You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Version 2.32.2 of locust via the usage of the python 3.11.0-slim base image reports the usage of [email protected] which contains the vulnerability GHSA-r9hx-vwmv-q579
We are requesting locust to upgrade to a newer version of the python base image to a newer one (3.12.0-slim or 3.13.0-slim) to resolve this issue. Referencing #2761
Command line
n/a
Locustfile contents
n/a
Python version
3.11
Locust version
2.32.2
Operating system
Linux
The text was updated successfully, but these errors were encountered:
@cyberw Unfortunately, it doesn't seem as if this works - docker scout still detects v65.5.1 as it's directly referenced/installed in the Python 3.11 docker container.
pkg:pypi/[email protected]
x HIGH CVE-2024-6345 [Improper Control of Generation of Code ('Code Injection')]
https://scout.docker.com/v/CVE-2024-6345
Affected range : <70.0.0
Fixed version : 70.0.0
CVSS Score : 8.8
CVSS Vector : CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Prerequisites
Description
Version 2.32.2 of locust via the usage of the python 3.11.0-slim base image reports the usage of [email protected] which contains the vulnerability GHSA-r9hx-vwmv-q579
We are requesting locust to upgrade to a newer version of the python base image to a newer one (3.12.0-slim or 3.13.0-slim) to resolve this issue. Referencing #2761
Command line
n/a
Locustfile contents
Python version
3.11
Locust version
2.32.2
Operating system
Linux
The text was updated successfully, but these errors were encountered: