubuntu3.8 deb CVE-2016-20013 Negligible
libc6 2.35-0ubuntu3.8 2.35-0ubuntu3.9 deb CVE-2025-0395 Medium
libc6 2.35-0ubuntu3.8 deb CVE-2016-20013 Negligible
libcap2 1:2.44-1ubuntu0.22.04.1 1:2.44-1ubuntu0.22.04.2 deb CVE-2025-1390 Medium
libcurl4 7.81.0-1ubuntu1.20 deb CVE-2025-0167 Low
libgcc-s1 12.3.0-1ubuntu1~22.04 deb CVE-2023-4039 Low
libgcc-s1 12.3.0-1ubuntu1~22.04 deb CVE-2022-27943 Low
libgcrypt20 1.9.4-3ubuntu3 deb CVE-2024-2236 Low
libgnutls30 3.7.3-4ubuntu1.5 3.7.3-4ubuntu1.6 deb CVE-2024-12243 Medium
libgssapi-krb5-2 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.6 deb CVE-2025-24528 Medium
libgssapi-krb5-2 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.5 deb CVE-2024-3596 Medium
libgssapi-krb5-2 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.6 deb CVE-2024-26461 Low
libgssapi-krb5-2 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.6 deb CVE-2024-26458 Negligible
libk5crypto3 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.6 deb CVE-2025-24528 Medium
libk5crypto3 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.5 deb CVE-2024-3596 Medium
libk5crypto3 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.6 deb CVE-2024-26461 Low
libk5crypto3 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.6 deb CVE-2024-26458 Negligible
libkrb5-3 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.6 deb CVE-2025-24528 Medium
libkrb5-3 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.5 deb CVE-2024-3596 Medium
libkrb5-3 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.6 deb CVE-2024-26461 Low
libkrb5-3 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.6 deb CVE-2024-26458 Negligible
libkrb5support0 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.6 deb CVE-2025-24528 Medium
libkrb5support0 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.5 deb CVE-2024-3596 Medium
libkrb5support0 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.6 deb CVE-2024-26461 Low
libkrb5support0 1.19.2-2ubuntu0.4 1.19.2-2ubuntu0.6 deb CVE-2024-26458 Negligible
libncurses6 6.3-2ubuntu0.1 deb CVE-2023-50495 Low
libncurses6 6.3-2ubuntu0.1 deb CVE-2023-45918 Low
libncursesw6 6.3-2ubuntu0.1 deb CVE-2023-50495 Low
libncursesw6 6.3-2ubuntu0.1 deb CVE-2023-45918 Low
libpam-modules 1.4.0-11ubuntu2.5 deb CVE-2024-10041 Medium
libpam-modules-bin 1.4.0-11ubuntu2.5 deb CVE-2024-10041 Medium
libpam-runtime 1.4.0-11ubuntu2.5 deb CVE-2024-10041 Medium
libpam0g 1.4.0-11ubuntu2.5 deb CVE-2024-10041 Medium
libpcre2-8-0 10.39-3ubuntu0.1 deb CVE-2022-41409 Low
libpcre3 2:8.39-13ubuntu0.22.04.1 deb CVE-2017-11164 Negligible
libpython3.10-minimal 3.10.12-1~22.04.9 deb CVE-2025-1795 Low
libpython3.10-stdlib 3.10.12-1~22.04.9 deb CVE-2025-1795 Low
libssl3 3.0.2-0ubuntu1.18 3.0.2-0ubuntu1.19 deb CVE-2024-9143 Low
libssl3 3.0.2-0ubuntu1.18 deb CVE-2024-41996 Low
libssl3 3.0.2-0ubuntu1.18 3.0.2-0ubuntu1.19 deb CVE-2024-13176 Low
libstdc++6 12.3.0-1ubuntu1~22.04 deb CVE-2023-4039 Low
libstdc++6 12.3.0-1ubuntu1~22.04 deb CVE-2022-27943 Low
libsystemd0 249.11-0ubuntu3.12 deb CVE-2023-7008 Low
libtasn1-6 4.18.0-4build1 4.18.0-4ubuntu0.1 deb CVE-2024-12133 Medium
libtasn1-6 4.18.0-4build1 deb CVE-2021-46848 Low
libtinfo6 6.3-2ubuntu0.1 deb CVE-2023-50495 Low
libtinfo6 6.3-2ubuntu0.1 deb CVE-2023-45918 Low
libudev1 249.11-0ubuntu3.12 deb CVE-2023-7008 Low
libzstd1 1.4.8+dfsg-3build1 deb CVE-2022-4899 Low
login 1:4.8.1-2ubuntu2.2 deb CVE-2024-56433 Medium
login 1:4.8.1-2ubuntu2.2 deb CVE-2023-29383 Low
ncurses-base 6.3-2ubuntu0.1 deb CVE-2023-50495 Low
ncurses-base 6.3-2ubuntu0.1 deb CVE-2023-45918 Low
ncurses-bin 6.3-2ubuntu0.1 deb CVE-2023-50495 Low
ncurses-bin 6.3-2ubuntu0.1 deb CVE-2023-45918 Low
openssl 3.0.2-0ubuntu1.19 deb CVE-2024-41996 Low
passwd 1:4.8.1-2ubuntu2.2 deb CVE-2024-56433 Medium
passwd 1:4.8.1-2ubuntu2.2 deb CVE-2023-29383 Low
python3.10 3.10.12-1~22.04.9 deb CVE-2025-1795 Low
python3.10-minimal 3.10.12-1~22.04.9 deb CVE-2025-1795 Low
A newer version of grype is available for download: 0.89.0 (installed version is 0.87.0)
|
So that appears to be because v0.87.0 of grype used syft v1.19.0 and if you create an sbom using that version of syft it does not output a binary type package for |
Analysis and Justification: False Positive Detection of CVE-2022-1271 in gzip
Summary of the Finding
The Grype security scanner has reported a vulnerability in
gzip
(CVE-2022-1271) due to the presence of version1.10-4ubuntu4.1
in our image. According to Grype’s database, this version is still vulnerable because the issue was fixed ingzip 1.12
. However, after a thorough verification, we have determined that this detection is a false positive.full analysis
Reason for the False Positive
Ubuntu has already patched CVE-2022-1271 in
gzip 1.10-4ubuntu4.1
gzip
changelog in Ubuntu 22.04, multiple patches addressing CVE-2022-1271 have been applied.apt changelog gzip | grep CVE-2022-1271
confirms that six specific patches (patch-1
topatch-6
) were implemented to mitigate the vulnerability without upgrading to1.12
.Grype does not recognize Ubuntu's security patches
gzip 1.10
is still vulnerable, even though the installed version (1.10-4ubuntu4.1
) already contains the necessary fixes.Official confirmation from Ubuntu
1.10-4ubuntu4
.1.10-4ubuntu4.1
) is newer and includes the same security patches.Installation verification
gzip
is installed:root@32f432d75ee3:/# apt list -a gzip Listing... Done gzip/jammy-updates,now 1.10-4ubuntu4.1 amd64 [installed] gzip/jammy 1.10-4ubuntu4 amd64
gzip
.Grype is using NVD feed instead of Ubuntu vulnerability feed
grype <image_name> -o json | jq '.matches[] | select(.artifact.name == "gzip")'
we obtain the following resultDetails
Environment:
grype version
:cat /etc/os-release
or similar):The text was updated successfully, but these errors were encountered: