CVE Vulnerabilities

36 views
Skip to first unread message

Quentin Reul

unread,
Feb 23, 2022, 4:37:19 AM2/23/22
to semanticturkey-user
Hi team,

While creating a docker image for the latest release, we identified several critical vulnerabilities impacting the latest Semantic Turkey release (see attached screenshot). Is this something that you are planning to address in the near future?

We look forward to hearing from you.

Kind regards,

Quentin Reul

Screen Shot 2022-02-22 at 8.09.37 PM.png

Armando Stellato

unread,
Feb 23, 2022, 8:51:36 PM2/23/22
to semantict...@googlegroups.com

Dear Quentin,

 

looks like the first and last one can be addressed and indeed will do for the next release.

 

About all the others (which in the end, are like one, connected to the netty server), this depends on the Karaf container, and we just moved to the latest version for 10.2.1

When we are close to releasing 11.0 (ETA start of May), we might consider updating to a new Karaf, if it is available with an update for the netty server

 

Kind Regards,

 

Armando

 

P.S: I’ve approved your msg explicitly since you are not registered to the group. Since it’s not the first time you write here, can I ask you to register to the group? As you can see, it’s not intensely populated with msgs (VocBench’s group is more frequented, though still acceptable)

 

 

--
You received this message because you are subscribed to the Google Groups "semanticturkey-user" group.
To unsubscribe from this group and stop receiving emails from it, send an email to semanticturkey-...@googlegroups.com.
To view this discussion on the web visit https://groups.google.com/d/msgid/semanticturkey-user/f6cdb558-bf0f-49d5-b7ac-00c752eb650bn%40googlegroups.com.

Manuel Fiorelli

unread,
Mar 7, 2022, 12:17:29 PM3/7/22
to semantict...@googlegroups.com, quentin...@gmail.com
Hi Quentin,

we worked on these vulnerabilities, and we believe we have fixed them all. Please, can you use the SNAPSHOT build and the modified Dockerfile available at this link (https://uniroma2-my.sharepoint.com/:u:/g/personal/armando_stellato_uniroma2_eu/EcsZdXvrJ1pHg2GbSMd7iKUBvWdcSlsK7iXZKrnbw2i0qg?e=JRto8t) to do the build and repeat the scan, to confirm that indeed we fixed the vulnerabilities?

Regards,
Manuel



--
Manuel Fiorelli

hugovanv...@gmail.com

unread,
Oct 12, 2022, 10:40:19 AM10/12/22
to semanticturkey-user
Hi all,

I recently made a new build of Semantic Turkey with tag version 11.2 and built a Docker image with that. My CVE scanner (Trivy) reports 9 "critical" and 35 "high" vulnerabilities. A lot of them are org.springframework dependencies. I've added the report (json) to this message.

I've tried to fix some vulnerabilities by adding newer versions of the dependencies to the pom, but unfortunately wasn't able to make a successful build.

Could you please tell me if you plan to solve these vulnerabilities? Or if they maybe should be regarded as 'false positives'?

Kind regards,

Hugo
Op maandag 7 maart 2022 om 18:17:29 UTC+1 schreef Manuel Fiorelli:
trivy-results-st11-2.json

Armando Stellato

unread,
Oct 18, 2022, 4:49:00 PM10/18/22
to semantict...@googlegroups.com

Dear Hugo,

 

apologies for the late reply.

 

Short answer is: we have already checked all possible (remaining) CVEs which, as you can see mostly relate to Spring. These do not apply for various reasons: e.g. they apply only if some class is being used, or they apply only when the JVM is 9+ (but VB3 requires strictly 8.x.y), etc..

 

The reason for them being vetted but still present is that it’s not always possible (or extremely difficult) for us to move to a newer version. One of the dependencies of Semantic Turkey is on Spring DM, which is the module “marrying” Spring with OSGi. Unfortunately, the two frameworks eventually “divorced”, and since Spring 4.0, Spring DM is no more supported. For the future, we will surely bring some heavy reworking to the core infrastructure of Semantic Turkey, trying to maintain the superficial form (e.g. so that the services keep their syntax, annotations, etc..) while adopting a different way to implement the dynamic part related to extension points, plugins, etc..

 

In the meanwhile, we guarantee that Semantic Turkey (and thus VB and SV) are safe (at least, at the best of known vulnerabilities :-) ).


Kind Regards,

 

Armando

 

P.S: Trivy has a nice readable export. Possibly better to use that one as not everybody uses Trivy for dependency and vulnerability checking

 

 

Reply all
Reply to author
Forward
0 new messages