Summary
The user is inquiring about the patch policy for critical CVEs found in default images on recent versions of Helm charts and the general policy for addressing CVE fixes. They are willing to file a GitHub issue for tracking.
Question
hello - I have picked up on several cataloged critical CVEs present in the images provided as defaults on the last few versions of helm charts. i am wondering what the patch policy is for these, and the policy around CVE fixes in general? i am happy to file a github issue as well, if that is easier for tracking
• https://nvd.nist.gov/vuln/detail/CVE-2024-1597|https://nvd.nist.gov/vuln/detail/CVE-2024-1597
• https://nvd.nist.gov/vuln/detail/CVE-2022-48174|https://nvd.nist.gov/vuln/detail/CVE-2022-48174
• https://nvd.nist.gov/vuln/detail/CVE-2022-37434|https://nvd.nist.gov/vuln/detail/CVE-2022-37434
• https://nvd.nist.gov/vuln/detail/CVE-2023-38545|https://nvd.nist.gov/vuln/detail/CVE-2023-38545
• https://nvd.nist.gov/vuln/detail/CVE-2023-23914|https://nvd.nist.gov/vuln/detail/CVE-2023-23914
• https://nvd.nist.gov/vuln/detail/CVE-2019-8457|https://nvd.nist.gov/vuln/detail/CVE-2019-8457
• https://nvd.nist.gov/vuln/detail/CVE-2023-45853|https://nvd.nist.gov/vuln/detail/CVE-2023-45853
the first appears to be coming from the java base image used to build the airbyte images, and the middle 2 are from the socat, busybox, and curl images configured for jobs, the fourth from temporal auto-setup, and the last 3 from the kubectl image
This topic has been created from a Slack thread to give it more visibility.
It will be on Read-Only mode here. Click here if you want to access the original thread.