False positive: CVE-2023-37920 in SUSE Eco-system #6464
Replies: 1 comment
-
Hello @sekveaja
Trivy doesn't seem to understand that this package was installed using Can you write how you installed this package or create a test public image? Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
-
IDs
CVE-2023-37920
Description
Running Trivy on an image that has python3-certifi-2022.12.7-150000.1.4.noarch package installed.
The container O/S eco-system is a SLES 15 SP4.
Here is a portion of the output:
certifi (PKG-INFO) │ CVE-2023-37920 │ HIGH │ │ 2022.12.7 │ 2023.7.22 │ python-certifi: Removal of e-Tugra root certificate │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-37920 │
According to SUSE Advisory this CVE issue is not affected in SLES 15 SP4.
Therefore, it is a false positive in SLES 15 SP4 eco-system.
Here is the link from SUSE Advisory: https://www.suse.com/security/cve/CVE-2023-37920.html
SUSE Linux Enterprise Server 15 SP4 | python-certifi | Not affected.
Reproduction Steps
Target
Container Image
Scanner
Vulnerability
Target OS
SUSE 15 SP4
Debug Output
Version
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions