-
Notifications
You must be signed in to change notification settings - Fork 91
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CVE's on latest container image citrix-k8s-ingress-controller:2.1.4 #677
Comments
Hi @yethishgv, Additionally, can you please let us know the Scanning tool that is flagging the said CVEs. Regards! |
Hi @arijitr-citrix, |
Hi @yethishgv , We have migrated to new repo and it was supported for a year or so. But from last release it will not be published to the citrix repo. Images will be updated into netscaler repo: quay.io/netscaler/netscaler-k8s-ingress-controller:2.2.10 Kindly use this in the repo. Additionally, if you are using helm charts, you will notice deprecation notices on citrix helm charts and you have to use netscaler helm charts: https://artifacthub.io/packages/helm/netscaler/citrix-cloud-native |
Hi @arijitr-citrix CVE-2024-9143 CVE-2024-9287 CVE-2024-50602 CVE-2024-37371 CVE-2024-37370 |
Hi @yethishgv , |
The latest Docker image citrix-k8s-ingress-controller:2.1.4 contains 25 CVEs, including one dating back to 2015. Are there any plans to address these vulnerabilities?
CVE-2015-2104
Active
python3-pycache-pyc0, python3-pyc, and 1 more...
Upgrade 3 packages
CVE-2023-27043
Active
python3-pyc, python3, and 1 more...
Upgrade 3 packages
CVE-2023-36054
Active
krb5-libs
Upgrade krb5-libs to >= 1.20.2-r0
CVE-2023-42363
Active
busybox-binsh, busybox, and 1 more...
Upgrade 3 packages
CVE-2023-42364
Active
busybox-binsh, busybox, and 1 more...
Upgrade 3 packages
CVE-2023-42365
Active
busybox-binsh, busybox, and 1 more...
Upgrade 3 packages
CVE-2023-42366
Active
busybox-binsh, busybox, and 1 more...
Upgrade 3 packages
CVE-2024-2511
Active
libssl3, libcrypto3
Upgrade 2 packages
CVE-2024-37370
Active
krb5-libs
Upgrade krb5-libs to >= 1.20.2-r1
CVE-2024-37371
Active
krb5-libs
Upgrade krb5-libs to >= 1.20.2-r1
CVE-2024-4032
Active
python3-pycache-pyc0, python3-pyc, and 1 more...
Upgrade 3 packages
CVE-2024-45490
Active
libexpat
Upgrade libexpat to >= 2.6.3-r0
CVE-2024-45491
Active
libexpat
Upgrade libexpat to >= 2.6.3-r0
CVE-2024-45492
Active
libexpat
Upgrade libexpat to >= 2.6.3-r0
CVE-2024-4603
Active
libssl3, libcrypto3
Upgrade 2 packages
CVE-2024-4741
Active
libssl3, libcrypto3
Upgrade 2 packages
CVE-2024-50602
Active
libexpat
Upgrade libexpat to >= 2.6.4-r0
CVE-2024-5535
Active
libcrypto3, libssl3
Upgrade 2 packages
CVE-2024-6119
Active
libssl3, libcrypto3
Upgrade 2 packages
CVE-2024-6232
Active
python3-pycache-pyc0, python3-pyc, and 1 more...
Upgrade 3 packages
CVE-2024-6923
Active
python3-pyc, python3, and 1 more...
Upgrade 3 packages
CVE-2024-7592
Active
python3-pycache-pyc0, python3-pyc, and 1 more...
Upgrade 3 packages
CVE-2024-8088
Active
python3, python3-pycache-pyc0, and 1 more...
Upgrade 3 packages
CVE-2024-9143
Active
libssl3, libcrypto3
Upgrade 2 packages
CVE-2024-9287
Active
python3-pyc, python3, and 1 more...
Upgrade 3 packages
The text was updated successfully, but these errors were encountered: