Add link to security policy and vulnerability workflow from READMEs (#5644)

This commit is contained in:
Logan Bussell 2024-07-02 15:07:46 -07:00 коммит произвёл GitHub
Родитель 1870a355bc
Коммит 4915d56802
Не найден ключ, соответствующий данной подписи
Идентификатор ключа GPG: B5690EEEBB952194
26 изменённых файлов: 52 добавлений и 0 удалений

Просмотреть файл

@ -128,6 +128,8 @@ View the current tags at the [Microsoft Artifact Registry portal](https://mcr.mi
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -90,6 +90,8 @@ View the current tags at the [Microsoft Artifact Registry portal](https://mcr.mi
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -71,6 +71,8 @@ View the current tags at the [Microsoft Artifact Registry portal](https://mcr.mi
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -73,6 +73,8 @@ View the current tags at the [Microsoft Artifact Registry portal](https://mcr.mi
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -71,6 +71,8 @@ View the current tags at the [Microsoft Artifact Registry portal](https://mcr.mi
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -79,6 +79,8 @@ View the current tags at the [Microsoft Artifact Registry portal](https://mcr.mi
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -98,6 +98,8 @@ These sample images are not intended for production use and may be subject to br
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -81,6 +81,8 @@ View the current tags at the [Microsoft Artifact Registry portal](https://mcr.mi
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -124,6 +124,8 @@ Limits are per-resource. For example, a `MaxLogCount` value of 10,000 configures
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
### Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -86,6 +86,8 @@ The [Image Variants documentation](https://github.com/dotnet/dotnet-docker/blob/
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
### Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -67,6 +67,8 @@ The following Dockerfiles demonstrate how you can use this base image to build a
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
### Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -69,6 +69,8 @@ See the [documentation](https://go.microsoft.com/fwlink/?linkid=2158052) for how
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
### Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -67,6 +67,8 @@ The [Image Variants documentation](https://github.com/dotnet/dotnet-docker/blob/
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
### Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -75,6 +75,8 @@ The [Image Variants documentation](https://github.com/dotnet/dotnet-docker/blob/
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
### Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -94,6 +94,8 @@ These sample images are not intended for production use and may be subject to br
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
### Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -77,6 +77,8 @@ The [Image Variants documentation](https://github.com/dotnet/dotnet-docker/blob/
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
### Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -142,6 +142,8 @@ You can retrieve a list of all available tags for dotnet/aspire-dashboard at htt
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -276,6 +276,8 @@ For tags contained in the old dotnet/core/aspnet repository, you can retrieve a
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -106,6 +106,8 @@ The [Image Variants documentation](https://github.com/dotnet/dotnet-docker/blob/
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -97,6 +97,8 @@ You can retrieve a list of all available tags for dotnet/monitor/base at https:/
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -107,6 +107,8 @@ You can retrieve a list of all available tags for dotnet/monitor at https://mcr.
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -189,6 +189,8 @@ For tags contained in the old dotnet/core/runtime-deps repository, you can retri
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -232,6 +232,8 @@ For tags contained in the old dotnet/core/runtime repository, you can retrieve a
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -140,6 +140,8 @@ These sample images are not intended for production use and may be subject to br
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -202,6 +202,8 @@ For tags contained in the old dotnet/core/sdk repository, you can retrieve a lis
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
## Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)

Просмотреть файл

@ -30,6 +30,8 @@
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
{{ARGS["top-header"]}}# Feedback
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)