Skip to content

CVE scan lists high vulnerability against latest image k8s.gcr.io/nfd/node-feature-discovery:v0.11.1 #853

@gseidlerhpe

Description

@gseidlerhpe

What happened:
CVE scan shows image uses lib/package with high vulnerability

What you expected to happen:
No critical or high vulnerability issues.

How to reproduce it (as minimally and precisely as possible):
docker scan k8s.gcr.io/nfd/node-feature-discovery:v0.11.1

Output shows:
✗ High severity vulnerability found in gcc-8/libstdc++6
Description: Information Exposure
Info: https://snyk.io/vuln/SNYK-DEBIAN10-GCC8-347558
Introduced through: gcc-8/[email protected], [email protected], meta-common-packages@meta
From: gcc-8/[email protected]
From: [email protected] > gcc-8/[email protected]
From: [email protected] > apt/[email protected] > gcc-8/[email protected]
and 2 more...

Organization: xxxxxxx
Package manager: deb
Project name: docker-image|k8s.gcr.io/nfd/node-feature-discovery
Docker image: k8s.gcr.io/nfd/node-feature-discovery:v0.11.1
Platform: linux/amd64
Base image: debian:10.12-slim
Licenses: enabled

Tested 85 dependencies for known issues, found 72 issues.

Your base image is out of date

  1. Pull the latest version of your base image by running 'docker pull debian:10.12-slim'
  2. Rebuild your local image

Anything else we need to know?:

Environment:

  • Kubernetes version (use kubectl version):
  • Cloud provider or hardware configuration:
  • OS (e.g: cat /etc/os-release):
  • Kernel (e.g. uname -a):
  • Install tools:
  • Network plugin and version (if this is a network-related bug):
  • Others:

Metadata

Metadata

Assignees

No one assigned

    Labels

    kind/bugCategorizes issue or PR as related to a bug.lifecycle/rottenDenotes an issue or PR that has aged beyond stale and will be auto-closed.

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions