mirror of
https://github.com/acme-dns/acme-dns.git
synced 2026-04-27 12:55:48 +03:00
[GH-ISSUE #287] Dependency vulernability report #150
Labels
No labels
Documentation
Documentation
bug
enhancement
feature request
feature request
help wanted
pull-request
question
security
security
testing
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/acme-dns#150
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @anthonator on GitHub (Dec 23, 2021).
Original GitHub issue: https://github.com/acme-dns/acme-dns/issues/287
This report was generated using
trivyfor Docker imagejoohoi/acme-dns:latest.Command used
Alpine related vulnerabilities
acme-dnsrelated vulnerabilities@anthonator commented on GitHub (Dec 23, 2021):
Sorry for the churn in the title. I didn't want to needlessly scare anyone.
This is a report from
trivyon vulnerabilities detected for the Docker imagejoohoi/acme-dns:latest(I'm assuming this is maintained by @joohoi). Since this is a public image I thought it was important to report on vulnerabilities within the base Alpine image as well as the Go dependencies ofacme-dns.I was able to resolve
CVE-2019-19794,CVE-2020-29652andCVE-2020-14040by updating to the latest versions ofgithub.com/miekg/dnsandgolang.org/x/crypto. The only vulnerability left isCVE-2021-38561which currently has a severity ofUNKNOWN.The steps needed to resolve the vulnerabilities in the manner I described above are:
3.15.0) inDockerfilegithub.com/miekg/dnsto versionv1.1.45atgo.mod:24golang.org/x/cryptoto versionv0.0.0-20211215153901-e495a2d5b3d3atgo.mod:35My hope is this report will encourage the maintainers of this project to update this project's dependencies so these issues can be resolved. I would also encourage automating dependency updates using a tool like Dependabot or Renovate.
I would submit a pull request for these issues myself but it doesn't look like this project has seen much attention recently and a lot of issues and pull requests have gone unanswered so I don't want to spend more time on this unless I get a 👍 from someone who could merge a pull request.
@joohoi commented on GitHub (Jan 25, 2022):
Thanks for this report, it's highly appreciated. I had to make some changes to how certmagic is used because they updated their whole API between the versions, but I believe I have everything sorted out now... Well except
CVE-2021-38561that seems to still be unpublished.@hstock commented on GitHub (Jan 27, 2023):
image might need a rebuild with Alpine security updates:
(Report created by grype)