-
Notifications
You must be signed in to change notification settings - Fork 278
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerabilities in Docker images 3.0 and 3.11 #194
Comments
See docker-library/postgres#286 (comment) docker-library/openjdk#161, docker-library/openjdk#112, docker-library/postgres#286, docker-library/drupal#84, docker-library/official-images#2740, docker-library/ruby#117, docker-library/ruby#94, docker-library/python#152, docker-library/php#242, docker-library/buildpack-deps#46, docker-library/openjdk#185. A CVE doesn't imply having an actual vulnerability, and often is even a false positive (given how most distributions handle versioning/security updates in stable releases). If there are actionable items we can resolve, we're happy to do so (and do so actively). We update all Debian based images to include any updates in apt packages at least monthly (we regenerate the base images and then rebuild all dependent images). https://security-tracker.debian.org/tracker/CVE-2017-18018 https://security-tracker.debian.org/tracker/CVE-2017-12814 https://security-tracker.debian.org/tracker/CVE-2017-12837 https://security-tracker.debian.org/tracker/CVE-2017-12883 https://security-tracker.debian.org/tracker/CVE-2018-6797 https://security-tracker.debian.org/tracker/CVE-2018-6913 https://security-tracker.debian.org/tracker/CVE-2018-12015 https://security-tracker.debian.org/tracker/CVE-2018-18311 https://security-tracker.debian.org/tracker/CVE-2018-18312 https://security-tracker.debian.org/tracker/CVE-2018-18313 https://security-tracker.debian.org/tracker/CVE-2013-7338 https://security-tracker.debian.org/tracker/CVE-2015-5652 https://security-tracker.debian.org/tracker/CVE-2016-1494 https://security-tracker.debian.org/tracker/CVE-2017-17522
https://security-tracker.debian.org/tracker/CVE-2017-18207
https://security-tracker.debian.org/tracker/CVE-2018-1000030
https://security-tracker.debian.org/tracker/CVE-2019-9636
https://security-tracker.debian.org/tracker/CVE-2019-9740
https://security-tracker.debian.org/tracker/CVE-2019-9947
https://security-tracker.debian.org/tracker/CVE-2019-9948
https://security-tracker.debian.org/tracker/CVE-2017-17512 https://security-tracker.debian.org/tracker/CVE-2018-20482
https://security-tracker.debian.org/tracker/CVE-2019-9923
I don't see anything actionable for us |
Thank you for your thorough answer! I see that in case of In case of tar, is there a way you could upgrade it to version |
No, we aren't going to backport versions of packages just to satisfy a CVE scanner tool -- the tool should be updated to be aware of Debian's version numbering and incorporate the (freely available) Debian security database to determine whether a given CVE is actually actionable. |
We found several vulnerabilities in Cassandra images 3.0 and 3.11
They are mostly coming from debian base image
Is there a way you could either upgrade them to newer versions or remove this packages when building Docker image?
The full list of found vulnerabilities:
In package coreutils@8.26-3:
In package perl@5.24.1-3+deb9u5
In package python@2.7.13-2
In package sensible-utils@0.0.9+deb9u1
In package tar@1.29b-1.1
The text was updated successfully, but these errors were encountered: