Hi,

I've prepared some docker image based on Debian 12 (bookworm, fully updated) and after upload it to local registry it has been automatically scanned for possible vulnerabilities. Then I was really surprised when discovered that according to this scan there are 139 security vulnerabilities and 2 of them are CRITICAL (!).
I've started to dig further to find out what's going on there.

First critical on the list is "zlib1g" binary Debian package which is a part of (a result) of wider package "zlib":

https://tracker.debian.org/pkg/zlib

According to this information (link below), this package is still vulnerable in bookworm and marked as "(no-DSA, ignored)":

https://security-tracker.debian.org/tracker/source-package/zlib

But according to this (link below), that may be the case "if its severity is minor":

https://security-team.debian.org/security_tracker.html#issues-not-warranting-a-security-advisory

But it seams this is CRITICAL issue (with score 9.8 in one of its three parts):

https://www.cvedetails.com/cve/CVE-2023-45853/

Why it is not fixed in bookworm? Or maybe where I misunderstand something from these information above?

Similar problem in second critical on the list: package "libaom3" which is a binary package from "aom":

https://tracker.debian.org/pkg/aom

https://security-tracker.debian.org/tracker/source-package/aom

https://www.cvedetails.com/cve/CVE-2023-6879/

Please help me to understand :-)

Best regards,
Rafal






Reply via email to