You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Hi,
I know it was debated elsewhere but if I use gosu this is because it was recommended here and works fine for years.
But since weeks, build report 56 vulnerabilities from gosu without any change from us.
Previously installed by apt-get, I also try by following the official gosu installation guide to use the released build from its repository.
I saw we could build it with a newer go version but is it the real recommandation of docker-library/official-images?
What guide I have to follow to perform this?
I just want to follow the official recommandation about building an official image (without crit vulnerabilities, even they are fake).
We're exploring things like VEX statements for official images, but you're correct that they're not currently supported. Ideally tools would be using govulncheck to filter these automatically, and I think the Scout team is working on such functionality, but I'm not certain.
Hi,
I know it was debated elsewhere but if I use
gosu
this is because it was recommended here and works fine for years.But since weeks, build report 56 vulnerabilities from
gosu
without any change from us.Previously installed by
apt-get
, I also try by following the officialgosu
installation guide to use the released build from its repository.I saw we could build it with a newer
go
version but is it the real recommandation ofdocker-library/official-images
?What guide I have to follow to perform this?
I just want to follow the official recommandation about building an official image (without crit vulnerabilities, even they are fake).
PS: here our internal issue convertigo/convertigo#876
The text was updated successfully, but these errors were encountered: