-
Notifications
You must be signed in to change notification settings - Fork 279
Description
What happened:
CVE scan shows image uses lib/package with high vulnerability
What you expected to happen:
No critical or high vulnerability issues.
How to reproduce it (as minimally and precisely as possible):
docker scan k8s.gcr.io/nfd/node-feature-discovery:v0.11.1
Output shows:
✗ High severity vulnerability found in gcc-8/libstdc++6
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GCC8-347558
Introduced through: gcc-8/[email protected], [email protected], meta-common-packages@meta
From: gcc-8/[email protected]
From: [email protected] > gcc-8/[email protected]
From: [email protected] > apt/[email protected] > gcc-8/[email protected]
and 2 more...
Organization: xxxxxxx
Package manager: deb
Project name: docker-image|k8s.gcr.io/nfd/node-feature-discovery
Docker image: k8s.gcr.io/nfd/node-feature-discovery:v0.11.1
Platform: linux/amd64
Base image: debian:10.12-slim
Licenses: enabled
Tested 85 dependencies for known issues, found 72 issues.
Your base image is out of date
- Pull the latest version of your base image by running 'docker pull debian:10.12-slim'
- Rebuild your local image
Anything else we need to know?:
Environment:
- Kubernetes version (use
kubectl version
): - Cloud provider or hardware configuration:
- OS (e.g:
cat /etc/os-release
): - Kernel (e.g.
uname -a
): - Install tools:
- Network plugin and version (if this is a network-related bug):
- Others: