Potential vulnerability in Postgres CVE-2023-45853 zlib
Name and Version
bitnami/postgresql
What architecture are you using?
None
What steps will reproduce the bug?
During a recent scan of several images, I identified a potential vulnerability, CVE-2023-45853, which affects zlib versions up to 1.3. I would appreciate it if you could verify whether this vulnerability impacts the following images:
bitnami/postgresql:15.5.0-debian-11-r15 bitnami/postgresql-repmgr:16.2.0-debian-12-r4 bitnami/pgpool:4.5.0-debian-12-r9 bitnami/postgres-exporter:0.15.0-debian-11-r3
Thanks, Ohad
I understand your concern regarding security vulnerabilities. While we regularly update our images with the latest system packages, certain CVEs may persist until they are patched in either the OS or the application. You can learn more about our CVE policy here.
This vulnerability is not fixed by the OS, you can check that by using the --ignore-unfixed in the scanner:
$ trivy image bitnami/postgresql:15.5.0-debian-11-r15 --ignore-unfixed | grep '2023-45853'
2024-05-03T09:08:46.890+0200 INFO Vulnerability scanning is enabled
2024-05-03T09:08:46.890+0200 INFO Secret scanning is enabled
2024-05-03T09:08:46.890+0200 INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-05-03T09:08:46.890+0200 INFO Please see also https://aquasecurity.github.io/trivy/v0.50/docs/scanner/secret/#recommendation for faster secret detection
2024-05-03T09:08:48.849+0200 INFO Detected OS: debian
2024-05-03T09:08:48.849+0200 INFO Detecting Debian vulnerabilities...
2024-05-03T09:08:48.866+0200 INFO Number of language-specific files: 2
2024-05-03T09:08:48.866+0200 INFO Detecting bitnami vulnerabilities...
2024-05-03T09:08:48.868+0200 INFO Detecting jar vulnerabilities...
VS
$ trivy image bitnami/postgresql:15.5.0-debian-11-r15 | grep '2023-45853'
2024-05-03T09:09:07.941+0200 INFO Vulnerability scanning is enabled
2024-05-03T09:09:07.942+0200 INFO Secret scanning is enabled
2024-05-03T09:09:07.942+0200 INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-05-03T09:09:07.942+0200 INFO Please see also https://aquasecurity.github.io/trivy/v0.50/docs/scanner/secret/#recommendation for faster secret detection
2024-05-03T09:09:09.380+0200 INFO Detected OS: debian
2024-05-03T09:09:09.380+0200 INFO Detecting Debian vulnerabilities...
2024-05-03T09:09:09.400+0200 INFO Number of language-specific files: 2
2024-05-03T09:09:09.400+0200 INFO Detecting bitnami vulnerabilities...
2024-05-03T09:09:09.401+0200 INFO Detecting jar vulnerabilities...
│ zlib1g │ CVE-2023-45853 │ CRITICAL │ will_not_fix │ 1:1.2.11.dfsg-2+deb11u2 │ │ zlib: integer overflow and resultant heap-based buffer │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-45853 │
If you have any further questions, feel free to ask.
This Issue has been automatically marked as "stale" because it has not had recent activity (for 15 days). It will be closed if no further activity occurs. Thanks for the feedback.
Due to the lack of activity in the last 5 days since it was marked as "stale", we proceed to close this Issue. Do not hesitate to reopen it later if necessary.