wal-g CVE-2021-38599: +dirty pseudo-version, FixedVersion 1.1 — expected? #10477
Closed
AreejMohamedSaad
started this conversation in
False Detection
Replies: 1 comment
-
|
duplicate of #9446 |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
IDs
CVE-2021-38599
Description
What we built
A minimal image
wal-g-only:latestthat installs only the upstream wal-g PostgreSQL binary from the latest wal-g release on Ubuntu 24.04 (asset name patternwal-g-pg-24.04-amd64). The binary is installed at/usr/local/bin/wal-g.Put the
Dockerfilebelow in a directory such aswal-g-minimal/(save it aswal-g-minimal/Dockerfilenext to where you rundocker build).What Trivy reported
Report summary (from our run):
wal-g-only:latest(ubuntu 24.04)usr/local/bin/wal-gUbuntu layer: mix of LOW/MEDIUM (e.g.
libgcrypt,login/passwd,tar,systemd/udevwith some rows marked fixed vs affected depending on package/version).Go binary (
usr/local/bin/wal-g) — relevant excerpt:github.com/wal-g/wal-gv0.0.0-20260120170815-f81943e64bdf+dirty1.1stdlibv1.25.5wal-g --versionon the same binary reports a normal release line (e.g.wal-g version v3.0.8 … PostgreSQL), while the main module row uses a pseudo-version with+dirty, which is confusing for triage and dashboards.Why we’re filing
We want to confirm whether this mapping is intended (advisory data vs. embedded
buildinfo) and whether anything can be improved (e.g. clearer Status, version normalization for+dirtyrelease artifacts, or documentation so users know why release binaries look like this in Go binary scans).Reproduction Steps
wal-g-pg-24.04-amd64):trivy image --scanners vuln --format json -o trivy-wal-g-only.json wal-g-only:latest rg 'CVE-2021-38599|wal-g' trivy-wal-g-only.jsonExpected in our environment:
CVE-2021-38599appears under the gobinary target forgithub.com/wal-g/wal-gwith a pseudo-version containing+dirtyand FixedVersion1.1, alongside otherstdlib/grpcfindings.Note: Upstream renamed release assets; older docs use
wal-g-pg-ubuntu-20.04-amd64— that name 404s on current releases. Usewal-g-pg-24.04-amd64(or the flavor matching your base Ubuntu).Target
Container Image
Scanner
Vulnerability
Target OS
Ubuntu 24.04 (base image for the minimal repro)
Debug Output
Version
Checklist
-f jsonthat shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions