You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Scan on image that has python3-Flask-1.0.4-150400.7.64.noarch installed.
It generates high vulnerability:
NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY
Flask 1.0.4 2.2.5 python GHSA-m2qf-hxjv-5gpq High
Jinja2 2.10.1 3.1.4 python GHSA-h75v-3vvj-5mfj Medium
Jinja2 2.10.1 3.1.3 python GHSA-h5c8-rqwp-cp95 Medium
What happened:
Scan on image that has python3-Flask-1.0.4-150400.7.64.noarch installed.
It generates high vulnerability:
JSON format:
What you expected to happen:
According to SUSE Advisory CVE-2023-30861
Patch for this CVE is applied from version python3-Flask-1.0.4-150400.7.64.noarch
See with this link: https://www.suse.com/security/cve/CVE-2023-30861.html
SUSE Linux Enterprise Server 15 SP5
python3-Flask >= 1.0.4-150400.3.3.1
Patchnames:
SUSE-SLE-Module-Basesystem-15-SP5-2023-2263
Installed version in the container: python3-flask-3.3.2-150400.23.1.x86_64
Conclusion: Installed version is more than the minimal requirement patch from SLES 15.5 but Grype generate a vulnerability.
How to reproduce it (as minimally and precisely as possible):
Environment:
In container image eco-system:
bash-4.4$ cat /etc/release
NAME="SLES"
VERSION="15-SP5"
VERSION_ID="15.5"
PRETTY_NAME="SUSE Linux Enterprise Server 15 SP5"
ID="sles"
ID_LIKE="suse"
ANSI_COLOR="0;32"
CPE_NAME="cpe:/o:suse:sles:15:sp5"
DOCUMENTATION_URL="https://documentation.suse.com/"
The text was updated successfully, but these errors were encountered: