Received: from EUR05-DB8-obe.outbound.protection.outlook.com (mail-db8eur05on2137.outbound.protection.outlook.com [40.107.20.137]) by nld3-dev1.alpinelinux.org (Postfix) with ESMTPS id 9262B782BA1 for <~alpine/devel@lists.alpinelinux.org>; Thu, 29 Apr 2021 09:38:35 +0000 (UTC) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=QuIGMywxut7jSpwYDjZNum0iyLKXUhOIOnP1duqJuY6F6mXY7cysmC0YqF3pRuFpgoT5dnJNkg/UO1RVUnSu6uD3HPWTttOQKcAbSCnEsZKUC/PE2FhvPKXBZq5/JlRW2Fkzw9xQaGsF+fKdeU9Yc2R3PBrTLrztcXpyLqV8ZhLOrNAv3EMH5QyhQYDnqY/o0SkfZZeMz/tkNONiDCwZCuO2pnmnpAdySHgiAzbCuSqDXnczO+cbX/qgzCMZTkoPZWf3RmTPJARMdW2L9b7/VYed4Jl7WZrwCrNpgirmojiKRYvEc1QcOu/bUolWvzRncbjF6bkdRTHfOkGb7eRWvQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KCTDHQ6aBbit9PsT8U6bSFKPUJFVY/nKXMAobSayP/k=; b=Q+FYWXT386jiq/QSuZKsPgj1n6IQbc/Eg9dFiXfkYbHOVbzYD6gyFEmSDZ9sLhmBIUWCk7jga9sXGTSpMAYJSUENikSe/p6ukWX5+7ndZfscuOTvf1GqzGLPOESS3R1teAih3BLv7/9UUQaBQr9TmK0423JKx8nbO2v2Ed+Azk4IuIb94zQ6yaJ/w9FEZfQCXHEgOXr6HVpP3WMS6ZK1HH2Z9rP9av0JQPmanr/SyWpFN6+mq7lgYO51WkWagquSkF/OJMEZsavZEf4qAh9Uf1hSZ63vl5K2PaEhJwL+XyA3yjbc06FE13jfdNxFNLJHQDpMd0X/m4txQHB84Q6ncQ== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=aquasec.com; dmarc=pass action=none header.from=aquasec.com; dkim=pass header.d=aquasec.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Aquasec.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=KCTDHQ6aBbit9PsT8U6bSFKPUJFVY/nKXMAobSayP/k=; b=YoJngTkk+vHkIK5mKLtMNSxwF9frS3A2AsDbttkrCLHrTL+M2NS5+Fd0iRrO3QCsJNkm7IZ8HB7ZwIQxEMygN7A125K3rqWp7FG5Xayq7cJ/Ljnwo8GNM5t4AY85F7xdLMk5tYaD1w9TYb+TiMC6XHmlHvM7FyDxUCCdP0nqbxqIcMq3a7zgUFySp1TMdkLDgtVIDWVRdXAe0GNi30y1iyt5bstoFukPPTO0IhjYZHFInm3MkSzJSWN5juVji6J2LOi4dhOGWbFl8T7R55HJ6I/mnl94gT6AEzM+kVDJyqZh8h86a/CXL6Tf2fJ46n+pcil3fsOLQUTKcon2hjs1TA== Received: from AM6PR03MB4711.eurprd03.prod.outlook.com (2603:10a6:20b:b::25) by AM6PR03MB3544.eurprd03.prod.outlook.com (2603:10a6:209:2f::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4065.21; Thu, 29 Apr 2021 09:38:33 +0000 Received: from AM6PR03MB4711.eurprd03.prod.outlook.com ([fe80::a1e9:e357:f67a:6a00]) by AM6PR03MB4711.eurprd03.prod.outlook.com ([fe80::a1e9:e357:f67a:6a00%7]) with mapi id 15.20.4065.027; Thu, 29 Apr 2021 09:38:33 +0000 From: Nir Ben-Eliezer To: Ariadne Conill CC: "~alpine/devel@lists.alpinelinux.org" <~alpine/devel@lists.alpinelinux.org> Subject: RE: Security dispute over nodejs vulnerability in Alpine - Help! Thread-Topic: Security dispute over nodejs vulnerability in Alpine - Help! Thread-Index: Adc8ZJoE1wXjMpkARyK94xZIcwCv1wADeZLgAABMCYAAAOd0QAAB85mAAAA47YAAFg838A== Date: Thu, 29 Apr 2021 09:38:33 +0000 Message-ID: References: <617756a6-b38c-aa47-86bd-269661b85522@dereferenced.org> <1933c278-6817-4ff3-13d9-bbaaaa91da1@dereferenced.org> In-Reply-To: <1933c278-6817-4ff3-13d9-bbaaaa91da1@dereferenced.org> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: authentication-results: dereferenced.org; dkim=none (message not signed) header.d=none;dereferenced.org; dmarc=none action=none header.from=aquasec.com; x-originating-ip: [212.59.64.171] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 3429ed97-1f51-4cde-25e0-08d90af28e1a x-ms-traffictypediagnostic: AM6PR03MB3544: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:7691; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255;CTRY:;LANG:en;SCL:1;SRV:;IPV:NLI;SFV:NSPM;H:AM6PR03MB4711.eurprd03.prod.outlook.com;PTR:;CAT:NONE;SFS:(4636009)(366004)(136003)(376002)(346002)(396003)(39830400003)(66476007)(4326008)(316002)(52536014)(8676002)(66556008)(5660300002)(64756008)(66946007)(76116006)(66446008)(33656002)(2906002)(38100700002)(71200400001)(83380400001)(6506007)(45080400002)(186003)(966005)(478600001)(7696005)(26005)(122000001)(53546011)(55016002)(15650500001)(8936002)(9686003)(6916009)(86362001);DIR:OUT;SFP:1102; x-ms-exchange-antispam-messagedata: =?us-ascii?Q?xczM/u1pIYiYVW+KzXhdKc04TiFQir6AWuOq5KwZbuW12Z5uhEWhulR5t7NB?= =?us-ascii?Q?HXVNz9lX9dcvkUMMGJZsM5fDtIZ6d2yudkIv9ljQ5OuuXB7kqAhZZSk/cO+U?= =?us-ascii?Q?yKWZZBKrpSLpMEkW3VrCybJnQp9iZ+739qxnKZA7JpAUp+QquwDtad8r9bhe?= =?us-ascii?Q?ef+A5iFC670SVjIukQyB7SSSA4r++6Pz+6G0/btKtRWdvNca7a6HXpRhmH7p?= =?us-ascii?Q?VHrlz/OikOpzsOFu9XtENcwsx6AbUjpnYZ6aiOGjyMwKjB5GGEID1d3Za+w1?= =?us-ascii?Q?WbzM0WZQ9erkoQBBvGF+2CtStMiAMr43jwB+77WAkKDRs2T9Xz+rnATh4zIo?= =?us-ascii?Q?JOXyZ1RCcqZfWR63gpr+UCxUIyFJA+RVc1smkvpfFBkg4C1fTYyhvxA0EZua?= =?us-ascii?Q?uqw0D+toAFzG/DsLsaR1x7vC1pu9voGCE0UatJSYnCBK6CDw630+6eSWIFw6?= =?us-ascii?Q?HjZZGs6lNmc4SVFGYrNb05LOTwdSArBNCYjjf1wXVud+4e4+fWNLJruEgIPg?= =?us-ascii?Q?Nj/sF7vSbR1dUn7InQRG0NPQKT8Ff0NsLtThngUcriztyCg1tLD716BEb1Ht?= =?us-ascii?Q?pwnsMlBl7DUpa9CWk3bTL5xdtcWBibyo5vpohHJLWiPmdYVS10R/gQrkiOg6?= =?us-ascii?Q?3FAtZBYERZCcch4QgriGBztEkDZuH1rLj4VeBV3SudROrrTJKF8QXMd4NRHi?= =?us-ascii?Q?2lfizDgY/s9JgUKUT9GCFX3dAjigX8H449Huf/IVUb8kluiKEpLpLj0k7riS?= =?us-ascii?Q?OZVdFKsxb5U21cE/mys7Rk2mCMMW5bwPVfObeRTW4Wpivfkvx7sk3MxtYB9X?= =?us-ascii?Q?tVj1OL0GI6haqIbBiTnnA109zccT+CZSO8VlJuvKVeiMx6meo7jOR2yoThjE?= =?us-ascii?Q?eT6vpMsLE8jmf4gK7Gp0ba+X/5p9g6qd8z2zAt6uPh3jvrbhMO3JQI2Um16g?= =?us-ascii?Q?FkGlSqThhJDW6BoK0agP1i9FunRwJ8jno13bHxd4DqJfKKdLoOhzMybMPeao?= =?us-ascii?Q?K3khIuaEcqLlDu7UbXj9zx+duu3PbYQLAJUxWozRdF3IOjAyRDZzhyNx8RwB?= =?us-ascii?Q?EYdHF7njSiXkTgmdO2cZQsiL/w9wo1yTxUXi9z8PCVxbe9GayNrczuH2w/qe?= =?us-ascii?Q?11WP3hhub3tzxMCxYVZoUQszwBvzD+5U+sjp9/tqY419CXf62cSpgMOR47eg?= =?us-ascii?Q?/xjtjoAQXcE2FQ4iZOQakYOPVPza7cvqhQcS6LwiVcR7rYdBQKhE0c0Avfhm?= =?us-ascii?Q?7rpQ0Dur7ThCzveyk63DhfuUPwGGJWaEUGmofjx3fseOWwRQHgrQFIkxiL+w?= =?us-ascii?Q?8YrMvlbFv3qjWtiHmBaB66VA?= x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: aquasec.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: AM6PR03MB4711.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 3429ed97-1f51-4cde-25e0-08d90af28e1a X-MS-Exchange-CrossTenant-originalarrivaltime: 29 Apr 2021 09:38:33.1727 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: bc034cf3-566b-41ca-9f24-5dc49474b05e X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 917dmaGwtP5MVD80SRK0Ouq9s9nhS/vEPORafJCaqL14ZFPYkp4ETsKmIcjeSkDN8ce2tZAfZeyk3ck97T3TNyXAsAH5R5q7/Z3q0a+paw0= X-MS-Exchange-Transport-CrossTenantHeadersStamped: AM6PR03MB3544 Hey, I checked https://secdb.alpinelinux.org/v3.13/main.json and https://secdb.a= lpinelinux.org/v3.13/community.json. As you said, this data should be the m= ost reliable source. Note we are talking about Alpine 3.13. Here's what I found: 1. "main.json" lists package "nodejs" and lists CVE-2020-8265 as fixed in v= ersion 14.15.4-r0. This CVE does not appear anywhere else in this json.=20 2. "community.json" lists package "nodejs-current" and lists CVE-2020-8265 = as fixed in version 15.5.1-r0.=20 Do you know the reason for the difference? So... I'm a bit confused. At the beginning you said that the fact we find C= VE-2020-8265 on an Alpine 3.13 image, running nodejs v12.20.1 - is a false = positive. In your latest message, however, you mention that Alpine 3.13 doe= s not credit v12.20.1 with the fix for CVE-2020-8265 because that version = was never published in Alpine 3.13, only Alpine 3.12.=20 And finally, when looking at the Alpine 3.13 branch in secdb, which is supp= osed to be reliable, I see information which indicates that the scanners ar= e working correctly. This is what they all do: 1. They identify the OS as Alpine 3.13 - correct. This is the OS the custom= er is running. 2. They identify a nodejs v12.20.1 APK installed on the machine - correct. = This is the package the customer installed. 3. They identify it is vulnerable to CVE-2020-8265. Should be correct becau= se Alpine doesn't credit v12.20.1 with the fix for this CVE, as you said be= fore. 4. They identify Alpine's recommendation to upgrade nodejs to 14.15.4-r0 in= order to fix the problem. This is correct according to secdb.alpinelinux.o= rg/v3.13/main.json I am failing to see what the scanners are doing incorrectly and why you con= sider this a false positive. I appreciate your help and support on this.=20 -----Original Message----- From: Ariadne Conill =20 Sent: Thursday, April 29, 2021 1:44 AM To: Ariadne Conill Cc: Nir Ben-Eliezer ; ~alpine/devel@lists.alpi= nelinux.org Subject: RE: Security dispute over nodejs vulnerability in Alpine - Help! Hello, On Wed, 28 Apr 2021, Ariadne Conill wrote: > Hello, > > On Wed, 28 Apr 2021, Nir Ben-Eliezer wrote: > >> Hi Ariadne, and thank you very much for your quick response. >>=20 >> I am asking this on behalf of one of our customers. I've used three=20 >> different scanners, all yield the same result, identifying nodejs=20 >> v12.20.1 as vulnerable in Alpine 3.13, and recommending to upgrade it=20 >> to v14.15.4-r0, where it is fixed. >>=20 >> The reason why the scanners behave this way is due to the information=20 >> listed on this=20 >> page:https://eur02.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2= Fgit.alpinelinux.org%2Faports%2Fblame%2Fmain%2Fnodejs%2FAPKBUILD%3Fh%3D3.13= -stable&data=3D04%7C01%7Cnir.ben-eliezer%40aquasec.com%7C8a62227e268a45= 00f7de08d90a97252c%7Cbc034cf3566b41ca9f245dc49474b05e%7C0%7C0%7C63755246655= 9824167%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI= 6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3DcoTcBv%2FszxiKYcSjQ7pIn6MyLLW4Bb= WytPupW8qBtoQ%3D&reserved=3D0. >> If you scroll down to rows 18-19, you'll see this: >> +# 14.15.4-r0: >> +# - CVE-2020-8265 >> +# - CVE-2020-8287 >>=20 >> Indicating that CVE-2020-8265 is fixed in nodejs 14.15.4-r0 on=20 >> Alpine's >> 3.13 branch. I did not find any place indicating that nodejs v12.20.1=20 >> also contains the fix in Alpine branch 3.13. > > It appears that your scanners are probably using our security=20 > databases incorrectly, or at least making the wrong assumptions about=20 > how the version lifecycle works in secfixes land. > > To explain: we publish security databases for every branch of Alpine,=20 > these can be fetched at=20 > https://eur02.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fsecd > b.alpinelinux.org%2F&data=3D04%7C01%7Cnir.ben-eliezer%40aquasec.com%7= C8a62227e268a4500f7de08d90a97252c%7Cbc034cf3566b41ca9f245dc49474b05e%7C0%7C= 0%7C637552466559824167%7CUnknown%7CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoi= V2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%3D%7C3000&sdata=3Daq3vpPQHfiP%2BCOl= ANUX2ZE3Voa3%2FR0qgnX3Usz5Zqok%3D&reserved=3D0. These databases are co= mpiled from the perspective of each branch. Or in other words, they only d= escribe versions that are published in that branch. > > Incidentally, one or more security companies are presently scraping=20 > our cgit instance for this information. It may be that you have stale=20 > information about the v3.13 branch if your security scanners were=20 > doing this, as we have recently taken action to stop abuse of our cgit=20 > instance for this purpose. In that case, see the above note about=20 > secdb.alpinelinux.org and you will have more reliable data. > > Anyway, Alpine 3.13 does not credit v12.20.1 with the fix for=20 > CVE-2020-8265 because that version was never published in Alpine 3.13, on= ly Alpine 3.12. > > Each security database publishes information based on what packages=20 > have been published in that branch. > > You may also wish to look at our security database viewer at=20 > https://eur02.safelinks.protection.outlook.com/?url=3Dhttps%3A%2F%2Fsecu > rity.alpinelinux.org%2Fvuln%2FCVE-2020-8265&data=3D04%7C01%7Cnir.ben > -eliezer%40aquasec.com%7C8a62227e268a4500f7de08d90a97252c%7Cbc034cf356 > 6b41ca9f245dc49474b05e%7C0%7C0%7C637552466559824167%7CUnknown%7CTWFpbG > Zsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0% > 3D%7C3000&sdata=3DlUnjQo5CpTGEcdVpnmNtHUvT9Co76AGnBFZ0rNaXfgo%3D& > ;reserved=3D0, which shows both Alpine > 3.12 and 3.13 having fixes in their respective versions of Node. Or they would if the CPE rules matched the actual package name... :) But you can at least view the CPE rules for that one. Ariadne