You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We are using the PostgreSQL image (17) based on Debian OS (Bookworm) with CloudNativePG in our Kubernetes cluster. While scanning the image for vulnerabilities, we identified several critical issues. We need guidance from the CNPG community to address these vulnerabilities in the image version used by CNPG.
@SanduDS, we are transitioning away from the official Postgres image and are now in the process of approving a new build process that includes Software Bill of Materials (SBOMs) and signatures. Currently, the images are published in the "postgresql-testing" repository. Could you please evaluate them?
For example, you can check ghcr.io/cloudnative-pg/postgresql-testing:17.2-202501221134-minimal-bookworm.
Issue Description
We are using the PostgreSQL image (17) based on Debian OS (Bookworm) with CloudNativePG in our Kubernetes cluster. While scanning the image for vulnerabilities, we identified several critical issues. We need guidance from the CNPG community to address these vulnerabilities in the image version used by CNPG.
Critical Vulnerabilities Identified
CVE-2023-45853:
zipOpenNewFileInZip4_6
leads to a heap-based buffer overflow.will_not_fix
CVE-2023-24538:
html/template
)CVE-2023-24540:
html/template
)CVE-2024-24790:
net/netip
)Is
methods for IPv4-mapped IPv6 addresses could bypass IP-based restrictions.Impact on Cluster Security
While PostgreSQL itself is not directly impacted, associated vulnerabilities in the image pose a risk:
html/template
.net/netip
issues.Request for Guidance
Environment Details
We look forward to the community's insights and recommendations. Thank you!
The text was updated successfully, but these errors were encountered: