Replies: 3 comments 1 reply
-
|
Hi @etarast , SUSE has 2 advisories fixing these CVEs: |
Beta Was this translation helpful? Give feedback.
-
|
Hi @DmitriyLewen |
Beta Was this translation helpful? Give feedback.
-
|
What you wrote does not prove that the report is correct, but only that Trivy is not able to recognize the patch. rpm -q --changelog python3-urllib3-1.25.10-150300.4.18.1.30994.1.PTF.1257371.noarch
But to know whether there is a plan to resolve this issue and avoid reporting false positives in case the fix comes through SUSE Program Temporary Fix (PTF) and make Trivy more reliable. |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
Question
We were running Trivy scan on image that use python3-urllib3 patched version as per changelog via SUSE Program Temporary Fix (PTF) 1.25.10-150300.4.18.1.30994.1.PTF.1257371
According to SUSE Advisory:
python3-urllib3 >= 1.25.10-150300.4.21.1
python311-urllib3 >= 2.0.7-150400.7.27.1
python311-urllib3_1 >= 1.26.18-150600.3.6.1
Trivy reports
"VulnerabilityID": "SUSE-SU-2026:0443-1",
"PkgID": "python3-urllib3@1.25.10-150300.4.18.1.30994.1.PTF.1257371.noarch",
"PkgName": "python3-urllib3",
"PkgIdentifier": {
"PURL": "pkg:rpm/suse/python3-urllib3@1.25.10-150300.4.18.1.30994.1.PTF.1257371?arch=noarch\u0026distro=sles-15.7",
"UID": "8436e187bad5ba58"
},
"InstalledVersion": "1.25.10-150300.4.18.1.30994.1.PTF.1257371",
"FixedVersion": "1.25.10-150300.4.21.1",
"Status": "fixed",
"Layer": {
"DiffID": "sha256:eee43940cdbeb635cb0ce01f30b118a3e59e03405e874f5617f148ed723713d4"
},
"SeveritySource": "suse-cvrf",
"DataSource": {
"ID": "suse-cvrf",
"Name": "SUSE CVRF",
"URL": "https://ftp.suse.com/pub/projects/security/cvrf/"
},
"Title": "Security update for python-urllib3",
"Description": "This update for python-urllib3_1 fixes the following issues:\n\n- CVE-2025-66471: excessive resource consumption via decompression of highly compressed data in Streaming API (bsc#1254867).\n- CVE-2025-66418: resource exhaustion via unbounded number of links in the decompression chain (bsc#1254866).\n- CVE-2026-21441: excessive resource consumption during decompression of data in HTTP redirect responses (bsc#1256331).\n",
"Severity": "MEDIUM",
"VendorSeverity": {
"suse-cvrf": 2
},
"References": [
"https://bugzilla.suse.com/1254866",
"https://bugzilla.suse.com/1254867",
"https://bugzilla.suse.com/1256331",
"https://lists.suse.com/pipermail/sle-security-updates/2026-February/024105.html",
"https://www.suse.com/security/cve/CVE-2025-66418/",
"https://www.suse.com/security/cve/CVE-2025-66471/",
"https://www.suse.com/security/cve/CVE-2026-21441/",
"https://www.suse.com/support/security/rating/",
"https://www.suse.com/support/update/announcement/2026/suse-su-20260443-1/"
]
But according to SUSE Program Temporary Fix (PTF) it is already patched:
Ref Security update for python-urllib3_1 SUSE Support
1254866 – (CVE-2025-66418) VUL-0: CVE-2025-66418: python-urllib3,python-urllib3_1,python36-urllib3: resource exhaustion via unbounded number of links in the decompression chain
So, has Trivy looking into SUSE PTF?
Target
None
Scanner
Vulnerability
Output Format
JSON
Mode
None
Operating System
SUSE Linux Enterprise Server 15 SP7
Version
Beta Was this translation helpful? Give feedback.
All reactions