You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
What steps did you take and what happened:
Took e.g. a recent R Studio image build. Got the following vulnerabilities findings. I realize not all are valid in all contexts, i.e. Docker one regarding Docker with Auth .... but some could be fixed easily, e.g. upgrading setuptools along with pip and wheel ...
shalberd
changed the title
Trivy and Aqua Enterprise vulnerability can results critical and high
Trivy and Aqua Enterprise vulnerability scan results critical and high
Dec 10, 2024
I saw that discussed somewhere. Yeah, as they are telling you on your ticket, govulncheck scan that analyzes reachability would tell that the vulnerable code is not called, and so the vulnerability got downgraded from critical to something fairly down on the list. https://www.redhat.com/en/blog/red-hats-open-approach-vulnerability-management
What steps did you take and what happened:
Took e.g. a recent R Studio image build. Got the following vulnerabilities findings. I realize not all are valid in all contexts, i.e. Docker one regarding Docker with Auth .... but some could be fixed easily, e.g. upgrading setuptools along with pip and wheel ...
e.g. in an R Studio image based on
quay.io/sclorg/python-39-c9s:c9s
which itself seems to be based on https://github.com/sclorg/s2i-python-container/blob/master/3.9/Dockerfile.c9s#L3What did you expect to happen:
No critical vulnerabilities and as little as possible high ones.
Anything else you would like to add:
how about e.g.
setuptools 75.6.0
wheel 0.45.1
pip 24.3.1
at level python
and Docker 25.0.6 at base image level
The docker vulnerability
CVE-2024-41110
seems to be part of/opt/app-root/bin/oc
https://github.com/openshift/oc/blob/master/go.mod#L19
Environment:
Logs/Screenshots
The text was updated successfully, but these errors were encountered: