-
Notifications
You must be signed in to change notification settings - Fork 157
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerabilities CVE-2023-23914, CVE-2023-23916 & CVE-2023-23915 #133
Comments
is any fix expected here, like pushing a new version to Docker registry with versions of the library where this is fixed? We have also seen the same issue |
I'm rebuilding the images right now 😄 -- some thoughts on the matter:
That being said, can something like the solution you proposed be accomplished? I can't see why not. But, I don't have the cycles to work on it at the moment and any ETA I could mention here is bound to slip. Might I suggest opening a new issue with your suggestion as a feature request and hopefully either me or some community member will work on it at some stage? (PRs are always more than welcome!) |
Images did get rebuilt but there might be an issue with the caching system not detecting there's a new version of |
Ok I went ahead and deleted the whole cache and I'm rebuilding everything from scratch as a temporary workaround. New images should be live within the next day. I'll try to do some more digging to see if there's an "easy" way to force a cache refresh (there might be if Docker created easily identifiable cache keys, albeit it does not). If I can't find anything within the next couple weeks I'll just remove the cache for the time being -- Docker GH caching is in preview mode for now so I don't want to necessarily spend to much time trying to figure out a solution for something that might get addressed by the time it goes GA. |
Closing this issue, tracking the feature request on #136. |
Vulnerabilities CVE-2023-23914, CVE-2023-23916 & CVE-2023-23915
These vulnerabilities occurred due to libraries curl & libcurl, I truly understand security advisory posted along with this repo, but at the same time it is hard to explain to customers, this is happening very often since last few weeks.
To reproduce
Steps to reproduce the behavior:
Run
trivy image nginxinc/nginx-unprivileged:1.23.3-alpine
Environment
Proposed solution
Can we scan image regularly & through some job & as soon as we encounter vulnerabilities for non direct dependency, we can trigger the build to rebuild the tag? This small automation can solve the pain for many who are relying on this image in many production environments.
The text was updated successfully, but these errors were encountered: