-
Notifications
You must be signed in to change notification settings - Fork 446
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE-2023-48795 false positives #23556
Comments
Linked to Unthread ticket: |
Hey team! Please add your planning poker estimate with Zenhub @iansltx @lucasmrod @mostlikelee |
Need to confirm which OS we're looking at here. That screenshot looks like Linux, which would be pulling from a distro-specific OVAL (or ALAS for Amazon Linux) rather than our NVD feed. If I had to guess, that's what's going on with libssh2 in particular, though I'm going to test further. For kitty, there was a broader CPE but it got deprecated. I'll need to figure out why the deprecated CPE is showing up in the vuln feed rather than the replacement CPEs. Will prioritize hunting this down since we should be able to fix that with a vuln feed build rather than a full release. For paramiko, I just checked the changelog and 3.4.0 was the version that got the CVE fix; 2.11.0 didn't (it wasn't backported either), so everything < 3.4.0 is indeed vulnerable and we're marking that correctly. |
Did some digging on kitty and there's no such thing as macOS kitty. NVD superseded the CPE on their website from a generic one to a Windows-specific one, but the tighter CPE doesn't get delivered via their API as part of the CVE, and Vulncheck doesn't have the more specific CPE exposed either. So unless I'm missing something significant there's no issue here either, as "kitty for Windows is vulnerable" matches "kitty for all OSes is vulnerable." |
For libssh2, something seems to be up; adding the following to the CVE test gets me CVEs that don't include a resolved-in version:
|
|
Turns out, multiple developers independently called something This also clarifies that the packages listed above are all on homebrew, so that's useful information as well. Will continue working through this; thanks! |
So, for libssh2, I ensured I had libssh2 1.11.1 on my machine (via brew) and confirmed that I don't see it listed as vulnerable. @MScottBlake are the hosts you're seeing marked as vulnerable also macOS/homebrew? As for kitty, coincidentally #22944 (and the corresponding PR #24593) will fix this issue, as the app bundle identifier for kitty (which we get from the will turn into this: So we're down to troubleshooting why you're seeing libssh2 1.11.1 false-positives, as I can't repro them on macOS + homebrew, across multiple Fleet servers running 4.61.0. |
Fleet version: 4.58
Web browser and operating system: macOS 14 and 15
💥 Actual behavior
CVE-2023-48795 lists libssh2 1.11.1 as vulnerable while NVD does not.
It also shows kitty as vulnerable on macOS but NVD says Windows only.
Paramiko 2.11.0 shows as vulnerable but NVD does not.
🧑💻 Steps to reproduce
🕯️ More info (optional)
N/A
The text was updated successfully, but these errors were encountered: