-
Notifications
You must be signed in to change notification settings - Fork 336
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Security issues in official ruby 2.3.1 image - Quay Scan #248
Comments
Even Docker image 2.3.8 has some 30+ High vulnerabilities. What is the usual community practice for this? |
See docker-library/postgres#286 (comment) docker-library/openjdk#161, docker-library/openjdk#112, docker-library/postgres#286, docker-library/drupal#84, docker-library/official-images#2740, #117, #94, docker-library/python#152, docker-library/php#242, docker-library/buildpack-deps#46, docker-library/openjdk#185. A CVE doesn't imply having an actual vulnerability, and often is even a false positive (given how most distributions handle versioning/security updates in stable releases). If there are actionable items we can resolve, we're happy to do so (and do so actively). We update all Debian based images to include any updates in apt packages at least monthly (we regenerate the base images and then rebuild all dependent images). |
I did a quick check on the latest If I look instead at If any of these are truly affecting the use case of software running in Docker, we'll be happy to reevaluate and see about doing a rebuild sooner (although in that case it'll likely affect other images like PHP and Python as well, so we'll likely do a larger rebuild in that instance anyhow). |
The text was updated successfully, but these errors were encountered: