-
Notifications
You must be signed in to change notification settings - Fork 551
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
multiple critical CVEs in the image #168
Comments
@ismail-bertalfilali A new baseimage has been used for all images and re-uploaded to docker.hub, could you please recheck the current images against your list and if the CVE list has been resolved, please close this issue |
@Grokzen , thx for you efforts. No critcal CVEs but there is a lot of High CVEs in this version grokzen/redis-cluster:7.2.5, we are still not allowed to use it by security departement. Here's the data converted to a markup table format:
|
@Grokzen images from redhat registry seems to be more secure rhel9/redis-7. I don't know if it is simple to switch to them ? |
Yeah i could try that image, also i see that some things really don't need to be in the image, getting python out from it could be an option as well to really push out the last few CVE:s. But i will try the mentioned image @ismail-bertalfilali |
Hello,
We are trying to use the image grokzen/redis-cluster:7.0.10 but it contains several CVEs any plan to upgrade the packages used ? Thank you
The text was updated successfully, but these errors were encountered: