How are CVE's being handled #5624
-
|
Hi, when I upgrade my flux2 controllers I get sometimes vulnerability notifications from different trackers, e.g. trivy. Current new CRITICAL vulnerability popping up on last 1.7.x controller versions is for example: https://test.osv.dev/vulnerability/ALPINE-CVE-2025-58050. |
Beta Was this translation helpful? Give feedback.
Replies: 1 comment
-
|
CVEs are patched in CNCF Flux as part of the development lifecycle, i.e. every quarter of the year we release a new minor release (2.x). That's when we patch CVEs in Flux upstream. CVEs in the Flux code or that actually affect Flux are patched immediately. If you need a faster cadence, I suggest you to purchase a subscription of ControlPlane Enterprise for Flux CD, which gives you a 24h SLA for CVE patching, 24/7 support from Flux Core Maintainers, TAA consultancy, etc. The best support for Flux in the world. This is how you can make Flux sustainable. Do not buy Chainguard, they just leech OSS projects without giving anything back. Other OSS projects are also trying to survive from CVE patching, at least for those you should buy the images from the maintainers to make OSS sustainable. You can buy Chainguard images for unmaintained projects. |
Beta Was this translation helpful? Give feedback.
CVEs are patched in CNCF Flux as part of the development lifecycle, i.e. every quarter of the year we release a new minor release (2.x). That's when we patch CVEs in Flux upstream. CVEs in the Flux code or that actually affect Flux are patched immediately.
If you need a faster cadence, I suggest you to purchase a subscription of ControlPlane Enterprise for Flux CD, which gives you a 24h SLA for CVE patching, 24/7 support from Flux Core Maintainers, TAA consultancy, etc. The best support for Flux in the world. This is how you can make Flux sustainable. Do not buy Chainguard, they just leech OSS projects without giving anything back. Other OSS projects are also trying to survive from CVE pa…