-
Notifications
You must be signed in to change notification settings - Fork 36
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Fix/SK-1318 | Fixed critical security vulnerability #847 (zlib) (#787)
* Install zlib version 1.3.1 * Run trivy scan when pushing to this branch (for testing) * Upload trivy scan results when pushing to this branch * Check zlib version * Clear trivy cache * Fix clear cache command * Run Trivy scan on image built from this branch * Remove code to clear cache * Added CVE-2023-45853 to trivyignore * Run trivy scan on master * Upgrade packages in runtime stage * Remove warning about case mismatch * Final check zlib version on GitHub * Remove print of zlib version * Restore settings for when Trivy scan is run * Added link to PR
- Loading branch information
1 parent
449e6a3
commit 68d946c
Showing
3 changed files
with
28 additions
and
3 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,9 @@ | ||
# zlib version 1:1.3.dfsg+really1.3.1-1+b1 is installed from Debian Testing (Trixie) repository, | ||
# but Trivy assumes an older version of zlib because base image uses Debian Bookworm and | ||
# therefore raises the vulnerability alert CVE-2023-45853. | ||
# | ||
# See this discussion about a similar issue: https://github.com/aquasecurity/trivy/discussions/6059 | ||
# | ||
# Ignoring this vulnerability since it is fixed in this PR: https://github.com/scaleoutsystems/fedn/pull/787 | ||
# | ||
CVE-2023-45853 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters