-
Notifications
You must be signed in to change notification settings - Fork 2k
Closed
Description
From gliderlabs/docker-alpine#299
Hello,
In my Dockerfile I use FROM node:6.9.4-alpine
.
IBM Bluemix provides a Vulnerability Advisor feature that can scan images and provide a report.
I was notified of the following:
PACKAGE SUMMARY URL zlib inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic. inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic. The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers. The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.
How can I address this, given that I must stay with node:6.9.4
?
Will this base image be updated to address this?
Is using FROM node:6-alpine
a better approach? Will it provide, at minimum, 6.9.4 or a different version?
Metadata
Metadata
Assignees
Labels
No labels