Hi,
I’m running Anchore Grype as follows on an Ubuntu system to scan for OS and library vulnerabilities:
curl -sSfL https://raw.githubusercontent.com/anchore/grype/main/install.sh | sudo sh
sudo ./bin/grype /
After scanning my root filesystem, Grype reports a large number of CVEs in system packages (I’ve attached the full report). We need to address these findings in order to meet certain compliance and certification requirements.
- What is the recommended way to update or patch the vulnerable components identified by Grype?
- Are there best practices for keeping Grype’s vulnerability database and your base OS images in sync with NVIDIA-certified driver stacks?
- Does NVIDIA provide any pre-built container images or scripts that integrate with Grype and ensure compatibility and security updates?
Any pointers, example workflows, or official NVIDIA guidance would be greatly appreciated!
Thank you in advance for your help.
output.log (477.8 KB)
