Skip to content

Conversation

@SandhyaRavi2403
Copy link
Contributor

Bumping the rook/ceph to latest version : rook/ceph:v1.14.9

Updating latest ceph/ceph version to v19.1.0

trivy report
https://avd.aquasec.com/nvd/cve-2024-24790

sandhya.ravi@GT9X7CVF5F dkp-container-images % trivy i rook/ceph:v1.14.9 -s CRITICAL
2024-08-22T12:51:24+05:30 INFO Vulnerability scanning is enabled
2024-08-22T12:51:24+05:30 INFO Secret scanning is enabled
2024-08-22T12:51:24+05:30 INFO If your scanning is slow, please try '--scanners vuln' to disable secret scanning
2024-08-22T12:51:24+05:30 INFO Please see also https://aquasecurity.github.io/trivy/v0.53/docs/scanner/secret#recommendation for faster secret detection
2024-08-22T12:51:27+05:30 INFO Detected OS family="none" version=""
2024-08-22T12:51:27+05:30 WARN Unsupported os family="none"
2024-08-22T12:51:27+05:30 INFO Number of language-specific files num=4
2024-08-22T12:51:27+05:30 INFO [gobinary] Detecting vulnerabilities...
2024-08-22T12:51:27+05:30 INFO [python-pkg] Detecting vulnerabilities...
2024-08-22T12:51:27+05:30 INFO [node-pkg] Detecting vulnerabilities...
2024-08-22T12:51:27+05:30 WARN Using severities from other vendors for some vulnerabilities. Read https://aquasecurity.github.io/trivy/v0.53/docs/scanner/vulnerability#severity-selection for details.

usr/local/bin/s5cmd (gobinary)

Total: 1 (CRITICAL: 1)

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

2 participants