What is the cadence for wolfi-base builds to include vulnerability patches? #20739
-
Question - What is the process for wolfi-base to get rebuilt to have fixes for vulnerabilities For example (5/31/2024) right now in wolfi-base it has 2 vulnerabilities for CVE-2024-4603 but I see a pull request to fix openssl merged in 2 days ago - #20435 which I assumed would fix that CVE? For general knowledge how long does it take for that type of patches to make it into wolfi-base? or am I misunderstanding what that patch fixed? |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment 7 replies
-
Can you explain how you have established that? Have you used a scanner? Have you cross check advisories? |
Beta Was this translation helpful? Give feedback.
the package and CVE is fixed; but the issues remain with advisory data that we publish; and how/when the scanners consume it. As an example, in worst case scenario, there can be up to 48h lag in advisory data in grype. I don't know about Anchore and Trivy. And there could have been impressions in the advisory data. It is the weekend now, bu the advisories data team will pick this up on Monday - if the scanners don't improve during that time (as in get their advisory data upgraded, and rescanning existing images from days ago would result in them no longer flagged as vulnerable).
I wish there was ability to include advisory data inside the package SBOM such that without refreshing vendor a…