mirror of
https://github.com/pocket-id/pocket-id.git
synced 2025-12-09 14:53:00 +03:00
🐛 Bug Report: Security vulnerabilities #274
Reference in New Issue
Block a user
Delete Branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @kingp0dd on GitHub.
Reproduction steps
I think visibility on vulnerabilities is important especially that the container is related to security.
Is there a plan to make pocket-id available in Docker Hub? I think they have an automated vuln report (Docker Scout?) integrated in their image page. e.g.:
Expected behavior
N/A
Actual Behavior
N/A
Version and Environment
(0.44.0)
Log Output
No response
@kingp0dd commented on GitHub:
Anyone can scan for vulnerabilities like what i did so i think it being public or visible will not be a factor
@kmendell commented on GitHub:
We migrated to Github Org's awhile back and moved off of docker hub to here instead.
While i get the point of displaying vulnerabilities, it also could be a risk if the vulnerability is public and can be exploited.
I will leave this up to @stonith404 on how he wants to handle this.
@kingp0dd commented on GitHub:
If this is a concern, i think the image can be both on DH and GitHub. Multiple apps do that.
@MrRubberDucky commented on GitHub:
I'm not in anyway a maintainer or anything but this doesn't seem really worth it. Especially with how much DH fiddles with max limits for free users when it comes to security scanning, one day I fear it's going to be fully locked under their paid subscription.
If CVEs are a concern (not all of them are going to be applicable to Pocket ID however) then setting up Dependabot to push PRs with updated go modules or nodejs modules is a better thing to do. Just my 5 cents though, may be worthwhile but I hope this doesn't mean swapping ghcr to dh.
@stonith404 commented on GitHub:
Docker Scout is only free for one repo unfortunately.
I get informed about vulnerabilities in packages that the frontend and backend uses and Dependabot tries to upgrade the packages automatically.
The medium and critical vulnerabilities are caused by Caddy
v2.8.4which currently is the latest version in the Alpine Package Manager. As soon as there is a new version, the Docker build will use the latest version of Caddy.That said, although it's not possible to enable Docker Scout, package vulnerabilities will be fixed automatically if there is a fix available.
@MrRubberDucky commented on GitHub:
Ya probably know this but eh, I feel like it's good to mention this:
If you ever feel like experimenting, building latest caddy is easily possible via
xcaddyor by pulling latest version from git and building it withgo build. Though you can also do one more thing... instead of grabbing off current stable repo in Alpine Linux, you can point apk to add it from one specific repository (edge usually has stable, up-to-date versions of Caddy where main branches always fall on latest stable)Though I wouldn't rely on them 100% as these will eventually expire from Alpine Linux repository unless they were recently rebuilt, that's just how it is with
communityrepos. Neverthless, if ya wanna try it then here's a small snippet:That should grab (at the time of writing) Caddy v2.9.1