I am using a trivy scan and a grype scan to detect vulnerabilities in my project and we recently discovered a handful of vulnerabilities in the temporal-server image version 1.27.2 and the temporal-ui version 2.36.2
would it be possible to upgrade out of these in the next release for these images?
We also see those vulnerabilities using Xray, Grype, and Trivy scans in those images
temporalio/server:1.27.2.0
temporalio/ui:2.36.2
temporalio/admin-tools:1.27
Take temporalio/server:1.27.2.0 as an example, upon reviewing the source code for the v1.27.2 release, we found that these vulnerabilities have already been addressed. For example, the scan reports a vulnerability in github.com/golang-jwt/jwt/v4:4.5.1 and suggests it is fixed in v4.5.2.
Question to Temporal: does the image have been built before the dependency was upgraded or a sub-dependency still be pulling in an older version, even if the root module uses a fixed one?
This helps our development team better track and address these concerns within our workflow. Including the CVE details you’ve provided would be very helpful.
For customers with support contracts, you’re welcome to continue using our support portal.
Thanks for helping us improve Temporal’s security!