Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Ignore many CVEs #2523

Merged
merged 11 commits into from
Oct 12, 2023
Merged

Ignore many CVEs #2523

merged 11 commits into from
Oct 12, 2023

Conversation

ellsclytn
Copy link
Contributor

These CVEs have been assessed individually and all deemed safe to ignore. Best to view each commit for the justification behind each.

It affects git. Specifically through crafting a `.gitmodules` file in a
particular way. This is not something that happens in the build process
for the docs site.
It affects git. Specifically through using `git apply --reject` in a
particular way. This is not something that happens in the build process
for the docs site.
It relates to using SUID binaries. We run our containers as root, which
maybe isn't the best thing, but it also makes using SUID stuff
irrelevant.
It concerns Direct Rendering Manager, which is relevant for applications
processing graphics data.

We're building a static site, nothing to see here.
These relate to mounting f2fs filesystem images. We don't use f2fs.
It relates to OverlayFS. This is, admittedly, what Docker uses by
default for volume mounting. Fortunately we don't do any volume mounting
for this service in Production or build time.
It relates to an ethernet driver. That's a kernel thing, not relevant to
us when we're using containers, where they don't have any concern over
drivers.
We don't use openldap
We don't use Perl, and even if we do inadvertently through some package
depending on it, we certainly don't use the CPAN.pm package manager.
We don't use Python. At least not directly. But assuming we do use
Python unexpectedtly, the nature of the Docs site is such that we aren't
attempting to parse URLs supplied by end-users anywhere. Therefore the
likelihood of a malicious string to urllib.parse is extremely low.
This is quite an edge case CVE. Its risk is further reduced by the fact
our container runs as root (meaning no privilege escalation in the first
place). It's also a kernel-level thing, so not really relevant in a
container.
@ellsclytn ellsclytn requested a review from a team October 12, 2023 00:24
@buildkite-docs-bot
Copy link
Contributor

Preview URL: https://2523--bk-docs-preview.netlify.app

Copy link
Contributor

@yob yob left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

It wouldn't help reduce the image size, but is there value in trying to add a step in the Dockerfile that removes the linux packages from the final image? IIRC they're used for building native extensions and not used at runtime, and it would drop 7 CVEs from the list we need to ignore

@ellsclytn
Copy link
Contributor Author

There probably is value. I didn't bother right now because I'd already triaged all but one of the CVEs by the time you mentioned that idea, so I figured I'll get this PR out, and then can address that idea separately.

@dannymidnight
Copy link
Contributor

Thanks @ellsclytn

:shipit: !

@ellsclytn ellsclytn merged commit f1d9d9b into main Oct 12, 2023
1 check passed
@ellsclytn ellsclytn deleted the plt-1612-triage-cves-docs branch October 12, 2023 01:20
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants