You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
We build a container with cortextool 0.10.7 installed and upload it to AWS ECR. AWS Inspector then scans these containers for known vulnerabilites and it has flagged the binary with an older loki library CVE-2021-36156 being used. While I understand cortextool isn't running as a daemon and therefore this really isn't a vulnerability I'd like to get our security team off my back for a 2y old vulnerability. As soon as mimirtool has the capability to sync loki rules we will be switching to it so stay up to date but this functionality isn't available currently.
If you would like to reproduce the container for a scan:
We build a container with cortextool 0.10.7 installed and upload it to AWS ECR. AWS Inspector then scans these containers for known vulnerabilites and it has flagged the binary with an older loki library CVE-2021-36156 being used. While I understand cortextool isn't running as a daemon and therefore this really isn't a vulnerability I'd like to get our security team off my back for a 2y old vulnerability. As soon as mimirtool has the capability to sync loki rules we will be switching to it so stay up to date but this functionality isn't available currently.
If you would like to reproduce the container for a scan:
It looks like
docker scan
doesn't catch this but AWS Inspector does.The text was updated successfully, but these errors were encountered: