-
Notifications
You must be signed in to change notification settings - Fork 181
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerabilities related to stdlib 1.19 and setuptools 44.1.1 #725
Comments
This comment was marked as outdated.
This comment was marked as outdated.
I think these are came from here
I think this can be resolved by automatically resolving dependencies using gdebi-core like this: PR for fix this is welcome! |
@eitsupi I am probably just missing something, but why are we using the |
I don't think reinstallation will be a problem since the latest base image will be used during the rebuild. My guess is that this is an ancient dependency and I have a feeling that Python2 is being installed for no good reason. |
My motivation is to skip the useless execution of apt-get update in the absence of newly installed packages. |
Thanks @eitsupi ! yes, that sounds right. a quick check builds fine after making this python3-setuptools, though I would have thought even the older version is still under the purview of the Ubuntu security team. (Aside, but a nice interview at https://podcast.sustainoss.org/203 with the maintainer of cURL on the limitations of the CVE vulnerability database -- the classification of these vulnerabilities is not nearly as careful or precise process as I might have imagined. Anyway, my general take is to defer to security experts on these issues :-). But I'm all for changing this dependency to python3 or switching to gdebi here. |
ℹ️ Regarding CVEs (not) reported for Ubuntu:
|
Debian dev here: No, you don't get it into stable. Everybody can upload to unstable, it may migrate to testing. You need release managers to get it into the releases made. |
Container image name
rocker/rstudio:latest
Container image digest
rocker/rstudio@sha256:e6559b33f732059bd07706fe20e425677e01a765c4881af7bdbe7c123035e79c
What operating system related to this question?
No response
System information
No response
Question
I have searched the latest image available on docker hub (rocker/rstudio:latest) and it seems to have some security vulnrabilities genereated in the layer associated with the command /bin/sh -c /rocker_scripts/install_rstudio.sh # buildkit.
Main once with critical and high vulnrabilities based on output from docker scout are stdlib 1.19 and setuptools 44.1.1.
Is there any way to solve these issues, or any recomendations how to fix/other image i should use?
Thank you in advance.
The text was updated successfully, but these errors were encountered: