docker-alpine icon indicating copy to clipboard operation
docker-alpine copied to clipboard

Official Alpine Linux Docker image. Win at minimalism!

Results 161 docker-alpine issues
Sort by recently updated
recently updated
newest added

We are getting CVE-2023-23916 (https://avd.aquasec.com/nvd/cve-2023-23916) from container scans with Trivy. The recommended fix is to upgrade curl and libcurl to a new minor version. However, the new minor versions are...

Latest rsyslog version (which is on alpine:edge) breaks inside docker. ``` # docker run -ti --rm alpine:edge sh -c "apk add --update rsyslog && rsyslogd -n" fetch https://dl-cdn.alpinelinux.org/alpine/edge/main/x86_64/APKINDEX.tar.gz fetch https://dl-cdn.alpinelinux.org/alpine/edge/community/x86_64/APKINDEX.tar.gz...

https://nvd.nist.gov/vuln/detail/CVE-2022-25881 http-cache-semantics package should upgrade from 4.1.0 to 4.1.1

Hi, I'm facing an issue where both alpine 3.16 and 3.17 fails to run `scp`. Here are the steps: ``` $ docker run -it --rm alpine:3.16 sh / # apk...

From time to time when using the Alpine 3.16 and 3.17 images I have the ollowing errors: 21-Dec-2022 18:48:29 fetch https://dl-cdn.alpinelinux.org/alpine/v3.17/main/x86_64/APKINDEX.tar.gz 21-Dec-2022 18:48:29 48FB6CE0A07F0000:error:0A000152:SSL routines:final_renegotiate:unsafe legacy renegotiation disabled:ssl/statem/extensions.c:893: 21-Dec-2022 18:48:29...

Hi, I need to manipulate default OS tcp settings, in particular /proc/sys/net/ipv4/tcp_fin_timeout How can i set it ? thanks

Hi, I'm trying to configure `tcp_wrappers` for nfs server in Alpine Linux, and find `/etc/hosts.(allow|deny)` ineffective. How to install `tcp_wrappers` in Alpine? Thanks

Hi! I'm looking for a counterpart alternative to `kernel.unprivileged_userns_clone` sysctl setting that could be found in Arch/Debian distros to enable [certain namespace kernel flags](https://github.com/NixOS/nix/blob/bbaf865655cff51f30be254f94c22407e368cb96/src/libstore/build.cc#L2216) for unprivileged clones, and I couldn't...

According to https://security.alpinelinux.org/vuln/CVE-2022-37434 version 1.2.12-r3 of zlib has been fixed but the version remains the same. Does this mean it was patched and the version was not bumped?

I did this I was using the version 7_85_0 and with the no_proxy flag was taking in account for anything in the list. no_proxy=local,.example.com,.another.com But in the version 7_86_0 is...