diff --git a/labels/docker.io+anchore+test_images@sha256:cf742eca189b02902a0a7926ac3fbb423e799937bf4358b0d2acc6cc36ab82aa/ea8cd2c4-ab7a-421a-94bd-c6957f2bbd5b.json b/labels/docker.io+anchore+test_images@sha256:cf742eca189b02902a0a7926ac3fbb423e799937bf4358b0d2acc6cc36ab82aa/ea8cd2c4-ab7a-421a-94bd-c6957f2bbd5b.json new file mode 100644 index 00000000..83bef285 --- /dev/null +++ b/labels/docker.io+anchore+test_images@sha256:cf742eca189b02902a0a7926ac3fbb423e799937bf4358b0d2acc6cc36ab82aa/ea8cd2c4-ab7a-421a-94bd-c6957f2bbd5b.json @@ -0,0 +1 @@ +{"ID": "ea8cd2c4-ab7a-421a-94bd-c6957f2bbd5b", "effective_cve": "CVE-2021-33655", "image": {"exact": "docker.io/anchore/test_images@sha256:cf742eca189b02902a0a7926ac3fbb423e799937bf4358b0d2acc6cc36ab82aa"}, "label": "FP", "note": "This is now ignored by default as a false positive since the kernel-headers package does not have kernel code in it. Vulnerabilities against the upstream kernel package are for the kernel code itself, not the headers", "package": {"name": "kernel-headers", "version": "4.14.275-207.503.amzn2"}, "timestamp": "2024-04-11T07:13:53.305047+00:00", "tool": "grype@v0.75.0", "user": "zhill", "vulnerability_id": "CVE-2021-33655"} \ No newline at end of file