-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
postgres:14.4-alpine vulnerabilities CVE-2022-2097 #980
Comments
It'll get updated on its regular monthly cadence. You can also manually update the package in your image if you wanted in the meantime docker-library/python#728 (comment) Background:
Official Images FAQ:
Since our build system makes heavy use of Docker build cache, just rebuilding the all of the Dockerfiles won't cause any change. So we rely on periodic base image updates.
|
Thank you for your answer. For the future, is it of any use to the maintainer to report the vulnerabilities here? |
In most cases not really, CVE's that do pose a real and critical threat are pretty rare especially in a container environment. We do take them seriously and perform security updates regularly. When the log4j and heartbleed vulnerabilities became known they were fixed ASAP in the Official Images.
$ docker run -it --rm postgres:14.4-alpine bash
bash-5.1# apk update && apk -u list && apk upgrade --simulate
fetch https://dl-cdn.alpinelinux.org/alpine/v3.16/main/x86_64/APKINDEX.tar.gz
fetch https://dl-cdn.alpinelinux.org/alpine/v3.16/community/x86_64/APKINDEX.tar.gz
v3.16.1-5-ge692d8f074 [https://dl-cdn.alpinelinux.org/alpine/v3.16/main]
v3.16.1-8-g10ac62ce57 [https://dl-cdn.alpinelinux.org/alpine/v3.16/community]
OK: 17026 distinct packages available
OK: 159 MiB in 45 packages $ docker run -it --rm postgres:14.4 bash
root@e31ba5c96e4c:/# apt update && apt list --upgradable
Get:1 http://deb.debian.org/debian bullseye InRelease [116 kB]
Get:2 http://deb.debian.org/debian-security bullseye-security InRelease [44.1 kB]
Get:3 http://deb.debian.org/debian bullseye-updates InRelease [44.1 kB]
Get:4 http://deb.debian.org/debian bullseye/main amd64 Packages [8,182 kB]
Get:5 http://deb.debian.org/debian-security bullseye-security/main amd64 Packages [166 kB]
Get:6 http://apt.postgresql.org/pub/repos/apt bullseye-pgdg InRelease [91.7 kB]
Get:7 http://deb.debian.org/debian bullseye-updates/main amd64 Packages [2,592 B]
Get:8 http://apt.postgresql.org/pub/repos/apt bullseye-pgdg/main amd64 Packages [249 kB]
Fetched 8,896 kB in 2s (5,609 kB/s)
Reading package lists... Done
Building dependency tree... Done
Reading state information... Done
All packages are up to date.
Listing... Done Examples of previous CVE related issues docker-library/openjdk#449 (comment), #286 (comment) docker-library/openjdk#161, docker-library/openjdk#112, #286, docker-library/drupal#84, docker-library/official-images#2740, docker-library/ruby#117, docker-library/ruby#94, docker-library/python#152, docker-library/php#242, docker-library/buildpack-deps#46, docker-library/openjdk#185. |
Running Trivy against postgres:14.4-alpine image I find the following vulnerability:
The text was updated successfully, but these errors were encountered: