We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
2.41. and latest master (#d521051)
Kubernetes
Official container image
High/Critical vulnerability-free docker image
Running trivy image -v dexidp/dex:latest-alpine
trivy image -v dexidp/dex:latest-alpine
run trivy scan on any current dex image
A fix is available in v0.31.0. Gomplate also had a new release v4.3.0 with a fix for the CVE. Could you please assess whether dex is affected by this critical CVE in golang.org/x/crypto or a dependency used in dex? Thank you!
No response
The text was updated successfully, but these errors were encountered:
No branches or pull requests
Preflight Checklist
Version
2.41. and latest master (#d521051)
Storage Type
Kubernetes
Installation Type
Official container image
Expected Behavior
High/Critical vulnerability-free docker image
Actual Behavior
Running
trivy image -v dexidp/dex:latest-alpine
Steps To Reproduce
run trivy scan on any current dex image
Additional Information
A fix is available in v0.31.0. Gomplate also had a new release v4.3.0 with a fix for the CVE.
Could you please assess whether dex is affected by this critical CVE in golang.org/x/crypto or a dependency used in dex? Thank you!
Configuration
No response
Logs
No response
The text was updated successfully, but these errors were encountered: