Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Fixes the following cve:
arvinder.pal@GHH4XN27GC kommander-applications % trivy i docker.io/mesosphere/trivy-bundles:0.59.0-20250202T050536Z --severity=HIGH,CRITICAL
2025-02-04T10:04:24+05:30 INFO [vuln] Vulnerability scanning is enabled
2025-02-04T10:04:24+05:30 INFO [secret] Secret scanning is enabled
2025-02-04T10:04:24+05:30 INFO [secret] If your scanning is slow, please try '--scanners vuln' to disable secret scanning
.
.
.
.
2025-02-04T10:04:57+05:30 INFO Detected OS family="wolfi" version="20230201"
2025-02-04T10:04:57+05:30 INFO [wolfi] Detecting vulnerabilities... pkg_num=9
2025-02-04T10:04:57+05:30 INFO Number of language-specific files num=1
2025-02-04T10:04:57+05:30 INFO [gobinary] Detecting vulnerabilities...
2025-02-04T10:04:57+05:30 WARN Using severities from other vendors for some vulnerabilities. Read https://aquasecurity.github.io/trivy/v0.55/docs/scanner/vulnerability#severity-selection for details.
docker.io/mesosphere/trivy-bundles:0.59.0-20250202T050536Z (wolfi 20230201)
Total: 0 (HIGH: 0, CRITICAL: 0)