Add link to security policy and vulnerability workflow from READMEs (#5644)
This commit is contained in:
Родитель
1870a355bc
Коммит
4915d56802
|
@ -128,6 +128,8 @@ View the current tags at the [Microsoft Artifact Registry portal](https://mcr.mi
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -90,6 +90,8 @@ View the current tags at the [Microsoft Artifact Registry portal](https://mcr.mi
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -71,6 +71,8 @@ View the current tags at the [Microsoft Artifact Registry portal](https://mcr.mi
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -73,6 +73,8 @@ View the current tags at the [Microsoft Artifact Registry portal](https://mcr.mi
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -71,6 +71,8 @@ View the current tags at the [Microsoft Artifact Registry portal](https://mcr.mi
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -79,6 +79,8 @@ View the current tags at the [Microsoft Artifact Registry portal](https://mcr.mi
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -98,6 +98,8 @@ These sample images are not intended for production use and may be subject to br
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -81,6 +81,8 @@ View the current tags at the [Microsoft Artifact Registry portal](https://mcr.mi
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -124,6 +124,8 @@ Limits are per-resource. For example, a `MaxLogCount` value of 10,000 configures
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
### Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -86,6 +86,8 @@ The [Image Variants documentation](https://github.com/dotnet/dotnet-docker/blob/
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
### Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -67,6 +67,8 @@ The following Dockerfiles demonstrate how you can use this base image to build a
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
### Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -69,6 +69,8 @@ See the [documentation](https://go.microsoft.com/fwlink/?linkid=2158052) for how
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
### Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -67,6 +67,8 @@ The [Image Variants documentation](https://github.com/dotnet/dotnet-docker/blob/
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
### Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -75,6 +75,8 @@ The [Image Variants documentation](https://github.com/dotnet/dotnet-docker/blob/
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
### Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -94,6 +94,8 @@ These sample images are not intended for production use and may be subject to br
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
### Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -77,6 +77,8 @@ The [Image Variants documentation](https://github.com/dotnet/dotnet-docker/blob/
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
### Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -142,6 +142,8 @@ You can retrieve a list of all available tags for dotnet/aspire-dashboard at htt
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -276,6 +276,8 @@ For tags contained in the old dotnet/core/aspnet repository, you can retrieve a
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -106,6 +106,8 @@ The [Image Variants documentation](https://github.com/dotnet/dotnet-docker/blob/
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -97,6 +97,8 @@ You can retrieve a list of all available tags for dotnet/monitor/base at https:/
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -107,6 +107,8 @@ You can retrieve a list of all available tags for dotnet/monitor at https://mcr.
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -189,6 +189,8 @@ For tags contained in the old dotnet/core/runtime-deps repository, you can retri
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -232,6 +232,8 @@ For tags contained in the old dotnet/core/runtime repository, you can retrieve a
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -140,6 +140,8 @@ These sample images are not intended for production use and may be subject to br
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -202,6 +202,8 @@ For tags contained in the old dotnet/core/sdk repository, you can retrieve a lis
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
## Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
|
@ -30,6 +30,8 @@
|
|||
* **AND** the CVE is in a package that is added in our Dockerfile layers (meaning the CVE is in a package we explicitly install or any transitive dependencies of those packages)
|
||||
* **AND** there is a CVE fix for the package available in the affected base image's package repository.
|
||||
|
||||
Please refer to the [Security Policy](https://github.com/dotnet/dotnet-docker/blob/main/SECURITY.md) and [Container Vulnerability Workflow](https://github.com/dotnet/dotnet-docker/blob/main/documentation/vulnerability-reporting.md) for more detail about what to do when a CVE is encountered in a .NET image.
|
||||
|
||||
{{ARGS["top-header"]}}# Feedback
|
||||
|
||||
* [File an issue](https://github.com/dotnet/dotnet-docker/issues/new/choose)
|
||||
|
|
Загрузка…
Ссылка в новой задаче