-
-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[🚀 Feature]: Patching OS packages for vulnerabilities #1943
Comments
@amardeep2006, thank you for creating this issue. We will troubleshoot it as soon as we can. Info for maintainersTriage this issue by using labels.
If information is missing, add a helpful comment and then
If the issue is a question, add the
If the issue is valid but there is no time to troubleshoot it, consider adding the
If the issue requires changes or fixes from an external project (e.g., ChromeDriver, GeckoDriver, MSEdgeDriver, W3C),
add the applicable
After troubleshooting the issue, please add the Thank you! |
Sure, happy to review a PR for that. |
Thanks , I will try to raise one this weekend. |
#1950 fixed this |
This issue has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs. |
Feature and motivation
I recently scanned the images for security vulnerabilities and found many OS packages having High vulnerabilities.
I had to extend all the docker images to pass the security scan in organization.
Is there some reason we are not using
apt-get upgrade -yq
in Dockerfiles ?I can raise PR if apt-get upgrade is acceptable solution for OS related vulnerabilities.
Usage example
Many enterprise want to scan docker images before using.
The text was updated successfully, but these errors were encountered: