Azure/azure-workload-identity

Web hook docker image built with old go version 1.20.4 and has several CVEs

Closed this issue · 1 comments

Describe the bug
The current version of the webhook docker image was built with version 1.20.4 of go which has several CVEs identified.

Steps To Reproduce
Download v1.1.0 of webhook and scan with any docker security tool.

Expected behavior
New releases are made frequently to update the software to latest releases.

Logs

Environment

  • Kubernetes version (use kubectl version):
  • Cloud provider or hardware configuration:
  • OS (e.g: cat /etc/os-release):
  • Kernel (e.g. uname -a):
  • Install tools:
  • Network plugin and version (if this is a network-related bug):
  • Others:

Additional context

v1.2.0 was released month and doesn't contain any CVEs.

➜ trivy image --exit-code 1 --severity MEDIUM,HIGH,CRITICAL mcr.microsoft.com/oss/azure/workload-identity/webhook:v1.2.0
2023-11-29T00:52:58.087Z	INFO	Vulnerability scanning is enabled
2023-11-29T00:52:58.087Z	INFO	Secret scanning is enabled
2023-11-29T00:52:58.087Z	INFO	If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2023-11-29T00:52:58.087Z	INFO	Please see also https://aquasecurity.github.io/trivy/v0.39/docs/secret/scanning/#recommendation for faster secret detection
2023-11-29T00:52:59.403Z	INFO	Detected OS: debian
2023-11-29T00:52:59.403Z	INFO	Detecting Debian vulnerabilities...
2023-11-29T00:52:59.403Z	INFO	Number of language-specific files: 1
2023-11-29T00:52:59.403Z	INFO	Detecting gobinary vulnerabilities...

mcr.microsoft.com/oss/azure/workload-identity/webhook:v1.2.0 (debian 11.8)

Total: 0 (MEDIUM: 0, HIGH: 0, CRITICAL: 0)