Skip to content

Multiple CRITICAL and HIGH CVEs in postgis/postgis:16-3.5-alpine (Go stdlib via gosu, Alpine pkgdb) #444

@ChrisMcCarthyDev

Description

@ChrisMcCarthyDev

postgis/postgis:16-3.5-alpine (latest pull as of 20 February 2026)

Description

Security scanning (Anchore) of the 16-3.5-alpine image identifies multiple CRITICAL and HIGH severity CVEs across two categories: Go standard library vulnerabilities in the bundled gosu binary, and Alpine OS package vulnerabilities reported via pkgdb. None of these have upstream fixes available at this time.

This is blocking a production deployment in an environment with strict container security policies (enforces zero CRITICAL/HIGH CVEs in production).

I'm aware of #415 which covers similar Go stdlib issues in the 15-3.5 image. This issue is specific to the 16-3.5-alpine tag and includes additional Alpine pkgdb findings.

Go stdlib (via /usr/local/bin/gosu)

CVE Severity
CVE-2025-68121 CRITICAL
CVE-2025-61723 HIGH
CVE-2025-61725 HIGH
CVE-2025-61726 HIGH
CVE-2025-58188 HIGH
CVE-2025-58187 HIGH
CVE-2025-61729 HIGH
CVE-2025-61731 HIGH
CVE-2025-61732 HIGH

These would be resolved by rebuilding gosu with Go 1.24.13 or later.

Alpine pkgdb

CVE Severity
CVE-2025-48072 CRITICAL
CVE-2025-54874 CRITICAL
CVE-2025-48071 HIGH
CVE-2025-64181 HIGH
CVE-2025-64182 HIGH
CVE-2025-64183 HIGH
CVE-2024-1013 HIGH
CVE-2023-52356 HIGH

Request

Could the Alpine-based images be rebuilt with:

  • An updated gosu binary compiled with Go >= 1.24.13
  • Updated Alpine base packages where fixes are available

I appreciate that some of these (particularly the pkgdb entries) may be waiting on Alpine upstream. Any visibility on rebuild timelines or workarounds would be helpful.

Environment

  • Scanner: Anchore
  • Image: postgis/postgis:16-3.5-alpine
  • Platform: linux/amd64
  • Pulled: 20 February 2026

Metadata

Metadata

Assignees

No one assigned

    Labels

    No labels
    No labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions