Sebastian-Pietrzak opened a new issue, #11228:
URL: https://github.com/apache/apisix/issues/11228

   ### Current Behavior
   
   Currently docker image with apisix-3.9.1-debian contains unfixed 
critical/high vulnerabilities, they should be addressed.
   Image has been scanned with Trivy 0.49.1 and results are as following.
   <img width="293" alt="image" 
src="https://github.com/apache/apisix/assets/5096743/98f18b8b-05cd-43a2-bbdf-79c2649f7901";>
   
   List of critical/high vulnerabilities:
   <img width="1445" alt="image" 
src="https://github.com/apache/apisix/assets/5096743/cfe6e34e-2351-40c5-9f4d-8404b0550d11";>
   
   
   apisix-dashboard:3.0.1-alpine:
   <img width="299" alt="image" 
src="https://github.com/apache/apisix/assets/5096743/e84e8b15-4428-4464-b9e3-e4eef2aaf618";>
   <img width="1424" alt="image" 
src="https://github.com/apache/apisix/assets/5096743/f0cbd3d0-9a58-4bfc-823f-cb9faa0d1429";>
   
   
   ### Expected Behavior
   
   no critical/high vulnerabilities in the image at minimum
   
   ### Error Logs
   
   _No response_
   
   ### Steps to Reproduce
   
   scan images with Trivy 0.49.1
   
   ### Environment
   
   - APISIX version (run `apisix version`): 3.9.1-debian
   - APISIX Dashboard version, if relevant: 3.0.1-alpine
   


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: notifications-unsubscr...@apisix.apache.org.apache.org

For queries about this service, please contact Infrastructure at:
us...@infra.apache.org

Reply via email to