You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Trivy detects 11 critical vulnerabilities in the operating system (packages) of the Docker image.
I do not know if there is a way to exploit them. For my peace of mind, I would like to get rid of them anyway. Please tell me if I should open a pull request.
Summary
With the following changes the number of OS-related critical vulnerabilities can be reduced from 11 to 1:
Trivy detects 11 critical vulnerabilities in the operating system (packages) of the Docker image.
I do not know if there is a way to exploit them. For my peace of mind, I would like to get rid of them anyway. Please tell me if I should open a pull request.
Summary
With the following changes the number of OS-related critical vulnerabilities can be reduced from 11 to 1:
Caveat: I have not tested the resulting image.
Details
By using a bullseye base image instead of the buster base image the number of critical vulnerabilities can be reduced to 3:
trivy image --severity=CRITICAL --vuln-type=os $(docker build --quiet --file docker/Dockerfile .)
And with adding
apt-get upgrade
to the mix the number can be reduced to 1:The text was updated successfully, but these errors were encountered: