Summary
The control-plane-migrations image fails the no-vulnerabilities-high policy because the upstream Atlas binary (arigaio/atlas) bundles google.golang.org/grpc v1.77.0, which is affected by GHSA-p77j-4mvh-x3m3 (Critical, CVSS 9.1) — gRPC-Go authorization bypass via missing leading slash in :path.
The fix requires google.golang.org/grpc v1.79.3+.
Current state
- All available Atlas images (
1.1.6, latest/v1.1.7-8165740-canary, our pinned v1.1.7-0f00ade-canary) ship grpc v1.77.0
- All other Chainloop images (control-plane, artifact-cas, cli) are clean
- Practical risk is low: Atlas is used as a CLI migration tool, not a gRPC server
Action items
References
Summary
The
control-plane-migrationsimage fails theno-vulnerabilities-highpolicy because the upstream Atlas binary (arigaio/atlas) bundlesgoogle.golang.org/grpcv1.77.0, which is affected by GHSA-p77j-4mvh-x3m3 (Critical, CVSS 9.1) — gRPC-Go authorization bypass via missing leading slash in:path.The fix requires
google.golang.org/grpcv1.79.3+.Current state
1.1.6,latest/v1.1.7-8165740-canary, our pinnedv1.1.7-0f00ade-canary) ship grpc v1.77.0Action items
app/controlplane/Dockerfile.migrationsonce a fixed Atlas image is availableReferences
app/controlplane/Dockerfile.migrations