I tried the same procedure as described in the original report. It seems that one CVE is fixed but the other two remain:
docker run ubuntu:noble -it /bin/bash apt update && apt install gosu gosu --version 1.17 (go1.22.2 on linux/arm64; gc) docker commit <container_id> ubuntu-noble-security docker scout cves --locations --only-severity "critical,high" ubuntu-noble-security ... ## Packages and Vulnerabilities 1C 1H 0M 0L stdlib 1.22.2 pkg:golang/stdlib@1.22.2 6: sha256:74098bae0fa49d842f7abd64314d0e24efa515611d738d265566498d9caafd12 /usr/sbin/gosu (evident by) ✗ CRITICAL CVE-2024-24790 https://scout.docker.com/v/CVE-2024-24790 Affected range : >=1.22.0-0 : <1.22.4 Fixed version : 1.22.4 ✗ HIGH CVE-2024-24791 https://scout.docker.com/v/CVE-2024-24791 Affected range : >=1.22.0-0 : <1.22.5 Fixed version : 1.22.5 ** Description changed: Previously reported here: https://github.com/docker- library/cassandra/issues/276#issuecomment-2222627720 Using the latest official ubuntu:noble (or ubuntu:24.10 and probably others) images from dockerhub and installing gosu via `apt update && apt install gosu`. If I create such an image, docker scout reports a few critical and high vulnerabilities. ---- - docker run ubuntu:noble -it /bin/bash + docker run -it ubuntu:noble /bin/bash # inside the container apt update && apt install gosu gosu --version 1.17 (go1.21.3 on linux/arm64; gc) # create a new image with installed gosu docker commit <container_id> ubuntu-noble-security docker scout cves --locations --only-severity "critical,high" ubuntu-noble-security ... - ✗ Detected 1 vulnerable package with 3 vulnerabilities + ✗ Detected 1 vulnerable package with 3 vulnerabilities ## Packages and Vulnerabilities - 1C 2H 0M 0L stdlib 1.21.3 + 1C 2H 0M 0L stdlib 1.21.3 pkg:golang/stdlib@1.21.3 6: sha256:72d0bb40b06f68e2b1dbbd238d3aa6696de4df6793602d68417c2bac696c10ca /usr/sbin/gosu (evident by) - ✗ CRITICAL CVE-2024-24790 - https://scout.docker.com/v/CVE-2024-24790 - Affected range : <1.21.11 - Fixed version : 1.21.11 + ✗ CRITICAL CVE-2024-24790 + https://scout.docker.com/v/CVE-2024-24790 + Affected range : <1.21.11 + Fixed version : 1.21.11 - ✗ HIGH CVE-2024-24791 - https://scout.docker.com/v/CVE-2024-24791 - Affected range : <1.21.12 - Fixed version : 1.21.12 + ✗ HIGH CVE-2024-24791 + https://scout.docker.com/v/CVE-2024-24791 + Affected range : <1.21.12 + Fixed version : 1.21.12 - ✗ HIGH CVE-2023-45283 - https://scout.docker.com/v/CVE-2023-45283 - Affected range : >=1.21.0-0 - : <1.21.4 - Fixed version : 1.21.4 + ✗ HIGH CVE-2023-45283 + https://scout.docker.com/v/CVE-2023-45283 + Affected range : >=1.21.0-0 + : <1.21.4 + Fixed version : 1.21.4 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/2072883 Title: Docker scout reports critical and high vulnerabilities for Ubuntu docker images with installed gosu To manage notifications about this bug go to: https://bugs.launchpad.net/cloud-images/+bug/2072883/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs