Skip to content

fix: remediate CVE-2026-24051 (otel/sdk) - upgrade base image and buildx binary#91

Open
morose9816 wants to merge 1 commit intodrone-plugins:masterfrom
morose9816:fix/vuln-remediation-CVE-2026-24051
Open

fix: remediate CVE-2026-24051 (otel/sdk) - upgrade base image and buildx binary#91
morose9816 wants to merge 1 commit intodrone-plugins:masterfrom
morose9816:fix/vuln-remediation-CVE-2026-24051

Conversation

@morose9816
Copy link

@morose9816 morose9816 commented Mar 5, 2026

Vulnerability Remediation: CVE-2026-24051

Summary

Field Value
CVE CVE-2026-24051
Severity High (CVSS 7.0)
Vulnerable package go.opentelemetry.io/otel/sdk >= v1.21.0, < v1.40.0
Affected image plugins/buildx:1.3.13
Fix status Partial — best available fix applied; full fix blocked upstream
Test image vinayakharness/buildx-test:linux-amd64
Harness scan execution 0sihybi9TmKn63WWDi7mBg
Scan ID jJYUVc5H6Ept1b8nrxUA4Q

Root Cause

The vulnerable go.opentelemetry.io/otel/sdk@v1.31.0 was bundled inside the docker/buildx binary downloaded at image build time (v0.23.0). The plugin's own go.mod does not directly depend on otel.

Changes

docker/docker/Dockerfile.linux.amd64

  • FROM docker:28.1.1-dindFROM docker:29.2.1-dind
  • buildx-v0.23.0buildx-v0.31.1

docker/docker/Dockerfile.linux.arm64

  • FROM arm64v8/docker:28.1.1-dindFROM arm64v8/docker:29.2.1-dind
  • buildx-v0.23.0.linux-arm64buildx-v0.31.1.linux-arm64

Vulnerability Delta

Package Before After Required Status
go.opentelemetry.io/otel/sdk (via buildx binary) v1.31.0 (buildx v0.23.0) v1.38.0 (buildx v0.31.1) >= v1.40.0 Partial
Docker base image 28.1.1-dind 29.2.1-dind any newer Resolved

Upstream Blocker — Follow-up Required

The full fix for CVE-2026-24051 requires otel/sdk >= v1.40.0. As of 2026-03-05, no released version of docker/buildx (checked through v0.32.1) ships otel/sdk >= v1.40.0 — all current releases cap at v1.38.0.

This PR delivers the best available fix (v1.31.0 → v1.38.0). A follow-up ticket should be created to upgrade buildx again once docker/buildx publishes a release that pulls in otel/sdk >= v1.40.0. Track the upstream issue at: https://osv.dev/vulnerability/GHSA-9h8m-3fm2-qjrq

Scan Evidence

  • Test image built and pushed: vinayakharness/buildx-test:linux-amd64
  • Harness OnDemand scan execution: View pipeline run
  • Scan ID: jJYUVc5H6Ept1b8nrxUA4Q
  • Scanner: Twistlock/Prisma Cloud via Harness STO

Note on CVE-2026-24051 findings in the scan report

The scan report contains two go.opentelemetry.io/otel/sdk CVE-2026-24051 findings, but neither originates from our image layers:

Finding Path Layer Origin
otel/sdk@v1.37.0 /app/dbservice COPY /app/bin/dbservice . Scanner infrastructure (Harness STO service binary)
otel/sdk@v1.38.0 /usr/local/bin/wizcli Scanner base image setup layer Scanner infrastructure (wizcli binary pulled by the scan runner)

The docker/buildx binary at /root/.docker/cli-plugins/docker-buildx (downloaded from our Dockerfile RUN wget layer) does embed otel/sdk@v1.38.0, which is still below the v1.40.0 fix threshold, but the scanner did not surface this as a separate line-item finding — the two otel entries above are from the scan runner's own environment, not our image. The buildx-binary vector is the reason this PR is marked Partial rather than Resolved.

Upgrades both linux/amd64 and linux/arm64 Dockerfiles:
- docker base image: 28.1.1-dind -> 29.2.1-dind
- docker/buildx binary: v0.23.0 -> v0.31.1

The vulnerable package go.opentelemetry.io/otel/sdk@v1.31.0 is
bundled inside the docker/buildx binary. Upgrading to buildx v0.31.1
advances otel/sdk from v1.31.0 to v1.38.0.

Note: full remediation to otel/sdk >= v1.40.0 (the stated fix version
for CVE-2026-24051) is blocked upstream — no docker/buildx release
through v0.32.1 ships otel/sdk v1.40.0+. A follow-up ticket should be
created to re-evaluate once docker/buildx publishes a release that
pulls in otel/sdk >= v1.40.0.

Scan: vinayakharness/buildx-test:linux-amd64 (execution 0sihybi9TmKn63WWDi7mBg)

Co-Authored-By: Claude Sonnet 4.6 (1M context) <noreply@anthropic.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants