Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fetch RAISR internal work with upstream main. #19

Merged
merged 4 commits into from
Jan 14, 2025

Minor changes

5576d13
Select commit
Loading
Failed to load commit list.
Merged

Fetch RAISR internal work with upstream main. #19

Minor changes
5576d13
Select commit
Loading
Failed to load commit list.
GitHub Advanced Security / Trivy succeeded Jan 7, 2025 in 4s

No new alerts in code changed by this pull request

Annotations

Check failure on line 1 in docker/Xeon/Dockerfile.centos9

See this annotation in the file changed.

Code scanning / Trivy

Image user should not be 'root' High

Artifact: docker/Xeon/Dockerfile.centos9
Type: dockerfile
Vulnerability DS002
Severity: HIGH
Message: Specify at least 1 USER command in Dockerfile with non-root user as argument
Link: DS002

Check failure on line 1 in docker/Xeon/Dockerfile.rockylinux9

See this annotation in the file changed.

Code scanning / Trivy

Image user should not be 'root' High

Artifact: docker/Xeon/Dockerfile.rockylinux9
Type: dockerfile
Vulnerability DS002
Severity: HIGH
Message: Specify at least 1 USER command in Dockerfile with non-root user as argument
Link: DS002

Check failure on line 1 in docker/Xeon/Dockerfile.rockylinux9-mini

See this annotation in the file changed.

Code scanning / Trivy

Image user should not be 'root' High

Artifact: docker/Xeon/Dockerfile.rockylinux9-mini
Type: dockerfile
Vulnerability DS002
Severity: HIGH
Message: Specify at least 1 USER command in Dockerfile with non-root user as argument
Link: DS002