Description
Hi, we are currently using operator-sdk v1.37.1 as the base image to build our operator.
During our Security scan, a vulnerability was raised for "requests-2.25.1.dist-info" present at "/usr/lib/python3.9/site-packages/requests-2.25.1.dist-info" as per CVE-2024-35195
When we started container using operator-sdk v1.37.1 image & checked inside, it had python3.9 which has the vulnerable requests package, although the default version of python is 3.12.
Output from the container:
bash-5.1# ls
debug games modules motd.d pam.d python3.9 swidtag sysimage sysusers.d udev
environment.d locale motd os-release python3.12 rpm sysctl.d systemd tmpfiles.d
bash-5.1# cd python3.9
bash-5.1# ls
site-packages
bash-5.1# cd site-packages
bash-5.1# ls|grep -i requests-2.25.1
requests-2.25.1.dist-info
Can we know the purpose of having two python versions and is there any way to resolve this?