quay / clair

Vulnerability Static Analysis for Containers

Home Page:https://quay.github.io/clair/

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

Warning: Not all updaters succeeded

vmicrodev opened this issue · comments

commented

Description of Problem / Feature Request

Hi everyone,

When performing Clair Vulnerabilities update there are several updater warnings and a warning "Not all updaters succeeded".
Full log output is under https://raw.githubusercontent.com/vmicrodev/Clair/master/Clair.txt.

For instance:
Sample log is shown below truncated
.
[35mclair_clair_635 |�[0m {"Event":"could not pull ubuntu-cve-tracker repository","Level":"error","Location":"ubuntu.go:174","Time":"2021-09-13 14:57:03.544848","error":"exit status 128","output":"Cloning into '.'...\nfatal: unable to access 'https://git.launchpad.net/ubuntu-cve-tracker/': The requested URL returned error: 503\n"}
�[35mclair_clair_635 |�[0m {"Event":"an error occured when fetching update","Level":"error","Location":"updater.go:246","Time":"2021-09-13 14:57:03.545132","error":"could not download requested resource","updater name":"ubuntu"}
�[35mclair_clair_635 |�[0m {"Event":"could not determine a valid package from criterions","Level":"warning","Location":"oracle.go:352","Time":"2021-09-13 14:57:04.113411","criterions":"[{glibc is ksplice-based} {Oracle Linux arch is x86_64} {Oracle Linux 7 is installed}]"}
�[35mclair_clair_635 |�[0m {"Event":"could not determine a valid package from criterions","Level":"warning","Location":"oracle.go:352","Time":"2021-09-13 14:57:04.113999","criterions":"[{glibc-common is ksplice-based} {Oracle Linux arch is x86_64} {Oracle Linux 7 is installed}]"}
�[35mclair_clair_635 |�[0m {"Event":"could not determine a valid package from criterions","Level":"warning","Location":"oracle.go:352","Time":"2021-09-13 14:57:04.114369","criterions":"[{glibc-devel is ksplice-based} {Oracle Linux arch is x86_64} {Oracle Linux 7 is installed}]"}
�[35mclair_clair_635 |�[0m {"Event":"could not determine a valid package from criterions","Level":"warning","Location":"oracle.go:352","Time":"2021-09-13 14:57:04.114663","criterions":"[{glibc-headers is ksplice-based} {Oracle Linux arch is x86_64} {Oracle Linux 7 is installed}]"}
�[35mclair_clair_635 |�[0m {"Event":"could not determine a valid package from criterions","Level":"warning","Location":"oracle.go:352","Time":"2021-09-13 14:57:04.114953","criterions":"[{glibc-static is ksplice-based} {Oracle Linux arch is x86_64} {Oracle Linux 7 is installed}]"}
�[35mclair_clair_635 |�[0m {"Event":"could not determine a valid package from criterions","Level":"warning","Location":"oracle.go:352","Time":"2021-09-13 14:57:04.115232","criterions":"[{glibc-utils is ksplice-based} {Oracle Linux arch is x86_64} {Oracle Linux 7 is installed}]"}
�[35mclair_clair_635 |�[0m {"Event":"could not determine a valid package from criterions","Level":"warning","Location":"oracle.go:352","Time":"2021-09-13 14:57:04.115489","criterions":"[{nscd is ksplice-based} {Oracle Linux arch is x86_64} {Oracle Linux 7 is installed}]"}
.

[35mclair_clair_635 |�[0m {"Event":"could not determine a valid package from criterions","Level":"warning","Location":"rhel.go:308","Time":"2021-09-13 14:57:06.706953","criterions":"[{kernel version 0:3.10.0-1062.1.1.el7 is currently running} {kpatch-patch not installed for 0:3.10.0-1062.1.1.el7} {kernel version equals 0:3.10.0-1062.1.1.el7} {Red Hat Enterprise Linux 7 is installed}]"}
.

[35mclair_clair_635 |�[0m {"Event":"could not determine a valid package from criterions","Level":"warning","Location":"rhel.go:308","Time":"2021-09-13 14:57:07.380467","criterions":"[{Red Hat Enterprise Linux 8 is installed} {kernel version 0:4.18.0-305.3.1.el8_4 is set to boot up on next boot} {kpatch-patch not installed for 0:4.18.0-305.3.1.el8_4} {kernel version equals 0:4.18.0-305.3.1.el8_4}]"}

.

[35mclair_clair_635 |�[0m {"Event":"Debian bookworm is not mapped to any version number (eg. Jessie-\u003e8). Please update me.","Level":"warning","Location":"debian.go:134","Time":"2021-09-13 14:57:04.506405"}
.

[35mclair_clair_635 |�[0m {"Event":"fetcher note","Level":"warning","Location":"updater.go:214","Time":"2021-09-13 15:13:14.036074","note":"Debian bookworm is not mapped to any version number (eg. Jessie-\u003e8). Please update me."}
.

�[35mclair_clair_635 |�[0m {"Event":"Not all updaters succeeded, sleep duration: 30s","Level":"warning","Location":"updater.go:136","Time":"2021-09-13 15:13:14.037116"}

Expected Outcome

  • No Warnings for updaters
  • All updaters succeeded

Actual Outcome

  • Warnings for updaters
  • Not all updaters succeeded

Environment

Clair version/image: V2.1.7
Clair client name/version:
Host OS: Debian GNU/Linux 10 (buster)
Kernel (e.g. uname -a): Linux ip-10-110-42-59 4.19.0-17-cloud-amd64 Docs: fix some typos in README.md #1 SMP Debian 4.19.194-3 (2021-07-18) x86_64 GNU/Linux
Kubernetes version (use kubectl version):
Network/Firewall setup:

commented

As a test reference I compared the outcome of Clair using this updated DB with AWS Clair for the following image:
php:8.0-fpm-buster

2 missing entries CVE-2019-12904 - MEDIUM and CVE-2020-26159 - HIGH are not in Clair output while are on AWS Clair.

Found 266 vulnerabilities (should be 268)

Unknown: 11
Negligible: 172
Low: 45
Medium: 31 (should be 32)
High: 6 (should be 7)
Critical: 1

commented

Hi Everyone,

The ticket is closed, so could you kindly please advise if it would be resolved and what can be the solution for the bug then?

Thanks

This will only be changed if someone submits patches to change it.