-
Notifications
You must be signed in to change notification settings - Fork 427
New issue
Have a question about this project? # for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “#”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? # to your account
CVE vulnerabilities of latest docker #407
Comments
See https://github.com/docker-library/faq#why-does-my-security-scanner-show-that-an-image-has-so-many-cves A CVE doesn't imply having an actual vulnerability, and often is even a false positive (given how most distributions handle versioning/security updates in stable releases). If there are actionable items we can resolve, we're happy to do so (and do so actively). We update all Debian based images to include any updates in apt packages at least monthly (we regenerate the base images and then rebuild all dependent images). $ docker run -it --rm rabbitmq bash
root@929695a5455d:/# apt update && apt upgrade
Get:1 http://archive.ubuntu.com/ubuntu bionic InRelease [242 kB]
Get:2 http://security.ubuntu.com/ubuntu bionic-security InRelease [88.7 kB]
Get:3 http://archive.ubuntu.com/ubuntu bionic-updates InRelease [88.7 kB]
Get:4 http://security.ubuntu.com/ubuntu bionic-security/multiverse amd64 Packages [8505 B]
Get:5 http://archive.ubuntu.com/ubuntu bionic-backports InRelease [74.6 kB]
Get:6 http://security.ubuntu.com/ubuntu bionic-security/main amd64 Packages [908 kB]
Get:7 http://archive.ubuntu.com/ubuntu bionic/universe amd64 Packages [11.3 MB]
Get:8 http://security.ubuntu.com/ubuntu bionic-security/restricted amd64 Packages [52.4 kB]
Get:9 http://security.ubuntu.com/ubuntu bionic-security/universe amd64 Packages [843 kB]
Get:10 http://archive.ubuntu.com/ubuntu bionic/main amd64 Packages [1344 kB]
Get:11 http://archive.ubuntu.com/ubuntu bionic/restricted amd64 Packages [13.5 kB]
Get:12 http://archive.ubuntu.com/ubuntu bionic/multiverse amd64 Packages [186 kB]
Get:13 http://archive.ubuntu.com/ubuntu bionic-updates/universe amd64 Packages [1376 kB]
Get:14 http://archive.ubuntu.com/ubuntu bionic-updates/main amd64 Packages [1205 kB]
Get:15 http://archive.ubuntu.com/ubuntu bionic-updates/multiverse amd64 Packages [19.8 kB]
Get:16 http://archive.ubuntu.com/ubuntu bionic-updates/restricted amd64 Packages [66.8 kB]
Get:17 http://archive.ubuntu.com/ubuntu bionic-backports/main amd64 Packages [8286 B]
Get:18 http://archive.ubuntu.com/ubuntu bionic-backports/universe amd64 Packages [7671 B]
Fetched 17.9 MB in 3s (5815 kB/s)
Reading package lists... Done
Building dependency tree
Reading state information... Done
All packages are up to date.
Reading package lists... Done
Building dependency tree
Reading state information... Done
Calculating upgrade... Done
The following packages were automatically installed and are no longer required:
gcc-7-base xz-utils
Use 'apt autoremove' to remove them.
0 upgraded, 0 newly installed, 0 to remove and 0 not upgraded. There's nothing to be updated in the image |
I use "docker pull rabbitmq" to get docker images from docker hub.Find the version of rabbitmq images is 3.8.3 There are still many vulnerabilities. libdb-5.3.so libc-2.28.so |
Since there are no updates available and
Since there are no package updates available, there is nothing we can do. You may want to push back on your scanner company since they seem to be incorrectly matching unrelated CVE's on "berkeleydb" |
I think this should be closed to not confuse and unnecessarily scare those looking at the list of open issues. |
Agreed, thanks for the reminder 👍 |
Scanned rabbitmq:latest and there are many vulnerabilities found.
Describe the results you received:
CVE-2009-5155
CVE-2009-5155
CVE-2019-6488
CVE-2019-6488
CVE-2019-9169
CVE-2019-9169
CVE-2018-20796
CVE-2018-20796
CVE-2019-9192
CVE-2019-9192
CVE-2019-3829
CVE-2018-6829
CVE-2018-6829
CVE-2018-1122
CVE-2018-1122
CVE-2018-1122
CVE-2018-1122
CVE-2018-1122
CVE-2018-1122
CVE-2018-1122
CVE-2018-1122
CVE-2018-1122
CVE-2018-1122
CVE-2018-1122
CVE-2018-1122
CVE-2018-1122
CVE-2018-1122
CVE-2018-1122
CVE-2018-1126
CVE-2018-1126
CVE-2018-1126
CVE-2018-1126
CVE-2018-1126
CVE-2018-1126
CVE-2018-1126
CVE-2018-1126
CVE-2018-1126
CVE-2018-1126
CVE-2018-1126
CVE-2018-1126
CVE-2018-1126
CVE-2018-1126
CVE-2018-1126
CVE-2018-1124
CVE-2018-1124
CVE-2018-1124
CVE-2018-1124
CVE-2018-1124
CVE-2018-1124
CVE-2018-1124
CVE-2018-1124
CVE-2018-1124
CVE-2018-1124
CVE-2018-1124
CVE-2018-1124
CVE-2018-1124
CVE-2018-1124
CVE-2018-1124
CVE-2018-1125
CVE-2018-1125
CVE-2018-1125
CVE-2018-1125
CVE-2018-1125
CVE-2018-1125
CVE-2018-1125
CVE-2018-1125
CVE-2018-1125
CVE-2018-1125
CVE-2018-1125
CVE-2018-1125
CVE-2018-1125
CVE-2018-1125
CVE-2018-1125
CVE-2018-1123
CVE-2018-1123
CVE-2018-1123
CVE-2018-1123
CVE-2018-1123
CVE-2018-1123
CVE-2018-1123
CVE-2018-1123
CVE-2018-1123
CVE-2018-1123
CVE-2018-1123
CVE-2018-1123
CVE-2018-1123
CVE-2018-1123
CVE-2018-1123
CVE-2018-16865
CVE-2018-16865
CVE-2018-16864
CVE-2018-16864
CVE-2018-15688
CVE-2018-15688
CVE-2019-3842
CVE-2019-3842
CVE-2019-3844
CVE-2019-3844
CVE-2019-3843
CVE-2019-3843
CVE-2019-9923
Describe the results you expected:
I don't know which version will solve these problems in the future? I wonder if there is such a plan in the future?
Version:
rabbitmq:latest (3.8.3)
The text was updated successfully, but these errors were encountered: