3.1.16-buster-slim CVE-2021-3520 Critical Issue Question #2886
Unanswered
KinPatelHub
asked this question in
Q&A
Replies: 1 comment 3 replies
-
The vulnerable package in question is lz4. This package is not installed by .NET and instead comes from the Debian base image. It contains version 1.8.3-1 instead of the fixed version 1.8.3-1+deb10u1. Once it is updated in the Debian base image, we'll rebuild the affected .NET images. ❯ docker pull debian:buster-slim
buster-slim: Pulling from library/debian
Digest: sha256:f077cd32bfea6c4fa8ddeea05c53b27e90c7fad097e2011c9f5f11a8668f8db4
Status: Image is up to date for debian:buster-slim
docker.io/library/debian:buster-slim
❯ docker run --rm debian:buster-slim apt list liblz4-1
WARNING: apt does not have a stable CLI interface. Use with caution in scripts.
Listing...
liblz4-1/now 1.8.3-1 amd64 [installed,local] |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Team,
Does the latest .NET CORE 3.1.16-buster-slim image takes care of the CVE-2021-3520 Critical issue reported? I was using 3.1.14-buster-slim and twistlock started complaining about the latest critical issue. I had updated to 3.1.16-buster-slim which was updated most recently and twistlock scans still complains about this issue. Can someone please guide here?
Thanks,
Kinjal
Beta Was this translation helpful? Give feedback.
All reactions