How can I update Grype to mitigate the vulnerabilities it reports?

Hi,

I’m running Anchore Grype as follows on an Ubuntu system to scan for OS and library vulnerabilities:

curl -sSfL https://raw.githubusercontent.com/anchore/grype/main/install.sh | sudo sh
sudo ./bin/grype /

After scanning my root filesystem, Grype reports a large number of CVEs in system packages (I’ve attached the full report). We need to address these findings in order to meet certain compliance and certification requirements.

  1. What is the recommended way to update or patch the vulnerable components identified by Grype?
  2. Are there best practices for keeping Grype’s vulnerability database and your base OS images in sync with NVIDIA-certified driver stacks?
  3. Does NVIDIA provide any pre-built container images or scripts that integrate with Grype and ensure compatibility and security updates?

Any pointers, example workflows, or official NVIDIA guidance would be greatly appreciated!

Thank you in advance for your help.
output.log (477.8 KB)

NVIDIA takes security concerns seriously and works to quickly evaluate and address them. Once a security concern is reported, NVIDIA commits the appropriate resources to analyze, validate and provide corrective actions to address the issue. You can find more informaiton related with Jetson products from NVIDIA Product Security | NVIDIA

This topic was automatically closed 14 days after the last reply. New replies are no longer allowed.