3.1.16-buster-slim CVE-2021-3520 Critical Issue Question #2886
              
                Unanswered
              
          
                  
                    
                      KinPatelHub
                    
                  
                
                  asked this question in
                Q&A
              
            Replies: 1 comment 3 replies
-
| 
         The vulnerable package in question is lz4. This package is not installed by .NET and instead comes from the Debian base image. It contains version 1.8.3-1 instead of the fixed version 1.8.3-1+deb10u1. Once it is updated in the Debian base image, we'll rebuild the affected .NET images. ❯ docker pull debian:buster-slim
buster-slim: Pulling from library/debian
Digest: sha256:f077cd32bfea6c4fa8ddeea05c53b27e90c7fad097e2011c9f5f11a8668f8db4
Status: Image is up to date for debian:buster-slim
docker.io/library/debian:buster-slim
❯ docker run --rm debian:buster-slim apt list liblz4-1
WARNING: apt does not have a stable CLI interface. Use with caution in scripts.
Listing...
liblz4-1/now 1.8.3-1 amd64 [installed,local] | 
  
Beta Was this translation helpful? Give feedback.
                  
                    3 replies
                  
                
            
  
    Sign up for free
    to join this conversation on GitHub.
    Already have an account?
    Sign in to comment
  
        
    
Uh oh!
There was an error while loading. Please reload this page.
-
Team,
Does the latest .NET CORE 3.1.16-buster-slim image takes care of the CVE-2021-3520 Critical issue reported? I was using 3.1.14-buster-slim and twistlock started complaining about the latest critical issue. I had updated to 3.1.16-buster-slim which was updated most recently and twistlock scans still complains about this issue. Can someone please guide here?
Thanks,
Kinjal
Beta Was this translation helpful? Give feedback.
All reactions