<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Minemeld Vulnerabilities in General Topics</title>
    <link>https://live.paloaltonetworks.com/t5/general-topics/minemeld-vulnerabilities/m-p/347227#M95584</link>
    <description>&lt;P&gt;&lt;SPAN&gt;After downloading and building minemeld from&amp;nbsp;&lt;A href="https://github.com/PaloAltoNetworks/minemeld-docker" target="_blank"&gt;https://github.com/PaloAltoNetworks/minemeld-docker&lt;/A&gt;&amp;nbsp;...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Our &lt;A href="https://anchore.com/" target="_blank"&gt;https://anchore.com/&lt;/A&gt; scanning engine has detected several vulnerabilities...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Amongst other obvious concerns such as;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;1. Why is it build with python2.7?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2. Why are Palo Alto still developing&amp;nbsp;with this after Jan 2020&amp;nbsp;&lt;A href="https://pythonclock.org/" target="_blank"&gt;https://pythonclock.org/&lt;/A&gt;? &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3. Aren't you supposed to migrate before end of support not after?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; I was wondering if somebody from Palo Alto could address these vulnerabilities? It's not great to have a security product that is full of security vulnerabilities.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I did raise a Palo Alto Support case as we spend an astronomical&amp;nbsp;amount&amp;nbsp;of money with them. Minemeld is only supported on Autofocus which we do not have, so they directed me here...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So please Palo Alto, pretty please with sugar on top can you fix these vulnerabilities&amp;nbsp;in your product. Thanks! By the way these are only the worst ones. You should probably scan your containers before you publish them! The whole idea is that I invest in security products to make things more secure, not introduce vulnerabilities.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;17:04:34 vulnerabilities package [1;31m[4;31mCRITICAL[0m Vulnerability found in non-os package type (python) - /opt/minemeld/engine/0.9.70.post1/lib/python2.7/site-packages/PyYAML (max_days_since_creation=2020-05-29)(CVE-2020-1747 -&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2020-1747" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln/detail/CVE-2020-1747&lt;/A&gt;&lt;SPAN&gt;) warn&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;17:04:34 vulnerabilities package [1;31m[4;31mCRITICAL[0m Vulnerability found in non-os package type (python) - /usr/lib/python2.7/lib-dynload/Python (max_days_since_creation=2020-07-16)(CVE-2019-9948 -&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2019-9948" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln/detail/CVE-2019-9948&lt;/A&gt;&lt;SPAN&gt;) warn&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;17:04:34 vulnerabilities package [1;31m[4;31mCRITICAL[0m Vulnerability found in non-os package type (python) - /usr/lib/python2.7/lib-dynload/Python (max_days_since_creation=2020-07-10)(CVE-2019-9636 -&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln/detail/CVE-2019-9636&lt;/A&gt;&lt;SPAN&gt;) warn&lt;/SPAN&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 07 Sep 2020 12:38:56 GMT</pubDate>
    <dc:creator>martinsarrionandia</dc:creator>
    <dc:date>2020-09-07T12:38:56Z</dc:date>
    <item>
      <title>Minemeld Vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/minemeld-vulnerabilities/m-p/347227#M95584</link>
      <description>&lt;P&gt;&lt;SPAN&gt;After downloading and building minemeld from&amp;nbsp;&lt;A href="https://github.com/PaloAltoNetworks/minemeld-docker" target="_blank"&gt;https://github.com/PaloAltoNetworks/minemeld-docker&lt;/A&gt;&amp;nbsp;...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Our &lt;A href="https://anchore.com/" target="_blank"&gt;https://anchore.com/&lt;/A&gt; scanning engine has detected several vulnerabilities...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Amongst other obvious concerns such as;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;1. Why is it build with python2.7?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;2. Why are Palo Alto still developing&amp;nbsp;with this after Jan 2020&amp;nbsp;&lt;A href="https://pythonclock.org/" target="_blank"&gt;https://pythonclock.org/&lt;/A&gt;? &lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;3. Aren't you supposed to migrate before end of support not after?&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt; I was wondering if somebody from Palo Alto could address these vulnerabilities? It's not great to have a security product that is full of security vulnerabilities.&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;I did raise a Palo Alto Support case as we spend an astronomical&amp;nbsp;amount&amp;nbsp;of money with them. Minemeld is only supported on Autofocus which we do not have, so they directed me here...&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;So please Palo Alto, pretty please with sugar on top can you fix these vulnerabilities&amp;nbsp;in your product. Thanks! By the way these are only the worst ones. You should probably scan your containers before you publish them! The whole idea is that I invest in security products to make things more secure, not introduce vulnerabilities.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;17:04:34 vulnerabilities package [1;31m[4;31mCRITICAL[0m Vulnerability found in non-os package type (python) - /opt/minemeld/engine/0.9.70.post1/lib/python2.7/site-packages/PyYAML (max_days_since_creation=2020-05-29)(CVE-2020-1747 -&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2020-1747" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln/detail/CVE-2020-1747&lt;/A&gt;&lt;SPAN&gt;) warn&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;17:04:34 vulnerabilities package [1;31m[4;31mCRITICAL[0m Vulnerability found in non-os package type (python) - /usr/lib/python2.7/lib-dynload/Python (max_days_since_creation=2020-07-16)(CVE-2019-9948 -&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2019-9948" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln/detail/CVE-2019-9948&lt;/A&gt;&lt;SPAN&gt;) warn&lt;/SPAN&gt;&lt;BR /&gt;&lt;SPAN&gt;17:04:34 vulnerabilities package [1;31m[4;31mCRITICAL[0m Vulnerability found in non-os package type (python) - /usr/lib/python2.7/lib-dynload/Python (max_days_since_creation=2020-07-10)(CVE-2019-9636 -&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2019-9636" target="_blank" rel="noopener"&gt;https://nvd.nist.gov/vuln/detail/CVE-2019-9636&lt;/A&gt;&lt;SPAN&gt;) warn&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 07 Sep 2020 12:38:56 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/minemeld-vulnerabilities/m-p/347227#M95584</guid>
      <dc:creator>martinsarrionandia</dc:creator>
      <dc:date>2020-09-07T12:38:56Z</dc:date>
    </item>
    <item>
      <title>Re: Minemeld Vulnerabilities</title>
      <link>https://live.paloaltonetworks.com/t5/general-topics/minemeld-vulnerabilities/m-p/347819#M95585</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/154522"&gt;@martinsarrionandia&lt;/a&gt;,&lt;/P&gt;
&lt;P&gt;thanks for your message. We are aware of those vulnerabilities in the libraries used by MineMeld, but MineMeld code does not make use of the vulnerable features in the affected libraries. We are currently working on:&lt;/P&gt;
&lt;P&gt;- a new release based on Python 2.7.18 to get rid of the old versions&lt;/P&gt;
&lt;P&gt;- a new release based on Python 3&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Happy to discuss all the details.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Please note that Palo Alto Networks has an official process for reporting reporting potential security vulnerabilities in our products, based on the responsible disclosure model. The process is documented here:&amp;nbsp;&lt;A href="https://www.paloaltonetworks.com/security-disclosure" target="_blank"&gt;https://www.paloaltonetworks.com/security-disclosure&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks again.&lt;/P&gt;</description>
      <pubDate>Wed, 09 Sep 2020 07:12:49 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/general-topics/minemeld-vulnerabilities/m-p/347819#M95585</guid>
      <dc:creator>lmori</dc:creator>
      <dc:date>2020-09-09T07:12:49Z</dc:date>
    </item>
  </channel>
</rss>

