Summary
The daily Trivy periodic scan found Critical/High vulnerabilities in the latest published Docker image.
An automated rebuild was attempted but the rebuilt image still has vulnerabilities,
indicating the fix requires a manual dependency update rather than a base image refresh.
Next steps
- Review findings in the Security tab
- Update the affected dependencies to a version that includes the fix
- Or add the CVE ID(s) to a
.trivyignore file if the risk is accepted
Details
Summary
The daily Trivy periodic scan found Critical/High vulnerabilities in the latest published Docker image.
An automated rebuild was attempted but the rebuilt image still has vulnerabilities,
indicating the fix requires a manual dependency update rather than a base image refresh.
Next steps
.trivyignorefile if the risk is acceptedDetails