Commit graph

27 commits

Author SHA1 Message Date
Lucas Manuel Rodriguez
9a6c5c3f48
Ignore CVEs on fleetdm/wix (#43226)
Fixes https://github.com/fleetdm/fleet/actions/runs/24121241577.

New run: https://github.com/fleetdm/fleet/actions/runs/24140346610
2026-04-08 17:48:42 -03:00
Lucas Manuel Rodriguez
30f1719aca
Ignore CVEs on fleetdm/fleetctl (#43240)
Fixes:
https://github.com/fleetdm/fleet/actions/runs/24121419823/job/70444895796

Run: https://github.com/fleetdm/fleet/actions/runs/24142910735
2026-04-08 17:46:41 -03:00
Lucas Manuel Rodriguez
93a782ab61
Add ignore to CVE found in fleetdm/fleetctl (#42711)
Fixes:
https://github.com/fleetdm/fleet/actions/runs/23783786066/job/69302104997

Test runs: 
- https://github.com/fleetdm/fleet/actions/runs/23798426124
- https://github.com/fleetdm/fleet/actions/runs/23798449109
2026-03-31 10:27:07 -03:00
Lucas Manuel Rodriguez
8b3674bc55
Fix CVE fleetdm/fleet alerts (#42314)
Fixes
https://github.com/fleetdm/fleet/actions/runs/23476076250/job/68309012488.

Runs:
- https://github.com/fleetdm/fleet/actions/runs/23498265614
2026-03-24 17:38:46 -03:00
Lucas Manuel Rodriguez
3aa63d804b
Fix fleetdm/wix warnings (#42312)
Fixes
https://github.com/fleetdm/fleet/actions/runs/23475951459/job/68308629296.

Runs:
- https://github.com/fleetdm/fleet/actions/runs/23497560995 (remote)
- https://github.com/fleetdm/fleet/actions/runs/23497590149 (local)
2026-03-24 17:38:33 -03:00
Lucas Manuel Rodriguez
4f59eaceea
Add ignores for CVE-2026-0861 in bomutils (#42292)
Resolves
https://github.com/fleetdm/fleet/actions/runs/23476296008/job/68309683127.

Run: 
- https://github.com/fleetdm/fleet/actions/runs/23487678187
- https://github.com/fleetdm/fleet/actions/runs/23487670926
2026-03-24 12:10:49 -03:00
Lucas Manuel Rodriguez
ec9610bcea
Fix security warnings on fleetdm/fleetctl (#42276)
Fixes: https://github.com/fleetdm/fleet/actions/runs/23424438962

New runs: 
- Local: https://github.com/fleetdm/fleet/actions/runs/23463124995.
- Remote: https://github.com/fleetdm/fleet/actions/runs/23463145956.
2026-03-24 12:10:29 -03:00
Lucas Manuel Rodriguez
7bb72ccaa1
Ignore false positive CVE in fleet (#41643)
Fixes:
https://github.com/fleetdm/fleet/actions/runs/23038788027/job/66912481418

Run with this branch:
https://github.com/fleetdm/fleet/actions/runs/23060265057
2026-03-16 10:36:50 -03:00
Lucas Manuel Rodriguez
da34876029
Ignore vulnerabilities in fleetdm/fleetctl (#41647)
Fixes
https://github.com/fleetdm/fleet/actions/runs/23038854478/job/66912680981.

Run with this branch:
https://github.com/fleetdm/fleet/actions/runs/23058249026
2026-03-13 14:22:40 -03:00
Lucas Manuel Rodriguez
a97f04b2f6
Add rule to exclude CVE-2026-23517 from fleetctl (#39097)
Run: https://github.com/fleetdm/fleet/actions/runs/21530332523.
2026-02-02 13:15:41 -03:00
Lucas Manuel Rodriguez
3957fc990c
Skip openssl vulns in Fleet (#39098)
Run: https://github.com/fleetdm/fleet/actions/runs/21532057134
2026-02-02 11:56:39 -03:00
Lucas Manuel Rodriguez
c1d13ed858
Fix WiX alerts (#37572) 2025-12-19 17:26:26 -06:00
Lucas Manuel Rodriguez
c557bcb782
Update security status (#37086)
Update our `security/status.md` file after analyzing currently reported
vulnerabilities.

https://github.com/fleetdm/fleet/actions/runs/20115346825
<img width="1711" height="645" alt="Screenshot 2025-12-10 at 7 41 00 PM"
src="https://github.com/user-attachments/assets/97e17b58-50a8-4556-9ceb-bcb6701d7d61"
/>
2025-12-11 10:42:50 -03:00
Lucas Manuel Rodriguez
322438e4cb
Fix docker publish failures (#33690)
Fixing https://github.com/fleetdm/fleet/actions/runs/18150944735.

- It seems that when not using the RC versions it cannot determine the
version of the github.com/fleetdm/fleet/v4 package , so it assumes it's
using `v4.0.0` thus causing alerts around our recent SAML vulnerability
(already fixed). So I'm changing it to only run on RC cuts, not every
day.
- Also adding a skip rule for a new CVE that we are not affected by.
2025-10-02 13:12:13 -03:00
Lucas Manuel Rodriguez
93bea23859
Add CVE scanning for fleetdm/wix and split out workflows (#33687)
Attempting to fix
https://github.com/fleetdm/fleet/actions/runs/18120473187/job/51564073671#step:11:38

Changes:
- The docker images are too big so they started to cause issues in
Github runners. Thus I'm splitting the one workflow into three separate
workflows, one for each image.
- While we are at it: start tracking vulnerabilities in fleetdm/wix and
fleetdm/bomutils.

New runs:
-
https://github.com/fleetdm/fleet/actions/runs/18161326970/job/51692559418
-
https://github.com/fleetdm/fleet/actions/runs/18161326953/job/51692559257
-
https://github.com/fleetdm/fleet/actions/runs/18161326952/job/51692559172
2025-10-01 19:37:22 -03:00
Lucas Manuel Rodriguez
4fc731b9b2
Skip CVE in fleetctl (#33267)
Fixes https://github.com/fleetdm/fleet/actions/runs/17906206819.
2025-09-22 18:55:08 -03:00
Lucas Manuel Rodriguez
f16b58d576
Fix vulnerability report in fleetdm/fleet and properly fix in fleetdm… (#33026) 2025-09-16 12:06:45 -05:00
Lucas Manuel Rodriguez
0b0066bfe5
Add VEX rule to remove CVE-2025-27509 false positive on fleetctl (#32914) 2025-09-12 08:54:46 -05:00
Lucas Manuel Rodriguez
e37e14f78d
Generate new osquery 5.18.1 flags, catch up VEX report (#31648)
Adding new flags added to osquery 5.18.1.
2025-08-08 10:49:23 -03:00
Lucas Manuel Rodriguez
83961c0d02
Add VEX for CVE-2025-22874 and generate report (#30258)
We missed to add this when we upgraded Go to 1.24.4.
Report
https://github.com/fleetdm/fleet/actions/runs/15626203997/job/44020838145

How to test (with and without the new VEX file):
```
docker scout cves --only-fixed --vex-location=./security/vex/fleet --only-vex-affected --only-severity high,critical fleetdm/fleet:v4.69.0
```
2025-06-25 15:13:34 -03:00
Scott Gress
ed8506dd77
Add VEX statements for libxml2 CVEs (#30011)
This PR adds VEX statement files for three vulverabilities:

```
┌─────────┬────────────────┬──────────┬──────────┬─────────────────────────┬───────────────┬──────────────────────────────────────────────────────────────┐
│ Library │ Vulnerability  │ Severity │  Status  │    Installed Version    │ Fixed Version │                            Title                             │
├─────────┼────────────────┼──────────┼──────────┼─────────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ libxml2 │ CVE-2025-49794 │ CRITICAL │ affected │ 2.9.14+dfsg-1.3~deb12u1 │               │ libxml: Heap use after free (UAF) leads to Denial of service │
│         │                │          │          │                         │               │ (DoS)...                                                     │
│         │                │          │          │                         │               │ https://avd.aquasec.com/nvd/cve-2025-49794                   │
│         ├────────────────┤          │          │                         ├───────────────┼──────────────────────────────────────────────────────────────┤
│         │ CVE-2025-49795 │          │          │                         │               │ libxml: Null pointer dereference leads to Denial of service  │
│         │                │          │          │                         │               │ (DoS)                                                        │
│         │                │          │          │                         │               │ https://avd.aquasec.com/nvd/cve-2025-49795                   │
│         ├────────────────┤          │          │                         ├───────────────┼──────────────────────────────────────────────────────────────┤
│         │ CVE-2025-49796 │          │          │                         │               │ libxml: Type confusion leads to Denial of service (DoS)      │
│         │                │          │          │                         │               │ https://avd.aquasec.com/nvd/cve-2025-49796                   │
└─────────┴────────────────┴──────────┴──────────┴─────────────────────────┴───────────────┴──────────────────────────────────────────────────────────────┘
```

the vulnerabilities in libxml2 do not affect fleetctl, since the attack
vector is DoS and fleetctl is not a server tool. Additionally the
libxml2 package isn't used by fleetctl directly, but by the tools it
uses for code signing, which don't parse untrusted XML.
2025-06-13 17:00:49 -05:00
Lucas Manuel Rodriguez
1c5700a8c4
Microsoft Compliance Partner backend changes (#29540)
For #27042.

Ready for review, just missing integration tests that I will be writing
today.

- [X] Changes file added for user-visible changes in `changes/`,
`orbit/changes/` or `ee/fleetd-chrome/changes`.
See [Changes
files](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/guides/committing-changes.md#changes-files)
for more information.
- [X] Input data is properly validated, `SELECT *` is avoided, SQL
injection is prevented (using placeholders for values in statements)
- [ ] Added support on fleet's osquery simulator `cmd/osquery-perf` for
new osquery data ingestion features.
- [X] If database migrations are included, checked table schema to
confirm autoupdate
- For new Fleet configuration settings
- [X] Verified that the setting can be managed via GitOps, or confirmed
that the setting is explicitly being excluded from GitOps. If managing
via Gitops:
- [X] Verified that the setting is exported via `fleetctl
generate-gitops`
- [X] Added the setting to [the GitOps
documentation](https://github.com/fleetdm/fleet/blob/main/docs/Configuration/yaml-files.md#L485)
- [X] Verified that the setting is cleared on the server if it is not
supplied in a YAML file (or that it is documented as being optional)
- [x] Verified that any relevant UI is disabled when GitOps mode is
enabled
- For database migrations:
- [X] Checked schema for all modified table for columns that will
auto-update timestamps during migration.
- [X] Confirmed that updating the timestamps is acceptable, and will not
cause unwanted side effects.
- [X] Ensured the correct collation is explicitly set for character
columns (`COLLATE utf8mb4_unicode_ci`).
- [x] Added/updated automated tests
- [X] Manual QA for all new/changed functionality

---------

Co-authored-by: jacobshandling <61553566+jacobshandling@users.noreply.github.com>
Co-authored-by: Jacob Shandling <jacob@fleetdm.com>
2025-06-11 14:22:46 -03:00
Lucas Manuel Rodriguez
c771623021
Mark CVE-2025-48734 as not affected (#29692)
https://fleetdm.slack.com/archives/C019WG4GH0A/p1748758788762129
2025-06-02 13:53:40 -03:00
Lucas Manuel Rodriguez
7f85e529be
Iterate status.md for reporting vulnerability updates (#29062)
For #28805.

See scenario we want to support in the linked issue.

---------

Co-authored-by: Scott Gress <scottmgress@gmail.com>
2025-05-15 21:15:37 -03:00
Lucas Manuel Rodriguez
bfe3b186d3
Fix detected CVEs and docker scout exit code to fail the Github Action (#28836)
For #28837.

Fixing this all of this because we got multiple reports from the
community and customers and these were also detected by Amazon
Inspector.

- Fixes CVE-2025-22871 by upgrading Go from 1.24.1 to 1.24.2.
- `docker scout` now fails the daily scheduled action if there are
CRITICAL,HIGH CVEs (we missed setting `exit-code: true`).
- Report CVE-2025-46569 as not affected by it because of our use of
OPA's go package.
- Report CVE-2024-8260 as not affected by it because Fleet doesn't run
on Windows.
- The `security/status.md` shows a lot of changes because we are now
sorting CVEs so that newest come first.

---

- [X] Changes file added for user-visible changes in `changes/`,
`orbit/changes/` or `ee/fleetd-chrome/changes`.
See [Changes
files](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/Committing-Changes.md#changes-files)
for more information.
- [ ] Manual QA for all new/changed functionality
- For Orbit and Fleet Desktop changes:
- [ ] Make sure fleetd is compatible with the latest released version of
Fleet (see [Must
rule](https://github.com/fleetdm/fleet/blob/main/docs/Contributing/fleetd-development-and-release-strategy.md)).
- [ ] Orbit runs on macOS, Linux and Windows. Check if the orbit
feature/bugfix should only apply to one platform (`runtime.GOOS`).
- [ ] Manual QA must be performed in the three main OSs, macOS, Windows
and Linux.
- [ ] Auto-update manual QA, from released version of component to new
version (see [tools/tuf/test](../tools/tuf/test/README.md)).
- [ ] For unreleased bug fixes in a release candidate, confirmed that
the fix is not expected to adversely impact load test results or alerted
the release DRI if additional load testing is needed.
2025-05-06 13:35:27 -03:00
Lucas Manuel Rodriguez
ffb90d7951
Run make generate-doc (#28595)
PRs are failing due to mismatch in auto-generated docs:

https://github.com/fleetdm/fleet/actions/runs/14685592347/job/41213770932?pr=28531

Co-authored-by: Rachael Shaw <r@rachael.wtf>
2025-04-28 10:11:45 -05:00
Lucas Manuel Rodriguez
895194d63b
Add scanning to released images and process to track vulnerabilities (#28087)
For #25902.

---------

Co-authored-by: Sharon Katz <121527325+sharon-fdm@users.noreply.github.com>
2025-04-16 11:50:10 -03:00