-
Notifications
You must be signed in to change notification settings - Fork 73
kube-arangodb 1.2.47 - Security Vulnerabilities #1866
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Hello @nnaik25 ! The above issues are related to the base image used by the Operator and there is no fix for them in Ubuntu (we are always getting the latest security updates during the release). In this case, it is quite impossible to fix them. Best Regards, |
Thanks @ajanikow for quick response Not now, but would you be fixing them in future release provided you get the Ubuntu base image fixes |
Hello @nnaik25 ! Yes, it is always a step in our release process - we update all dependencies for each build. It includes Go and System dependencies published at the time of build. Best Regards, |
Hello! Part of them were fixed with the release of 1.2.48. Best Regards, |
Uh oh!
There was an error while loading. Please reload this page.
We are seeing below vulnerabilities reported for kube-arangodb 1.2.47
[7.4] [CVE-2024-10963] [libpam-modules-bin] [1.5.3-5ubuntu5.1]
[7.5] [CVE-2016-20013] [libc6] [2.39-0ubuntu8.4]
[7.5] [CVE-2024-41996] [libssl3t64] [3.0.13-0ubuntu3.5]
[7.4] [CVE-2024-10963] [libpam0g] [1.5.3-5ubuntu5.1]
[4.7] [CVE-2024-10041] [libpam0g] [1.5.3-5ubuntu5.1]
[7.4] [CVE-2024-10963] [libpam-modules] [1.5.3-5ubuntu5.1]
[7.4] [CVE-2024-10963] [libpam-runtime] [1.5.3-5ubuntu5.1]
[5.9] [CVE-2024-2236] [libgcrypt20] [1.10.3-2build1]
[5.9] [CVE-2024-2236] [libgcrypt20] [1.10.3-2build1]
[6.5] [CVE-2016-2781] [coreutils] [9.4-3ubuntu6]
[6.1] [CVE-2024-45336] [stdlib] [1.22.8] [intelligent_integration]
[4.4] [CVE-2025-22870] [golang.org/x/net] [v0.23.0]
[6.5] [CVE-2025-22872] [golang.org/x/net] [v0.34.0] [intelligent_integration]
[7.5] [CVE-2025-22869] [golang.org/x/crypto] [v0.32.0] [intelligent_integration]
[6.5] [CVE-2025-32387] [helm.sh/helm/v3] [v3.16.2] [intelligent_integration]
[6.5] [CVE-2025-32386] [helm.sh/helm/v3] [v3.16.2] [intelligent_integration]
[9.1] [CVE-2025-22871] [stdlib] [1.22.8] [intelligent_integration]
[6.1] [CVE-2024-45341] [stdlib] [1.22.8] [intelligent_integration]
[4.0] [CVE-2025-22866] [stdlib] [1.22.8] [intelligent_integration]
[5.0] [CVE-2025-31115] [liblzma5] [5.6.1+really5.4.5-1build0.1] [intelligent_integration]
[2.7] [CVE-2025-30258] [gpgv] [2.4.4-2ubuntu17] [intelligent_integration]
[3.6] [CVE-2024-56433] [passwd] [1:4.13+dfsg1-4ubuntu3.2] [intelligent_integration]
[3.3] [CVE-2022-3219] [gpgv] [2.4.4-2ubuntu17] [intelligent_integration]
[8.6] [CVE-2024-56406] [perl-base] [5.38.2-3.2build2.1] [intelligent_integration]
[7.5] [CVE-2025-30204] [github.com/golang-jwt/jwt] [v3.2.2+incompatible] [intelligent_integration]
Tool used is aqua scan
We are using below docker image
https://hub.docker.com/r/arangodb/kube-arangodb/tags
docker pull arangodb/kube-arangodb:1.2.47
Can you please comment on what is the plan to address these vulnerabilities and timeline for the same
Let me know if any more info is required. Will update this ticket accordingly
The text was updated successfully, but these errors were encountered: