-
-
Notifications
You must be signed in to change notification settings - Fork 561
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Latest version (v1.97.4) uses an old version of Terraform with critical vulns #835
Comments
@davidarcher Thanks for bringing this up. I created #836 for this. |
As expected. See #724 (comment) for details If you want to create a new tag each time when any of tools release their new version - check #724 (comment) If you have any other ideas how to make it work in idempotent or any other way except triggering hooks release each time or committing to support multiply versions at once - please let me know. In theory, we could build P.S. hashicorp doesn't think that this vuln scan make any sense, otherwise they will be already backpush such changes to 1.10.6 to deal with that vuln. @yermulnik your PR totally make sense, but it is not related to this issue (as it not deal with root cause) |
Yep, thanks. I might had worded not clear enough: my PR was not to fix root cause, but to trigger rebuild of the container image (which sort of indirectly resolves this PR) 👍🏻 |
As another "hotfix", I will add docs to same PR that we are not responsible for issues in 3rd party, and that's users responsibility to manage their environment and dependencies if they want to use specific versions and not |
Describe the bug
The latest docker image (v1.97.4) is failing vuln scans due to old versions of Terraform (v1.10.5) and other tools that contain fixable vulnerabilities.
How can we reproduce it?
The text was updated successfully, but these errors were encountered: