-
Notifications
You must be signed in to change notification settings - Fork 69
Address all vulnerabilities flagged on the published images #344
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Is there a way to share the list with people that cannot access the output, if it makes sense? |
Here is a copy of the critical/high ones:
CVE-2021-35942 Critical 9.1 Yes Unspecified glibc OS |
and a copy of the medium/low ones:
CVE-2023-3446 Medium 5.3 Yes Unspecified openssl OS |
so it seems all of them are related to glibc, not sure how we force an update for it? |
Actually, we do set an envvar to disable golibc: https://github.com/kubernetes-sigs/gateway-api-inference-extension/blob/main/Dockerfile#L8; but it doesn't seem this is actually taking effect? |
It turns out the issue is with the base image, I sent out #384 |
I have vulnerability detection enabled on my artifact registry: https://pantheon.corp.google.com/artifacts/docker/ahg-gke-dev/us-central1/jobset2/epp/sha256:e2ee744813f1ba63b5cc18cc5aa08a1c220d66cd9385f66d67b3a7f44e5f9b11;tab=vulnerabilities?e=-13802955&inv=1&invt=Abpmag&mods=monitoring_api_prod
There are plenty that we need to address before the next release.
The text was updated successfully, but these errors were encountered: