Skip to content

feat(Dockerfile): use FROM scratch container #2255

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Open
wants to merge 1 commit into
base: main
Choose a base branch
from

Conversation

tulilirockz
Copy link

@tulilirockz tulilirockz commented Jul 29, 2025

We seem to be using an ubi9 container instead of a smaller base, this leads to having a lot more vulnerabilities without much need considering kepler is technically the only thing you need to run it like that. If the base container is really necessary, I would instead recommend using alpine or debian-slim as a base considering how many vulnerabilities get reported by grype with the current image

UBI9 image
grype quay.io/sustainable_computing_io/kepler:latest@sha256:9afc1feeb1115d87de9d52889f3d6fd1628861aeb25d99ff574dea5b6a3d0037
NAME                         INSTALLED            FIXED IN     TYPE       VULNERABILITY        SEVERITY    EPSS           RISK   
tar                          2:1.34-7.el9         (won't fix)  rpm        CVE-2005-2541        Medium      3.7% (87th)    2.2    
shadow-utils                 2:4.9-12.el9                      rpm        CVE-2024-56433       Medium      2.8% (85th)    1.2    
curl-minimal                 7.76.1-31.el9                     rpm        CVE-2024-7264        Low         2.6% (84th)    1.1    
libcurl-minimal              7.76.1-31.el9                     rpm        CVE-2024-7264        Low         2.6% (84th)    1.1    
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2182        Low         1.4% (79th)    0.8    
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-1619        Low         0.7% (71st)    0.4    
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2183        Low         1.1% (76th)    0.3    
vim-minimal                  2:8.2.2637-22.el9_6  (won't fix)  rpm        CVE-2022-1720        Low         0.6% (68th)    0.3    
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-4292        Low         0.3% (54th)    0.2    
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2845        Low         0.5% (63rd)    0.1    
python3                      3.9.21-2.el9_6.1                  rpm        CVE-2024-7592        Low         0.3% (54th)    0.1    
python3-libs                 3.9.21-2.el9_6.1                  rpm        CVE-2024-7592        Low         0.3% (54th)    0.1    
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2021-4187        Low         0.2% (47th)    0.1    
curl-minimal                 7.76.1-31.el9                     rpm        CVE-2024-9681        Low         0.3% (56th)    0.1    
libcurl-minimal              7.76.1-31.el9                     rpm        CVE-2024-9681        Low         0.3% (56th)    0.1    
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2021-4166        Low         0.2% (45th)    0.1    
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2021-4173        Low         0.2% (41st)    0.1    
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2024-22667       Low         0.2% (39th)    0.1    
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2021-3973        Low         0.2% (41st)    0.1    
curl-minimal                 7.76.1-31.el9                     rpm        CVE-2024-11053       Low         0.2% (44th)    < 0.1  
libcurl-minimal              7.76.1-31.el9                     rpm        CVE-2024-11053       Low         0.2% (44th)    < 0.1  
golang.org/x/crypto          v0.32.0              0.35.0       go-module  GHSA-hcg3-q754-cr77  High        0.1% (32nd)    < 0.1  
python3                      3.9.21-2.el9_6.1                  rpm        CVE-2024-0397        Low         0.2% (46th)    < 0.1  
python3-libs                 3.9.21-2.el9_6.1                  rpm        CVE-2024-0397        Low         0.2% (46th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2285        Low         0.2% (39th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2021-3968        Low         0.3% (53rd)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-3705        Low         0.2% (40th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2284        Low         0.2% (38th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2286        Low         0.2% (38th)    < 0.1  
python3-pip-wheel            21.3.1-1.el9                      rpm        CVE-2021-3572        Low         0.2% (47th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-0213        Low         0.2% (40th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2021-3927        Low         0.2% (37th)    < 0.1  
glib2                        2.68.4-16.el9_6.2                 rpm        CVE-2023-32636       Low         0.2% (39th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2021-4136        Low         0.2% (36th)    < 0.1  
openssl                      1:3.2.2-6.el9_5.1    (won't fix)  rpm        CVE-2024-41996       Low         0.2% (38th)    < 0.1  
openssl-libs                 1:3.2.2-6.el9_5.1    (won't fix)  rpm        CVE-2024-41996       Low         0.2% (38th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2124        Low         0.1% (33rd)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2126        Low         0.1% (33rd)    < 0.1  
libxml2                      2.9.13-10.el9_6                   rpm        CVE-2024-34459       Low         0.2% (37th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2042        Low         0.1% (32nd)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-1620        Low         0.1% (31st)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2129        Low         0.1% (31st)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-1616        Low         0.1% (31st)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2210        Low         0.1% (31st)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2207        Low         0.1% (30th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2257        Low         0.1% (30th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2125        Low         0.1% (30th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2175        Low         0.1% (29th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2206        Low         0.1% (29th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2021-3974        Low         0.2% (41st)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2343        Low         0.1% (29th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-4293        Low         0.1% (33rd)    < 0.1  
gdb-gdbserver                14.2-4.1.el9_6                    rpm        CVE-2025-1153        Low         0.2% (40th)    < 0.1  
libbpf                       2:1.5.0-1.el9        (won't fix)  rpm        CVE-2021-45941       Medium      0.1% (31st)    < 0.1  
golang.org/x/oauth2          v0.24.0              0.27.0       go-module  GHSA-6v2p-p543-phr9  High        < 0.1% (20th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-1674        Low         0.1% (30th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2862        Low         < 0.1% (25th)  < 0.1  
libbpf                       2:1.5.0-1.el9        (won't fix)  rpm        CVE-2021-45940       Low         0.1% (31st)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2025-29768       Medium      < 0.1% (27th)  < 0.1  
python3                      3.9.21-2.el9_6.1                  rpm        CVE-2025-1795        Low         0.1% (34th)    < 0.1  
python3-libs                 3.9.21-2.el9_6.1                  rpm        CVE-2025-1795        Low         0.1% (34th)    < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2304        Low         < 0.1% (21st)  < 0.1  
python3                      3.9.21-2.el9_6.1                  rpm        CVE-2025-6069        Medium      < 0.1% (23rd)  < 0.1  
python3-libs                 3.9.21-2.el9_6.1                  rpm        CVE-2025-6069        Medium      < 0.1% (23rd)  < 0.1  
sqlite-libs                  3.34.1-7.el9_3                    rpm        CVE-2025-6965        High        < 0.1% (14th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2024-45306       Low         < 0.1% (27th)  < 0.1  
libxml2                      2.9.13-10.el9_6                   rpm        CVE-2023-45322       Low         < 0.1% (24th)  < 0.1  
gnutls                       3.8.3-6.el9                       rpm        CVE-2025-32990       Medium      < 0.1% (18th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-48706       Low         < 0.1% (26th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2208        Low         0.1% (29th)    < 0.1  
gnutls                       3.8.3-6.el9                       rpm        CVE-2025-6395        Medium      < 0.1% (16th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-3297        Low         < 0.1% (17th)  < 0.1  
gnutls                       3.8.3-6.el9                       rpm        CVE-2025-32988       Medium      < 0.1% (16th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-3099        Low         < 0.1% (16th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-3256        Low         < 0.1% (16th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2021-3928        Low         < 0.1% (17th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-3234        Low         < 0.1% (16th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-3296        Low         < 0.1% (16th)  < 0.1  
libarchive                   3.5.3-5.el9_6                     rpm        CVE-2025-1632        Low         < 0.1% (26th)  < 0.1  
openssl                      1:3.2.2-6.el9_5.1                 rpm        CVE-2024-13176       Low         < 0.1% (22nd)  < 0.1  
openssl-libs                 1:3.2.2-6.el9_5.1                 rpm        CVE-2024-13176       Low         < 0.1% (22nd)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2287        Low         < 0.1% (16th)  < 0.1  
glib2                        2.68.4-16.el9_6.2                 rpm        CVE-2025-3360        Low         < 0.1% (24th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-3235        Low         < 0.1% (15th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-5344        Low         < 0.1% (19th)  < 0.1  
pcre2                        10.40-6.el9                       rpm        CVE-2022-41409       Low         < 0.1% (19th)  < 0.1  
pcre2-syntax                 10.40-6.el9                       rpm        CVE-2022-41409       Low         < 0.1% (19th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2982        Low         < 0.1% (13th)  < 0.1  
gdb-gdbserver                14.2-4.1.el9_6                    rpm        CVE-2025-1150        Low         < 0.1% (24th)  < 0.1  
gdb-gdbserver                14.2-4.1.el9_6                    rpm        CVE-2025-1152        Low         < 0.1% (24th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-3324        Low         < 0.1% (13th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-4751        Low         < 0.1% (13th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2817        Low         < 0.1% (12th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-3037        Low         < 0.1% (12th)  < 0.1  
ncurses-base                 6.2-10.20210508.el9               rpm        CVE-2023-50495       Low         < 0.1% (15th)  < 0.1  
ncurses-libs                 6.2-10.20210508.el9               rpm        CVE-2023-50495       Low         < 0.1% (15th)  < 0.1  
gdb-gdbserver                14.2-4.1.el9_6                    rpm        CVE-2025-1151        Low         < 0.1% (23rd)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2344        Low         < 0.1% (11th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-3134        Low         < 0.1% (11th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-4738        Low         < 0.1% (11th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2889        Low         < 0.1% (11th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-3016        Low         < 0.1% (11th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-1725        Low         < 0.1% (15th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-1170        Low         < 0.1% (15th)  < 0.1  
tpm2-tss                     3.2.3-1.el9                       rpm        CVE-2024-29040       Medium      < 0.1% (13th)  < 0.1  
elfutils-default-yama-scope  0.192-6.el9_6                     rpm        CVE-2025-1377        Low         < 0.1% (20th)  < 0.1  
elfutils-libelf              0.192-6.el9_6                     rpm        CVE-2025-1377        Low         < 0.1% (20th)  < 0.1  
elfutils-libs                0.192-6.el9_6                     rpm        CVE-2025-1377        Low         < 0.1% (20th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2345        Low         < 0.1% (9th)   < 0.1  
libgcc                       11.5.0-5.el9_5                    rpm        CVE-2022-27943       Low         < 0.1% (14th)  < 0.1  
libgomp                      11.5.0-5.el9_5                    rpm        CVE-2022-27943       Low         < 0.1% (14th)  < 0.1  
libstdc++                    11.5.0-5.el9_5                    rpm        CVE-2022-27943       Low         < 0.1% (14th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-4734        Low         < 0.1% (9th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-48232       Low         < 0.1% (16th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-48233       Low         < 0.1% (16th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-48237       Low         < 0.1% (16th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-48231       Low         < 0.1% (16th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2024-43802       Low         < 0.1% (15th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2980        Low         < 0.1% (11th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2522        Low         < 0.1% (7th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-0351        Low         < 0.1% (8th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-1127        Low         < 0.1% (7th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-0288        Low         < 0.1% (7th)   < 0.1  
libxml2                      2.9.13-10.el9_6                   rpm        CVE-2025-32415       Medium      < 0.1% (5th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2819        Low         < 0.1% (7th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-4781        Low         < 0.1% (6th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2946        Low         < 0.1% (6th)   < 0.1  
golang.org/x/net             v0.33.0              0.38.0       go-module  GHSA-vvgc-356p-c3xw  Medium      < 0.1% (7th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-3153        Low         < 0.1% (8th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-3278        Low         < 0.1% (10th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-48235       Low         < 0.1% (12th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2874        Low         < 0.1% (8th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2025-24014       Low         < 0.1% (11th)  < 0.1  
libxml2                      2.9.13-10.el9_6                   rpm        CVE-2025-27113       Low         < 0.1% (14th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-48236       Low         < 0.1% (10th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-48234       Low         < 0.1% (10th)  < 0.1  
gawk                         5.1.0-6.el9                       rpm        CVE-2023-4156        Low         < 0.1% (7th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-4735        Low         < 0.1% (5th)   < 0.1  
libarchive                   3.5.3-5.el9_6                     rpm        CVE-2025-5914        Low         < 0.1% (10th)  < 0.1  
elfutils-default-yama-scope  0.192-6.el9_6                     rpm        CVE-2025-1376        Low         < 0.1% (14th)  < 0.1  
elfutils-libelf              0.192-6.el9_6                     rpm        CVE-2025-1376        Low         < 0.1% (14th)  < 0.1  
elfutils-libs                0.192-6.el9_6                     rpm        CVE-2025-1376        Low         < 0.1% (14th)  < 0.1  
ncurses-base                 6.2-10.20210508.el9               rpm        CVE-2022-29458       Low         < 0.1% (6th)   < 0.1  
ncurses-libs                 6.2-10.20210508.el9               rpm        CVE-2022-29458       Low         < 0.1% (6th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-1175        Low         < 0.1% (6th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-4141        Low         < 0.1% (4th)   < 0.1  
tar                          2:1.34-7.el9                      rpm        CVE-2025-45582       Medium      < 0.1% (4th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2849        Low         < 0.1% (11th)  < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-3352        Low         < 0.1% (3rd)   < 0.1  
tar                          2:1.34-7.el9                      rpm        CVE-2023-39804       Low         < 0.1% (8th)   < 0.1  
gnutls                       3.8.3-6.el9                       rpm        CVE-2025-32989       Medium      < 0.1% (3rd)   < 0.1  
python3                      3.9.21-2.el9_6.1                  rpm        CVE-2025-4516        Medium      < 0.1% (3rd)   < 0.1  
python3-libs                 3.9.21-2.el9_6.1                  rpm        CVE-2025-4516        Medium      < 0.1% (3rd)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-0051        Low         < 0.1% (2nd)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2025-1215        Low         < 0.1% (7th)   < 0.1  
elfutils-default-yama-scope  0.192-6.el9_6                     rpm        CVE-2025-1371        Low         < 0.1% (6th)   < 0.1  
elfutils-libelf              0.192-6.el9_6                     rpm        CVE-2025-1371        Low         < 0.1% (6th)   < 0.1  
elfutils-libs                0.192-6.el9_6                     rpm        CVE-2025-1371        Low         < 0.1% (6th)   < 0.1  
libxml2                      2.9.13-10.el9_6                   rpm        CVE-2025-32414       Medium      < 0.1% (2nd)   < 0.1  
gdb-gdbserver                14.2-4.1.el9_6                    rpm        CVE-2024-57360       Low         < 0.1% (4th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-0049        Low         < 0.1% (2nd)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-0433        Low         < 0.1% (2nd)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-0054        Low         < 0.1% (2nd)   < 0.1  
gdb-gdbserver                14.2-4.1.el9_6                    rpm        CVE-2025-5245        Medium      < 0.1% (3rd)   < 0.1  
libarchive                   3.5.3-5.el9_6        (won't fix)  rpm        CVE-2023-30571       Medium      < 0.1% (2nd)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-1264        Low         < 0.1% (3rd)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-5441        Low         < 0.1% (3rd)   < 0.1  
elfutils-default-yama-scope  0.192-6.el9_6                     rpm        CVE-2024-25260       Low         < 0.1% (3rd)   < 0.1  
elfutils-libelf              0.192-6.el9_6                     rpm        CVE-2024-25260       Low         < 0.1% (3rd)   < 0.1  
elfutils-libs                0.192-6.el9_6                     rpm        CVE-2024-25260       Low         < 0.1% (3rd)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6  (won't fix)  rpm        CVE-2023-5535        Low         < 0.1% (4th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2024-43374       Low         < 0.1% (4th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2022-2923        Low         < 0.1% (2nd)   < 0.1  
coreutils-single             8.32-39.el9                       rpm        CVE-2025-5278        Medium      < 0.1% (1st)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-0512        Low         < 0.1% (1st)   < 0.1  
sqlite-libs                  3.34.1-7.el9_3                    rpm        CVE-2024-0232        Low         < 0.1% (2nd)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2025-26603       Low         < 0.1% (3rd)   < 0.1  
python3-pip-wheel            21.3.1-1.el9                      rpm        CVE-2025-50181       Medium      < 0.1% (1st)   < 0.1  
golang.org/x/net             v0.33.0              0.36.0       go-module  GHSA-qxp5-gwg8-xv66  Medium      < 0.1% (1st)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2024-47814       Low         < 0.1% (3rd)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2024-41965       Low         < 0.1% (2nd)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2024-41957       Low         < 0.1% (2nd)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-2610        Low         < 0.1% (1st)   < 0.1  
gdb-gdbserver                14.2-4.1.el9_6                    rpm        CVE-2022-47007       Low         < 0.1% (1st)   < 0.1  
gdb-gdbserver                14.2-4.1.el9_6                    rpm        CVE-2022-47010       Low         < 0.1% (1st)   < 0.1  
gdb-gdbserver                14.2-4.1.el9_6                    rpm        CVE-2022-47011       Low         < 0.1% (1st)   < 0.1  
libarchive                   3.5.3-5.el9_6                     rpm        CVE-2025-5916        Low         < 0.1% (2nd)   < 0.1  
libarchive                   3.5.3-5.el9_6                     rpm        CVE-2025-5918        Low         < 0.1% (2nd)   < 0.1  
python3-pip-wheel            21.3.1-1.el9                      rpm        CVE-2025-50182       Medium      < 0.1% (1st)   < 0.1  
gnupg2                       2.3.3-4.el9                       rpm        CVE-2022-3219        Low         < 0.1% (1st)   < 0.1  
systemd                      252-51.el9_6.1                    rpm        CVE-2025-4598        Medium      < 0.1% (0th)   < 0.1  
systemd-libs                 252-51.el9_6.1                    rpm        CVE-2025-4598        Medium      < 0.1% (0th)   < 0.1  
systemd-pam                  252-51.el9_6.1                    rpm        CVE-2025-4598        Medium      < 0.1% (0th)   < 0.1  
systemd-rpm-macros           252-51.el9_6.1                    rpm        CVE-2025-4598        Medium      < 0.1% (0th)   < 0.1  
libarchive                   3.5.3-5.el9_6                     rpm        CVE-2025-5915        Low         < 0.1% (1st)   < 0.1  
gnupg2                       2.3.3-4.el9                       rpm        CVE-2025-30258       Low         < 0.1% (2nd)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2023-2609        Low         < 0.1% (1st)   < 0.1  
gdb-gdbserver                14.2-4.1.el9_6                    rpm        CVE-2025-3198        Low         < 0.1% (2nd)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6  (won't fix)  rpm        CVE-2023-46246       Low         < 0.1% (1st)   < 0.1  
libxml2                      2.9.13-10.el9_6                   rpm        CVE-2025-6170        Low         < 0.1% (2nd)   < 0.1  
libarchive                   3.5.3-5.el9_6                     rpm        CVE-2025-5917        Low         < 0.1% (1st)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2025-22134       Low         < 0.1% (0th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2025-53905       Medium      < 0.1% (0th)   < 0.1  
vim-minimal                  2:8.2.2637-22.el9_6               rpm        CVE-2025-53906       Medium      < 0.1% (0th)   < 0.1  
libbpf                       2:1.5.0-1.el9        (won't fix)  rpm        CVE-2022-3606        Low         < 0.1% (0th)   < 0.1  
gdb-gdbserver                14.2-4.1.el9_6                    rpm        CVE-2023-2222        Negligible  N/A            N/A
FROM scratch image
NAME                 INSTALLED  FIXED IN  TYPE       VULNERABILITY        SEVERITY  EPSS           RISK   
golang.org/x/crypto  v0.32.0    0.35.0    go-module  GHSA-hcg3-q754-cr77  High      0.1% (32nd)    < 0.1  
golang.org/x/oauth2  v0.24.0    0.27.0    go-module  GHSA-6v2p-p543-phr9  High      < 0.1% (20th)  < 0.1  
golang.org/x/net     v0.33.0    0.38.0    go-module  GHSA-vvgc-356p-c3xw  Medium    < 0.1% (7th)   < 0.1  
golang.org/x/net     v0.33.0    0.36.0    go-module  GHSA-qxp5-gwg8-xv66  Medium    < 0.1% (1st)   < 0.1

Signed-off-by: Arthur Exaltação <arthur.exaltacao@chainguard.dev>
@github-actions github-actions bot added the feat A new feature or enhancement label Jul 29, 2025
Copy link
Collaborator

@SamYuan1990 SamYuan1990 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

In general it's LGTM.

@SamYuan1990
Copy link
Collaborator

If no further comments, I will approve the the CI to run tests by end of this week.

Copy link
Collaborator

@sthaha sthaha left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

I feel there is value having a minimal set of tools available when debugging issues in kubernetes env. Moreover, ubi images are being updated almost everyday as CVEs are fixed. I am not is support of changing the base image to scratch.

cc: @vprashar2929 , @vimalk78 thoughts ?

@vimalk78
Copy link
Collaborator

I feel there is value having a minimal set of tools available when debugging issues in kubernetes env. Moreover, ubi images are being updated almost everyday as CVEs are fixed. I am not is support of changing the base image to scratch.

cc: @vprashar2929 , @vimalk78 thoughts ?

we can use publicly available ubi-minimal as the base image registry.redhat.io/ubi9-minimal:9.6 this should reduce the vulnerabilities. we do need tools, like curl etc

@SamYuan1990
Copy link
Collaborator

I feel there is value having a minimal set of tools available when debugging issues in kubernetes env. Moreover, ubi images are being updated almost everyday as CVEs are fixed. I am not is support of changing the base image to scratch.
cc: @vprashar2929 , @vimalk78 thoughts ?

we can use publicly available ubi-minimal as the base image registry.redhat.io/ubi9-minimal:9.6 this should reduce the vulnerabilities. we do need tools, like curl etc

do we need curl after reboot?

@SamYuan1990
Copy link
Collaborator

I feel there is value having a minimal set of tools available when debugging issues in kubernetes env. Moreover, ubi images are being updated almost everyday as CVEs are fixed. I am not is support of changing the base image to scratch.
cc: @vprashar2929 , @vimalk78 thoughts ?

we can use publicly available ubi-minimal as the base image registry.redhat.io/ubi9-minimal:9.6 this should reduce the vulnerabilities. we do need tools, like curl etc

@vimalk78 , I searched among our code base https://github.com/search?q=repo%3Asustainable-computing-io%2Fkepler%20curl&type=code it seems we don't need curl. Please further investigate with tooling usage as curl and others. if we don't need curl, it's better for us to use a small base image for less CVE scope.

@sthaha
Copy link
Collaborator

sthaha commented Jul 31, 2025

do we need curl after reboot?

The need for minimal tools is to debug failures in production. Especially n/w related issues.

@SamYuan1990
Copy link
Collaborator

do we need curl after reboot?

The need for minimal tools is to debug failures in production. Especially n/w related issues.

in this case, please add the steps in details in kepler repo document, and let's keep this PR open for now.(as TBD for me)
IMO, let's see review those steps after @sthaha or @vimalk78 create it, if we have better options in debugging steps, then we can back to this PR to see if we close or merge this PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
feat A new feature or enhancement
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants