Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Configbump update #23378

Open
LMantovan opened this issue Mar 6, 2025 · 2 comments
Open

Configbump update #23378

LMantovan opened this issue Mar 6, 2025 · 2 comments
Assignees
Labels
area/gateway severity/P1 Has a major impact to usage or development of the system. team/A This team is responsible for the Che Operator and all its operands as well as chectl and Hosted Che

Comments

@LMantovan
Copy link

Running trivy image for the configbump:v7.99.0 it comes out that we have 42 vulnerabilities (4 Critical, 17 High and 21 Medium)

The majority of these are because you use old versions of go modules.

A suggestion can be running
go get -u=patch ./...
to update modules without breaking changes to the latest version and building a new version of the image.

Doing so, the vulnerabilities will be consistently reduced to only 5 vulns.

Is it possible to have this type of patch?

@che-bot che-bot added the status/need-triage An issue that needs to be prioritized by the curator responsible for the triage. See https://github. label Mar 6, 2025
@ibuziuk
Copy link
Member

ibuziuk commented Mar 6, 2025

@SDawley could you please take a look?

@ibuziuk ibuziuk added the severity/P1 Has a major impact to usage or development of the system. label Mar 6, 2025
@ibuziuk ibuziuk moved this to Unplanned Tasks in Eclipse Che Team A Backlog Mar 6, 2025
@SDawley SDawley self-assigned this Mar 6, 2025
@akurinnoy akurinnoy added team/A This team is responsible for the Che Operator and all its operands as well as chectl and Hosted Che and removed status/need-triage An issue that needs to be prioritized by the curator responsible for the triage. See https://github. labels Mar 7, 2025
@SDawley
Copy link
Contributor

SDawley commented Mar 13, 2025

Just wanted to update: the scans we run on downstream Configbump didn't pick up that many CVEs, but there was 1 Critical, 2 High and 1 Medium CVE that were all addressed by updating the base image.

Ultimately there are too many different scanners for us to realistically address every report, but I agree that it would be in everyone's best interests to update Configbump more often.

We're currently looking into better ways to keep our dependencies and base images updated so there are fewer discrepancies between upstream and downstream. I'll comment again when we decide on a solution.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/gateway severity/P1 Has a major impact to usage or development of the system. team/A This team is responsible for the Che Operator and all its operands as well as chectl and Hosted Che
Projects
Status: Unplanned Tasks
Development

No branches or pull requests

5 participants