You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copas current patch flow depends on the target image exposing a package manager (apk, dpkg, rpm) so it can:
locate an installed version (i.e. fixed version mapping) and
apply an update with dependency/backwards compatible safety
That leaves a gap for images that do not ship a conventional package manager (e.g. scratch images, tiny statically linked distroless builds, language specific buildpacks) or for scenarios where operators already know exactly which artifact hash remediates a CVE and simply want to swap it in
e.g. there might be a CVE that shows up for a non-packaged file when using rekor:
trivy image --sbom-sources rekor <image>
Are you willing to submit PRs to contribute to this feature request?
Yes, I am willing to implement it.
The text was updated successfully, but these errors were encountered:
The scenario I would like to address is when vulnerabilities are discovered in frameworks like .NET, Python, NodeJS, etc., how can Copa be used to automate patching for that vulnerability if I know the hash for the vulnerable version and the hash for the patched version.
Correct me if I am wrong but what @ritazh mentioned would come under app-level patching, right? Like even if hash to hash patching is supported, will this cover the patching for vulnerabilities in these kind of packages? 🤔
Uh oh!
There was an error while loading. Please reload this page.
What kind of request is this?
New feature
What is your request or suggestion?
Copas current patch flow depends on the target image exposing a package manager (apk, dpkg, rpm) so it can:
That leaves a gap for images that do not ship a conventional package manager (e.g. scratch images, tiny statically linked distroless builds, language specific buildpacks) or for scenarios where operators already know exactly which artifact hash remediates a CVE and simply want to swap it in
e.g. there might be a CVE that shows up for a non-packaged file when using rekor:
Are you willing to submit PRs to contribute to this feature request?
The text was updated successfully, but these errors were encountered: