Closed bdfkockmeyer closed 4 months ago
@bdfkockmeyer Thanks, can you let us know the scanning tool used? The question here is: will the latest Alpine release typically pass it?
👉 Thank you for supporting VerneMQ: https://github.com/sponsors/vernemq 👉 Using the binary VerneMQ packages commercially (.deb/.rpm/Docker) requires a paid subscription.
Hello @ioolkos , we used Crowdstrike as our scanning tool. As you can see at Dockerhub - Alpine 3.19.1 at least Dockerhub did show any known vulnerabilities. I did not try to scan the latest Alpine image in Crowdstrike so far.
The image for VerneMQ 2.0.0-RC1 is now built with Alpine 3.19.1. There are some minor breaking changes: https://github.com/vernemq/vernemq/wiki/Migration-to-VerneMQ-2.0.0
Dear VerneMQ team, we are using a vulnerability scanner which checks all our images for known vulnerabilities. This is the list of CVEs found in the latest build of the VerneMQ release 1.13.0. The image tag we are using is vernemq/vernemq:1.13.0-alpine.
I would appreciate it if you could validate those findings and let me know about the results and if there might be a patch release to mitigate the valid findings.