-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE’s in base Postgres image #701
Comments
See https://github.com/docker-library/faq#why-does-my-security-scanner-show-that-an-image-has-so-many-cves A CVE doesn't imply having an actual vulnerability, and often is even a false positive (given how most distributions handle versioning/security updates in stable releases). If there are actionable items we can resolve, we're happy to do so (and do so actively). We update all Debian based images to include any updates in apt packages at least monthly (we regenerate the base images and then rebuild all dependent images). |
Thank you @wglambert that makes sense. Unfortunately my company doesn't allow any containers to be used that have any reported severe or high cve's. :( |
I just ran this image through my company's blackduck container scan and the following CVE's were detected. Let me know what other information is needed to make this an effective issue report.
libidn2
runc
libsecomp
berkeleydb
kerberos
tar
glibc
shadow
gnupg
selinux
procps
The text was updated successfully, but these errors were encountered: