-
Notifications
You must be signed in to change notification settings - Fork 193
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
libcurl 8.2.1-rc0 - CVE-2023-38039 #976
Comments
Flux doesn't uses libcurl |
Yes, but the published container image contains the package. From build utilities, base image, or as a transient dependency? |
libcurl is part of the Alpine base image we're using to build our controllers. Alpine has already updated libcurl so the fix will likely be included in the next kustomize-controller release. Please be advised that this is a false positive because Flux doesn't use libcurl, as Stefan noted. Flux is not affected by the CVE you linked above so there is no need to rush a release. |
Yea that's the issue with most of the scanners/defenders for kubernetes. They obviously report everything and can't understand what is actually used or not. There are a total of 4 issues reported in my scanner at the moment:
Overall nothing serious, but could justify a release, especially since the last one is already a month old. |
For anyone in search of a CVE-free Flux build, Weaveworks offers this as Weave GitOps Assured. That offering comes with certain SLAs around CVE-free builds and more: https://www.weave.works/product/gitops/ |
Hello,
libcurl 8.2.1-rc0
as implemented inkustomize-controller:v1.1.0
contains CVE-2023-38039.https://nvd.nist.gov/vuln/detail/CVE-2023-38039
This is fixed in
libcurl 8.3.0-rc0
Apologies for redundancy if this has been handled. Please close if necessary.
The text was updated successfully, but these errors were encountered: