-
Notifications
You must be signed in to change notification settings - Fork 109
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
The current image has vulnerabilities, so can we release new one with newer alpine updates #216
Comments
Please note it isn't fair on maintainers of open source software, for a very vague report of vulnerabilities. We would appreciate at minimum the tool you have used, and the vulnerability you believe is present, otherwise we would suggest to look at our own trivy scan. If the particular vulnerability isn't caught by trivy, then that would be an issue for that project and they would also require sufficient actionable information. What specific vulnerabilities are you referring to? We do run an audit on a cron job Which recently started failure due to a CVE in Sinatra
Linked CVE:- https://avd.aquasec.com/nvd/2024/cve-2024-21510/ Unfortunately resolving that isn't trivial for us in the Pact Broker, as it requires Sinatra 4, requires Rack 3, which webmachine doesn't yet support of which the Pact Broker depends on. The SmartBear PactFlow team have recently hired a new Ruby Senior Engineer who will be allocating time towards our open source projects including the Pact Broker, so this particular issue is on his radar. |
Our current release process is blocked due the the above CVE. Tracking issue raised in the pact_broker project. Have proposed skipping the CVE in this project which consumes the pact_broker in order to allow updates outside Sinatra to still proceed, as the current released version is still in the same vulnerable state as the image we wish to deploy, in relation to the CVE. (It adds no value blocking the deployment of any changes in this project, based on the audit, unless we were adding new vulnerable code, that wasn't present in the deployed image - which isn't the case in this instance) |
New image going out now which will contain |
Pre issue-raising checklist
I have already (please mark the applicable with an
x
):Software versions
Expected behaviour
Image with latest OS updates and no vulnerabilities
Actual behaviour
Image is with known vulnerabilities
Steps to reproduce
Run any kind of security scan to identify the vulnerabiliites
Relevent log files
The text was updated successfully, but these errors were encountered: