Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Security: new CVEs in 0.12.0 release AND in master, new fixes/release coming? #1066

Closed
kramvan1 opened this issue Oct 8, 2019 · 2 comments · Fixed by #1067
Closed

Security: new CVEs in 0.12.0 release AND in master, new fixes/release coming? #1066

kramvan1 opened this issue Oct 8, 2019 · 2 comments · Fixed by #1067

Comments

@kramvan1
Copy link
Contributor

kramvan1 commented Oct 8, 2019

Type of question

Security updates for images, as new CVEs are found in existing latest release, how to get them fixed and new release spun?

Fix is just and OS package update:
Upgrade libcrypto1.1 to >= 1.1.1d-r0 Upgrade libssl1.1 to >= 1.1.1d-r0

Related to #1036

Question

What did you do?

Ran IBM VA scanner against master AND 0.12.0 image:

What did you expect to see?

No CVEs

What did you see instead? Under which circumstances?

3 CVEs found

Environment

  • operator-lifecycle-manager version:

master and 0.12.0

@ecordell
Copy link
Member

ecordell commented Oct 8, 2019

OLM does not link openssl libs, so there shouldn't be any issue.

But just in case someone is affected (by running non-olm code in the container), I have made a PR that will pull in the latest updates. APK has the fixed packages already: #1067

@kramvan1
Copy link
Contributor Author

kramvan1 commented Oct 8, 2019

@ecordell thx for update. Wouldn't it be easier to just remove the unneeded packages like this near the end of the Docker build? Or go distro-less? Unfortunately, I have to respond to each CVE, so that means tracking it down and figuring the impact, nicer to not have it in the first place.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

2 participants