-
Notifications
You must be signed in to change notification settings - Fork 14.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Vulnerabilities in the superset image #20994
Comments
+1 I think a lot of people use superset to analyze critical data. Could you prepare an image without vulnerabilities please? |
Vulnerabilities.
|
Total: 1754 (UNKNOWN: 7, LOW: 606, MEDIUM: 523, HIGH: 549, CRITICAL: 69) Python (python-pkg) |
+1 |
+1 |
Majority of these vulnerabilities are related python base image and in turn its Debian base image. Superset 2.0.1 == Python 3.8.12 docker pull apache/superset:2.0.1 The docker image we’re referring to is what the Apache Software Foundation commonly refers to as a “convenience release”; the only official releases the ASF provides is are the source binaries. I do see a recent PR for docker images using 3.9 #22770 Source code already supports 3.8 to 3.11 https://github.com/apache/superset/blob/master/setup.py#L188 |
@mdeshmu Hi! Thanks! Can you use images like https://hub.docker.com/r/bitnami/python/ or build such images yourself or use distroless images? https://hub.docker.com/r/bitnami/minideb/ Maybe you can ask Apache Software Foundation to prepare secure base images like bitnami. or fix such vulnerabilities in Dockerfile via apt like here I'll try to check vulnerabilities in master and master-py39 |
I don't think this specific bug report is actionable as it stands. Superset version 2.0.1 has passed end of life support. If people have ideas for how to improve Superset by changing the Python versions or dependencies it depends on, I encourage them to get involved:
|
We are hoping to deploy Apache Superset for a data visualization task, and we carried out a Trivy scan (https://github.com/aquasecurity/trivy) of the superset image prior to the deployment which detected a significant number of vulnerabilities.
The latest image of superset has less number of vulnerabilities.
Can we know when the superset team is planning to do a new release that includes this new Debian version in the image?
As the latest image also contain many vulnerabilities and fixed versions have been released for some of these, is it possible to get these packages upgraded as well?
E.g. Curl version 7.74.0-1.3+deb11u1 in the image has been detected as vulnerable. There is a fixed version 7.74.0-1.3+deb11u2.
The text was updated successfully, but these errors were encountered: