Hi  Alexis and Gabor ,

Thanks for your valuable suggestions. We tried implementing as per the
suggestion given, updating the GOSE_VERSION to  1.17 and few other changes
from our end and we see that all the jfrog x-ray vulnerabilities are fixed.
Thanks for you support and help.

Thanks,
Elakiya

On Mon, Jun 24, 2024 at 10:02 AM elakiya udhayanan <laks....@gmail.com>
wrote:

> Hi  Alexis and Gabor ,
>
> Thanks for your valuable response and suggestions. Will try to work on the
> suggestions and get back to you if require more details.
>
> Thanks,
> Elakiya
>
> On Sun, Jun 23, 2024 at 10:12 PM Gabor Somogyi <gabor.g.somo...@gmail.com>
> wrote:
>
>> Hi Elakiya,
>>
>> I've just double checked the story and seems like the latest 1.17 gosu
>> release is not vulnerable.
>> Can you please try it out on your side? Alexis has written down how you
>> can bump the docker version locally:
>>
>> ---CUT-HERE---
>> ENV GOSU_VERSION 1.17
>> ---CUT-HERE---
>>
>> Please report back and we can discuss this further based on that...
>>
>> BR,
>> G
>>
>>
>> On Fri, Jun 21, 2024 at 7:16 PM elakiya udhayanan <laks....@gmail.com>
>> wrote:
>>
>>> Hi Team,
>>>
>>> I would like to remind about the request for the help required to fix
>>> the vulnerabilities seen in the Flink Docker image. Any help is appreciated.
>>>
>>> Thanks in advance.
>>>
>>> Thanks,
>>> Elakiya U
>>>
>>> On Tue, Jun 18, 2024 at 12:51 PM elakiya udhayanan <laks....@gmail.com>
>>> wrote:
>>>
>>>> Hi Community,
>>>>
>>>> In one of our applications we are using a Fink Docker image and running
>>>> Flink as a Kubernetes pod. As per policy, we tried scanning the Docker
>>>> image for security vulnerabilities using JFrog XRay and we find that there
>>>> are multiple critical vulnerabilities being reported as seen in the below
>>>> table. This is the same case for the latest Flink version 1.19.0 as well
>>>>
>>>> | Severity  | Direct Package               | Impacted Package
>>>>  | Impacted Package Version | Fixed Versions             | Type  | CVE
>>>>            |
>>>>
>>>> |-----------|------------------------------|---------------------------|---------------------------|----------------------------|-------|--------------------|
>>>> | Critical  | sha256__c6571bb0f39f334ef... | github.com/golang/go
>>>>  | 1.11.1                    | [1.19.8, 1.20.3]           | Go    |
>>>> CVE-2023-24538     |
>>>> | Critical  | sha256__c6571bb0f39f334ef... | github.com/golang/go
>>>>  | 1.11.1                    | [1.19.9, 1.20.4]           | Go    |
>>>> CVE-2023-24540     |
>>>> | Critical  | sha256__c6571bb0f39f334ef... | github.com/golang/go
>>>>  | 1.11.1                    | [1.19.10, 1.20.5]          | Go    |
>>>> CVE-2023-29404     |
>>>> | Critical  | sha256__c6571bb0f39f334ef... | github.com/golang/go
>>>>  | 1.11.1                    | [1.19.10, 1.20.5]          | Go    |
>>>> CVE-2023-29405     |
>>>> | Critical  | sha256__c6571bb0f39f334ef... | github.com/golang/go
>>>>  | 1.11.1                    | [1.19.10, 1.20.5]          | Go    |
>>>> CVE-2023-29402     |
>>>> | Critical  | sha256__c6571bb0f39f334ef... | github.com/golang/go
>>>>  | 1.11.1                    | [1.16.9, 1.17.2]           | Go    |
>>>> CVE-2021-38297     |
>>>> | Critical  | sha256__c6571bb0f39f334ef... | github.com/golang/go
>>>>  | 1.11.1                    | [1.16.14, 1.17.7]          | Go    |
>>>> CVE-2022-23806     |
>>>> | Critical  | sha256__0690274ef266a9a2f... | certifi
>>>> | 2020.6.20                 | [2023.7.22]                | Python|
>>>> CVE-2023-37920     |
>>>> | Critical  | sha256__c6571bb0f39f334ef... | github.com/golang/go
>>>>  | 1.11.1                    | [1.12.6, 1.13beta1]        | Go    |
>>>> CVE-2019-11888     |
>>>> | Critical  | sha256__c6571bb0f39f334ef... | github.com/golang/go
>>>>  | 1.11.1                    | [1.11.13, 1.12.8]          | Go    |
>>>> CVE-2019-14809     |
>>>>
>>>> These vulnerabilities are related to the github.com/golang/go and
>>>> certifi packages.
>>>>
>>>> Please help me addressing the below questions:
>>>> Is there any known workaround for these vulnerabilities while using the
>>>> affected Flink versions?
>>>> Is there an ETA for a fix for these vulnerabilities in upcoming Flink
>>>> releases?
>>>> Are there any specific steps recommended to mitigate these issues in
>>>> the meantime?
>>>> Any guidance or recommendations would be greatly appreciated.
>>>>
>>>> Thanks in advance
>>>>
>>>> Thanks,
>>>> Elakiya U
>>>>
>>>

Reply via email to