-
Notifications
You must be signed in to change notification settings - Fork 192
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
libcurl 8.2.1-rc0 - CVE-2023-38039 #976
Comments
Flux doesn't uses libcurl |
Yes, but the published container image contains the package. From build utilities, base image, or as a transient dependency? |
libcurl is part of the Alpine base image we're using to build our controllers. Alpine has already updated libcurl so the fix will likely be included in the next kustomize-controller release. Please be advised that this is a false positive because Flux doesn't use libcurl, as Stefan noted. Flux is not affected by the CVE you linked above so there is no need to rush a release. |
Yea that's the issue with most of the scanners/defenders for kubernetes. They obviously report everything and can't understand what is actually used or not. There are a total of 4 issues reported in my scanner at the moment:
Overall nothing serious, but could justify a release, especially since the last one is already a month old. |
For anyone in search of a CVE-free Flux build, Weaveworks offers this as Weave GitOps Assured. That offering comes with certain SLAs around CVE-free builds and more: https://www.weave.works/product/gitops/ |
Hello,
libcurl 8.2.1-rc0
as implemented inkustomize-controller:v1.1.0
contains CVE-2023-38039.https://nvd.nist.gov/vuln/detail/CVE-2023-38039
This is fixed in
libcurl 8.3.0-rc0
Apologies for redundancy if this has been handled. Please close if necessary.
The text was updated successfully, but these errors were encountered: