wbkoetsier opened a new issue, #8263:
URL: https://github.com/apache/incubator-devlake/issues/8263

   ### Search before asking
   
   - [x] I had searched in the 
[issues](https://github.com/apache/incubator-devlake/issues?q=is%3Aissue) and 
found no similar issues.
   
   
   ### What happened
   
   Similar to issue #6792
   
   We use https://trivy.dev/ to scan images before deploying. Trivy reports a 
long list of high and critical vulnerabilities since last month. I'm using 
devlake release 1.0.1. (btw thanks for devlake, it's a very helpful tool, I'm 
using it to get a gist on how we're doing DORA-wise)
   
   My report shows:
   
   ```
   - bash
   - curl
   - libcurl3-gnutls
   - libcurl4
   - libdb5.3
   - libgcrypt20
   - libldap-2.4-2
   - libldap-common
   - libpam-modules
   - libpam-modules-bin
   - libpam-runtime
   - libpam0g
   - libpython3.9
   - libpython3.9-dev
   - libpython3.9-minimal
   - libpython3.9-stdlib
   - libtiff5
   - libxml2
   - libzstd1
   - linux-libc-dev
   - python3.9
   - python3.9-dev
   - python3.9-minimal
   - zlib1g
   - zlib1g-dev
   Vulnerabilities:
   - CVE-2019-8457: critical
   - CVE-2023-23914: critical
   - CVE-2023-45853: critical
   - CVE-2024-47685: critical
   - CVE-2013-7445: high
   - CVE-2019-19449: high
   - CVE-2019-19814: high
   - CVE-2020-12362: high
   - CVE-2021-33560: high
   - CVE-2021-3847: high
   - CVE-2021-3864: high
   - CVE-2021-39686: high
   - CVE-2021-4204: high
   - CVE-2021-47014: high
   - CVE-2021-47028: high
   - CVE-2021-47094: high
   - CVE-2021-47198: high
   - CVE-2021-47366: high
   - CVE-2021-47467: high
   - CVE-2021-47624: high
   - CVE-2022-0391: high
   - CVE-2022-0500: high
   - CVE-2022-3566: high
   - CVE-2022-3715: high
   - CVE-2022-42916: high
   - CVE-2022-43551: high
   - CVE-2022-48626: high
   - CVE-2022-48670: high
   - CVE-2022-48674: high
   - CVE-2022-48950: high
   - CVE-2022-4899: high
   - CVE-2022-48990: high
   - CVE-2023-2953: high
   - CVE-2023-52355: high
   - CVE-2023-52356: high
   - CVE-2023-52452: high
   - CVE-2023-52480: high
   - CVE-2023-52588: high
   - CVE-2023-52590: high
   - CVE-2023-52640: high
   - CVE-2023-52751: high
   - CVE-2023-52752: high
   - CVE-2023-52755: high
   - CVE-2023-52760: high
   - CVE-2023-52921: high
   - CVE-2024-10963: high
   - CVE-2024-21803: high
   - CVE-2024-23307: high
   - CVE-2024-25062: high
   - CVE-2024-25742: high
   - CVE-2024-25743: high
   - CVE-2024-26589: high
   - CVE-2024-26668: high
   - CVE-2024-26669: high
   - CVE-2024-26913: high
   - CVE-2024-26929: high
   - CVE-2024-26930: high
   - CVE-2024-26952: high
   - CVE-2024-36013: high
   - CVE-2024-38538: high
   - CVE-2024-38545: high
   - CVE-2024-38570: high
   - CVE-2024-38581: high
   - CVE-2024-38588: high
   - CVE-2024-38630: high
   - CVE-2024-38667: high
   - CVE-2024-39479: high
   - CVE-2024-39494: high
   - CVE-2024-39496: high
   - CVE-2024-39508: high
   - CVE-2024-41013: high
   - CVE-2024-41019: high
   - CVE-2024-41061: high
   - CVE-2024-41071: high
   - CVE-2024-41073: high
   - CVE-2024-42136: high
   - CVE-2024-42159: high
   - CVE-2024-42160: high
   - CVE-2024-42162: high
   - CVE-2024-42225: high
   - CVE-2024-42271: high
   - CVE-2024-43900: high
   - CVE-2024-44934: high
   - CVE-2024-44940: high
   - CVE-2024-44941: high
   - CVE-2024-44942: high
   - CVE-2024-44949: high
   - CVE-2024-44977: high
   - CVE-2024-44986: high
   - CVE-2024-45026: high
   - CVE-2024-46746: high
   - CVE-2024-46774: high
   - CVE-2024-46811: high
   - CVE-2024-46812: high
   - CVE-2024-46813: high
   - CVE-2024-46820: high
   - CVE-2024-46821: high
   - CVE-2024-46833: high
   - CVE-2024-46836: high
   - CVE-2024-46849: high
   - CVE-2024-46853: high
   - CVE-2024-46854: high
   - CVE-2024-46858: high
   - CVE-2024-46859: high
   - CVE-2024-46865: high
   - CVE-2024-46871: high
   - CVE-2024-47659: high
   - CVE-2024-47670: high
   - CVE-2024-47691: high
   - CVE-2024-47695: high
   - CVE-2024-47696: high
   - CVE-2024-47697: high
   - CVE-2024-47698: high
   - CVE-2024-47701: high
   - CVE-2024-47718: high
   - CVE-2024-47723: high
   - CVE-2024-47730: high
   - CVE-2024-47742: high
   - CVE-2024-47745: high
   - CVE-2024-47747: high
   - CVE-2024-47748: high
   - CVE-2024-47757: high
   - CVE-2024-49854: high
   - CVE-2024-49860: high
   - CVE-2024-49861: high
   - CVE-2024-49882: high
   - CVE-2024-49883: high
   - CVE-2024-49884: high
   - CVE-2024-49889: high
   - CVE-2024-49894: high
   - CVE-2024-49895: high
   - CVE-2024-49900: high
   - CVE-2024-49903: high
   - CVE-2024-49924: high
   - CVE-2024-49928: high
   - CVE-2024-49930: high
   - CVE-2024-49936: high
   - CVE-2024-49950: high
   - CVE-2024-49960: high
   - CVE-2024-49966: high
   - CVE-2024-49967: high
   - CVE-2024-49969: high
   - CVE-2024-49981: high
   - CVE-2024-49982: high
   - CVE-2024-49983: high
   - CVE-2024-49989: high
   - CVE-2024-49991: high
   - CVE-2024-49992: high
   - CVE-2024-49995: high
   - CVE-2024-49996: high
   - CVE-2024-49997: high
   - CVE-2024-50007: high
   - CVE-2024-50033: high
   - CVE-2024-50035: high
   - CVE-2024-50036: high
   - CVE-2024-50047: high
   - CVE-2024-50055: high
   - CVE-2024-50059: high
   - CVE-2024-50061: high
   - CVE-2024-50063: high
   - CVE-2024-50067: high
   - CVE-2024-50073: high
   - CVE-2024-50074: high
   - CVE-2024-50083: high
   - CVE-2024-50086: high
   - CVE-2024-50106: high
   - CVE-2024-50112: high
   - CVE-2024-50115: high
   - CVE-2024-50121: high
   - CVE-2024-50125: high
   - CVE-2024-50127: high
   - CVE-2024-50131: high
   - CVE-2024-50143: high
   - CVE-2024-50150: high
   - CVE-2024-50151: high
   - CVE-2024-50154: high
   - CVE-2024-50180: high
   - CVE-2024-50193: high
   - CVE-2024-50209: high
   - CVE-2024-50217: high
   - CVE-2024-50230: high
   - CVE-2024-50234: high
   - CVE-2024-50262: high
   - CVE-2024-50264: high
   - CVE-2024-50267: high
   - CVE-2024-50268: high
   - CVE-2024-50269: high
   - CVE-2024-50278: high
   - CVE-2024-50279: high
   - CVE-2024-50282: high
   - CVE-2024-50283: high
   - CVE-2024-50286: high
   - CVE-2024-50301: high
   - CVE-2024-53057: high
   - CVE-2024-53059: high
   - CVE-2024-53061: high
   - CVE-2024-53068: high
   - CVE-2024-53103: high
   - CVE-2024-7006: high
   
   ```
   
   
   
   ### What do you expect to happen
   
   I can see that you're using debian bullseye, which is eol. The 
vulnerabilities seem to originate from python-slim-bullseye, at least for 
backend.
   
   Would you kindly update all images so you're using debian bookworm?
   
   It would also perhaps be helpful to use cve scan on dockerhub, or implement 
a cve scan in your own pipelines? And some tooling like renovate for regular 
updates of dependencies?
   
   For me, I can no longer run devlake as our dependency scanning is strict and 
has to be repeated quite often. I'm down atm because of this (and I fully agree 
with our security team on this). I'm a bit surprised no-one else encountered 
this, besides the reported issue #6792.
   
   ### How to reproduce
   
   Run a cve scan on backend and config-ui version 1.0.1
   
   ### Anything else
   
   _No response_
   
   ### Version
   
   v1.0.1
   
   ### Are you willing to submit PR?
   
   - [x] Yes I am willing to submit a PR!
   
   ### Code of Conduct
   
   - [x] I agree to follow this project's [Code of 
Conduct](https://www.apache.org/foundation/policies/conduct)
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: dev-unsubscr...@devlake.apache.org.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to