docs: add comprehensive vulnerability acceptance and remediation reports for PR #461
- Created `pr_461_remediation_complete.md` detailing the final remediation status, including bug fixes, test results, and coverage metrics. - Added `pr_461_vulnerability_comment.md` summarizing the supply chain vulnerabilities accepted for PR #461, including risk assessments and mitigation strategies. - Established `VULNERABILITY_ACCEPTANCE.md` to formally document the acceptance of 9 vulnerabilities in Alpine Linux packages, outlining the rationale, monitoring plans, and compliance with industry standards. These documents ensure transparency and provide a clear audit trail for the vulnerability management process associated with PR #461.
This commit is contained in:
18
SECURITY.md
18
SECURITY.md
@@ -426,6 +426,24 @@ Charon maintains transparency about security issues and their resolution. Below
|
||||
|
||||
## Known Security Considerations
|
||||
|
||||
### Alpine Base Image Vulnerabilities (2026-01-13)
|
||||
|
||||
**Status**: 9 Alpine OS package vulnerabilities identified and accepted pending upstream patches.
|
||||
|
||||
**Affected Packages**:
|
||||
- **busybox** (3 packages): CVE-2025-60876 (MEDIUM) - Heap buffer overflow
|
||||
- **curl** (7 CVEs): CVE-2025-15079, CVE-2025-14819, CVE-2025-14524, CVE-2025-13034, CVE-2025-10966, CVE-2025-14017 (MEDIUM), CVE-2025-15224 (LOW)
|
||||
|
||||
**Risk Assessment**: LOW overall risk due to:
|
||||
- No upstream patches available from Alpine Security Team
|
||||
- Low exploitability in containerized deployment (no shell access, localhost-only curl usage)
|
||||
- Multiple layers of defense-in-depth mitigation
|
||||
- Active monitoring for patches
|
||||
|
||||
**Review Date**: 2026-02-13 (30 days)
|
||||
|
||||
**Details**: See [VULNERABILITY_ACCEPTANCE.md](docs/security/VULNERABILITY_ACCEPTANCE.md) for complete risk assessment, mitigation strategies, and monitoring plan.
|
||||
|
||||
### Third-Party Dependencies
|
||||
|
||||
**CrowdSec Binaries**: As of December 2025, CrowdSec binaries shipped with Charon contain 4 HIGH-severity CVEs in Go stdlib (CVE-2025-58183, CVE-2025-58186, CVE-2025-58187, CVE-2025-61729). These are upstream issues in Go 1.25.1 and will be resolved when CrowdSec releases binaries built with Go 1.25.5+.
|
||||
|
||||
Reference in New Issue
Block a user