Open
Conversation
updating the libs to current versions to fix current CVEs in the image
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
updating the libs to current versions to fix current CVEs in the image
I would also reccomend to implement a renovate job to automaticly update the alpine base image
as well as an auto release pipeline to keep the image from going stale
The following CVEs were found in the current version of the Image:
1. Overview
1.1 Product Information
Container image ghcr.io/sandipb/imapfilter@sha256:701cc48f63b8334003377d36bcc7630bd418161222c3004b5dbc81bbe6bf612a is built on the alpine 3.16.0 operating system, designed for the amd64 architecture, and has identified potential security issues during 17 Dec 25 16:49 CET security scans.
1.2 Mirror Configuration
The mirror creation history is shown below. Please manually check for any suspicious execution commands, such as downloading malicious files.
Configuration details for the mirror are listed below. Please manually inspect for any suspicious executable commands or exposed secrets, such as malicious commands or application keys.
1.3 Vulnerability Overview
A total of 81 vulnerabilities were scanned, including 7 critical vulnerabilities, accounting for 8.64% of the total; and 32 high-risk vulnerabilities, accounting for 39.51% of the total.
Among these, 81 vulnerabilities are fixable, accounting for 100.00% of the total.
The software packages containing vulnerabilities are listed below:。
The full list of vulnerabilities is shown below. For detailed vulnerability information, please refer to the scan results in Part Two.