-
Notifications
You must be signed in to change notification settings - Fork 888
Critical CVE-2024-32002 and CVE-2024-3817 in Trivy Scan #13291
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
This is a good time to ask for images from scratch for enterprise users. CVE-2024-3817 is introduced via installing terraform with apk (/usr/local/bin/terraform) and the other one is CVE-2024-32002 also with apk installing git client. Is there a reason why the images are alpine based? For security reason it would be nice if we can get rid of wget and curl in the images too. It enables attackers to download other stuff. Maybe there should be to different images. One for Coder Server and one for ProvisionerD (inclunding needed terraform) binary. |
In the meantime I tried to update terraform and git myself. Terraform seems to be no longer available in apk (but opentofu is), so I just replaced the binary with a newer version from github. Unfortunately there is no newer terraform version which is officially supported by coder. I hope there will be a fixed version of terraform 1.6 and 1.7 soon. |
Terraform was removed from Alpine, so we manage that ourselves now. There was ambiguity for a while as to whether or not we were allowed to upgrade to versions released under BSL, but we're now working our way towards the latest Terraform release. I think we'll be caught up to 1.8.x by Coder 2.12.
Alpine doesn't really have much to do with this. The Git CVEs were only announced two days ago and patches are available in Alpine as of yesterday. Our last release was last week, hence why it wasn't included. I'll have a patch out later today addressing the Git RCEs. Thanks @alexander-dammeier for bringing this to our attention. |
@coadler using a distro (even if it is only the small alpine) raises the attacksurface. Just from security point of view it would be the best practicse to use from scratch for the image. Thanks for fixing issues! |
Hello!
We test coder for a high security environment but we are not allowed to use your images as they contain critical CVEs (see trivy scans below). Unfortunately this CVEs are also in your latest images of the stable (2.10.2) and mainline (2.11.0) release trains.
(scans are filtered by High and critical CVEs)
The text was updated successfully, but these errors were encountered: