Skip to content

Conversation

@jupyterhub-bot
Copy link
Collaborator

A rebuild of quay.io/jupyterhub/k8s-secret-sync has been found to influence the detected vulnerabilities! This PR will trigger a rebuild because it has updated a comment in the Dockerfile.

About

This scan for known vulnerabilities has been made by aquasecurity/trivy. Trivy was configured to filter the vulnerabilities with the following settings:

  • ignore-unfixed: true

Before

Before trying to rebuild the image, the following vulnerabilities was detected in quay.io/jupyterhub/k8s-secret-sync:4.2.1-0.dev.git.7099.h4c2cdd81.

Target Vuln. ID Package Name Installed v. Fixed v.
alpine CVE-2025-4575 libcrypto3 3.5.0-r0 3.5.1-r0
alpine CVE-2025-4575 libssl3 3.5.0-r0 3.5.1-r0
alpine CVE-2025-6965 sqlite-libs 3.49.2-r0 3.49.2-r1

After

Target Vuln. ID Package Name Installed v. Fixed v.
alpine CVE-2025-6965 sqlite-libs 3.49.2-r0 3.49.2-r1

@jupyterhub-bot jupyterhub-bot added the image:rebuild-to-patch-vuln Image rebuild to patch a known external vulnerability label Jul 21, 2025
@manics manics merged commit 1e97e52 into main Jul 21, 2025
16 checks passed
@manics manics deleted the vuln-scan-secret-sync branch July 21, 2025 08:07
consideRatio pushed a commit to jupyterhub/helm-chart that referenced this pull request Jul 21, 2025
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

image:rebuild-to-patch-vuln Image rebuild to patch a known external vulnerability

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants