Container Image Vulnerabilities
This section describes how to check the vulnerabilities on the local image and determine whether to ignore the vulnerabilities.
Detection Method
After you enable cluster protection, your clusters are automatically scanned.
Prerequisite
The cluster protection function has been enabled.
Constraints
- Only Linux servers are supported.
- Servers that are not protected by HSS enterprise, premium, WTP, or container editions cannot perform container-related operations.
Viewing Vulnerabilities in Private Images
- Log in to the management console.
- In the upper left corner of the page, select a region, click
, and choose .
Figure 1 Accessing HSS - In the displayed dialog box, click Try the new edition to switch to the HSS (New) console.
- Currently, HSS is available in the following regions: CN South-Guangzhou, CN-Hong Kong, AP-Bangkok, and AP-Singapore.
- On the HSS (New) console, you can click Back to Old Console in the upper left corner to switch to the HSS (Old) console.
- If cloud scan is not enabled or you access the HSS (New) console for the first time, the Enable Cloud Scan? dialog box is displayed. You are advised to select Enable cloud scan.
- The cloud scan function is free of charge.
- After the cloud scan function is enabled, all HSS servers will be scanned. Some HSS quota editions can support only limited scanning capabilities. Therefore, you are advised to purchase the enterprise edition or higher to enjoy all capabilities of the cloud scan function.
Figure 2 Enabling cloud scan
- In the navigation pane on the left, choose Prediction > Container Images. On the displayed page, click Image Vulnerabilities and click Private Image Vulnerabilities to view private image vulnerabilities.
Click a risky image to check its vulnerability overview, including the vulnerability name, urgency, status, the number of affected images, and vulnerability description.
Figure 3 Viewing vulnerabilities in private imagesTable 1 Parameter description Parameter
Description
Operation
Vulnerability Name
-
- Click
to view the details of a vulnerability, including CVE ID, CVSS Score, Disclosed, and Vulnerability Details.
- Click the name of a vulnerability to view the images affected by the vulnerability. For details, see 5.
Repair Urgency
Shows whether the vulnerability should be repaired immediately.
-
Historically Affected Images
Shows the number of images that have been affected.
-
Solution
Provides a solution to fix the vulnerability.
Click the link in the Solution column to view the solution.
- Click
- Click the vulnerability name to view its basic information and affected images.
Figure 4 Vulnerability details
Canceling Ignoring a Vulnerability
- Go to the vulnerability list, select the ignored vulnerability, and click Unignore in the upper left corner of the vulnerability list to cancel ignoring a vulnerability.
- Go to the image list affected by the ignored vulnerability. In the Operation column of the image, click Unignore to cancel ignoring a vulnerability.
- Go to the vulnerability list in the image. In the row containing the ignored vulnerability, click Unignore in the Operation column to cancel ignoring a vulnerability.
Feedback
Was this page helpful?
Provide feedbackFor any further questions, feel free to contact us through the chatbot.
Chatbot