-
Notifications
You must be signed in to change notification settings - Fork 178
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Critical CVEs in registry container #170
Comments
Please use |
The only 3.x version appears to be 3.0.0-alpha.1 per https://hub.docker.com/_/registry/tags. Am I pulling from the correct docker location? |
They just merged docker-library/official-images#17151 Not sure how long it takes to build it 🤷♂️ In the meantime you can grab the latest release from:
|
I just pulled down distribution/distribution:3.0.0-beta.1 and it still has two fixable Critical CVEs: Can this be fixed in the container image? |
Unfortunately, the latest alpine image we build off has those vulns so there is nothing we can do about that until that basee image is fixed. https://hub.docker.com/_/alpine/tags Grab a binary and build your own is the best I can recommend to you at the moment. |
Thanks for the quick reply. Adding this link as a reference: alpinelinux/docker-alpine#405. Let's leave this ticket open as we wait for the container base image to be patched. |
The latest registry:2 container has critical CVEs.
NAME INSTALLED FIXED-IN TYPE VULNERABILITY SEVERITY
libcrypto3 3.1.5-r0 3.1.6-r0 apk CVE-2024-5535 Critical
libcrypto3 3.1.5-r0 3.1.6-r0 apk CVE-2024-4741 Unknown
libssl3 3.1.5-r0 3.1.6-r0 apk CVE-2024-5535 Critical
libssl3 3.1.5-r0 3.1.6-r0 apk CVE-2024-4741 Unknown
This was scanned using Grype.
Can these be fixed?
The text was updated successfully, but these errors were encountered: