-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Two extra low vulnerabilities detected in latest node.js 22.x distroless image #1758
Comments
The two new low security alerts are related to
|
Yeah we need gcc base to satisfy some license requirements, but maybe that's all we need from there. Perhaps I can apply a filter on that. |
We are using the
Thank you in advance !! |
@nivGandhi please read SECURITY.md Also please be aware that adding unrelated information to an existing issue is unhelpful for tracking. Once you have read the documentation and expectations of distroless, considering opening a new issue. |
In our project, we have set up dependabot to check on every Monday if there are new node.js distroless images.
We also do a trivy scan to compare the old vs. new distroless image to check what's been changed.
The PR that got created in our repo proposes following change:
Old image
FROM gcr.io/distroless/nodejs22-debian12:latest-amd64@sha256:23637ce9bd386f5883df054ed415a8240bac1df6fd3aa500686cc3a86e0b60e1
New image
FROM gcr.io/distroless/nodejs22-debian12:latest-amd64@sha256:ba670ace564d2ff780881509904d3ee4c8fbf3e587bed6a395377b7e56bfcf4a
The trivy scan shows that two extra low vulnerabilities are being added in the new image:
vs.
I haven't identified the two extra low vulnerabilities, but we've seen that the vulnerabilities are present in all the distroless images that we currently use, for example node.js 18.x, node 20.x, java 17.x ...
The text was updated successfully, but these errors were encountered: