Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Check for image vulns affectation #306

Closed
victorrodriguez1984 opened this issue Feb 14, 2024 · 7 comments
Closed

Check for image vulns affectation #306

victorrodriguez1984 opened this issue Feb 14, 2024 · 7 comments

Comments

@victorrodriguez1984
Copy link

victorrodriguez1984 commented Feb 14, 2024

After Trivy scan we still see this active vuln...it affects component? version 0.0.27

quay.io/redhat-cop/group-sync-operator:v0.0.27

Trivy output

manager (gobinary)

Total: 5 (UNKNOWN: 0, LOW: 0, MEDIUM: 3, HIGH: 1, CRITICAL: 1)

│ github.com/emicklei/go-restful │ CVE-2022-1996  │ CRITICAL │ fixed  │ v2.9.5+incompatible                │ 2.16.0        │ go-restful: Authorization Bypass Through User-Controlled Key │
│                                │                │          │        │                                    │               │ https://avd.aquasec.com/nvd/cve-2022-1996 

@sabre1041
Copy link
Collaborator

@victorrodriguez1984 v0.0.28 does not include this vulnerability

@victorrodriguez1984
Copy link
Author

victorrodriguez1984 commented May 6, 2024

Hello again, please could you review if it affects or it is only image cosmetic?
@sabre1041

trivy  --severity CRITICAL i quay.io/redhat-cop/group-sync-operator:v0.0.28 -q

quay.io/redhat-cop/group-sync-operator:v0.0.28 (redhat 8.9)

Total: 0 (CRITICAL: 0)


manager (gobinary)

Total: 1 (CRITICAL: 1)

┌────────────────────────────────┬───────────────┬──────────┬────────┬─────────────────────┬───────────────┬──────────────────────────────────────────────────────────────┐
│            Library             │ Vulnerability │ Severity │ Status │  Installed Version  │ Fixed Version │                            Title                             │
├────────────────────────────────┼───────────────┼──────────┼────────┼─────────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ github.com/emicklei/go-restful │ CVE-2022-1996 │ CRITICAL │ fixed  │ v2.9.5+incompatible │ 2.16.0        │ go-restful: Authorization Bypass Through User-Controlled Key │
│                                │               │          │        │                     │               │ https://avd.aquasec.com/nvd/cve-2022-1996                    │
└────────────────────────────────┴───────────────┴──────────┴────────┴─────────────────────┴───────────────┴──────────────────────────────────────────────────────────────┘

@sabre1041
Copy link
Collaborator

We have been working on upgrading the delivery pipeline. When that goes into place, the dependencies will be updated

Appreciate the patience and understanding

@sabre1041
Copy link
Collaborator

@victorrodriguez1984 just a heads up that I am now working on updating the dependencies that will mitigate the above. You can track it in #316

@EmmanuelKasper
Copy link

thanks @sabre1041 for updating the depencies in #316 , this was causing scanner to freak out, do we plan a minor release of the group-sync-operator with the updated dependencies ?

@sabre1041
Copy link
Collaborator

thanks @sabre1041 for updating the depencies in #316 , this was causing scanner to freak out, do we plan a minor release of the group-sync-operator with the updated dependencies ?

new version 0.0.29 should now be available. thanks for your patience!

@EmmanuelKasper
Copy link

EmmanuelKasper commented Jul 30, 2024

Thanks I see the go-restful updates have been updated indeed, and we have as of today the 0.0.30 release with the new code.
I think we should close this issue.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants