(almalinux,rockylinux,openeuler,openanolis,centos,ubuntu)云原生容器镜像漏洞trivy扫描对比

news2025/2/25 22:20:24

一、下载并安装trivy漏洞扫描工具

下载:
https://github.com/aquasecurity/trivy/releases/download/v0.31.3/trivy_0.31.3_Linux-64bit.rpm
 

以下为centos平台的安装:

[root@localhost ~]# rpm -ivh trivy_0.31.3_Linux-64bit.rpm
Preparing...                          ################################# [100%]
Updating / installing...
   1:trivy-0:0.31.3-1                 ################################# [100%]
[root@localhost ~]#

其他平台的安装和使用方法参考官网链接:

trivy官网A Simple and Comprehensive Vulnerability Scanner for Containers and other Artifacts, Suitable for CIhttps://aquasecurity.github.io/trivy/v0.31.3/getting-started/installation/

trivy工具帮助

[root@localhost ~]# trivy --help
Scanner for vulnerabilities in container images, file systems, and Git repositories, as well as for configuration issues and hard-coded secrets

Usage:
  trivy [global flags] command [flags] target
  trivy [command]

Examples:
  # Scan a container image
  $ trivy image python:3.4-alpine

  # Scan a container image from a tar archive
  $ trivy image --input ruby-3.1.tar

  # Scan local filesystem
  $ trivy fs .

  # Run in server mode
  $ trivy server

Available Commands:
  aws         scan aws account
  config      Scan config files for misconfigurations
  filesystem  Scan local filesystem
  help        Help about any command
  image       Scan a container image
  kubernetes  scan kubernetes cluster
  module      Manage modules
  plugin      Manage plugins
  repository  Scan a remote repository
  rootfs      Scan rootfs
  sbom        Scan SBOM for vulnerabilities
  server      Server mode
  version     Print the version

Flags:
      --cache-dir string          cache directory (default "/root/.cache/trivy")
  -c, --config string             config path (default "trivy.yaml")
  -d, --debug                     debug mode
  -f, --format string             version format (json)
      --generate-default-config   write the default config to trivy-default.yaml
  -h, --help                      help for trivy
      --insecure                  allow insecure server connections when using TLS
  -q, --quiet                     suppress progress bar and log output
      --timeout duration          timeout (default 5m0s)
  -v, --version                   show version

Use "trivy [command] --help" for more information about a command.
[root@localhost ~]#

 

二、下载镜像并镜像漏洞扫描

2.1 almalinux8.7 云原生镜像漏洞扫描

2.1.1 almalinux8.7下载去官网:

docker-hub官网-almalinux镜像下载icon-default.png?t=MBR7https://hub.docker.com/_/almalinux

[root@localhost ~]# docker pull almalinux:8.7
8.7: Pulling from library/almalinux
3fc9bb6a1ce5: Pull complete
Digest: sha256:e045e93d1a86963aa1bd4aa0aec05362ed529174d0d6c5617aa1116223b04d6f
Status: Downloaded newer image for almalinux:8.7
docker.io/library/almalinux:8.7
[root@localhost ~]#

2.1.2 对almalinux:8.7镜像进行安全扫描

[root@localhost ~]# trivy image almalinux:8.7
2023-01-12T02:04:36.220+0800    INFO    Vulnerability scanning is enabled
2023-01-12T02:04:36.220+0800    INFO    Secret scanning is enabled
2023-01-12T02:04:36.220+0800    INFO    If your scanning is slow, please try '--security-checks vuln' to disable secret scanning
2023-01-12T02:04:36.220+0800    INFO    Please see also https://aquasecurity.github.io/trivy/v0.31.3/docs/secret/scanning/#recommendation for faster secret detection
2023-01-12T02:04:41.567+0800    INFO    Detected OS: alma
2023-01-12T02:04:41.567+0800    INFO    Detecting AlmaLinux vulnerabilities...
2023-01-12T02:04:41.568+0800    INFO    Number of language-specific files: 0

almalinux:8.7 (alma 8.7)

Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

[root@localhost ~]#

2.1.3 almalinux:8.7镜像扫描结果

无漏洞

2.2 openeuler:22.03云原生镜像漏洞扫描

2.2.1 openeuler:22.03下载去官网:

docker-hub官网-openeuler镜像下载icon-default.png?t=MBR7https://hub.docker.com/r/openeuler/openeuler/tags

[root@localhost ~]# docker pull openeuler/openeuler:22.03
22.03: Pulling from openeuler/openeuler
bed316d08390: Pull complete
986e755e283c: Pull complete
Digest: sha256:0ca0f215a0f9142c6b46fdedbc1f9f4c23a191e7f2e50bed33eff19d5ac2a158
Status: Downloaded newer image for openeuler/openeuler:22.03
docker.io/openeuler/openeuler:22.03
[root@localhost ~]#

2.2.2 对openeuler:22.03镜像进行安全扫描

[root@localhost ~]# trivy image openeuler/openeuler:22.03
2023-01-12T01:59:42.883+0800    INFO    Vulnerability scanning is enabled
2023-01-12T01:59:42.883+0800    INFO    Secret scanning is enabled
2023-01-12T01:59:42.883+0800    INFO    If your scanning is slow, please try '--security-checks vuln' to disable secret scanning
2023-01-12T01:59:42.883+0800    INFO    Please see also https://aquasecurity.github.io/trivy/v0.31.3/docs/secret/scanning/#recommendation for faster secret detection
2023-01-12T01:59:48.416+0800    INFO    Detected OS: none
2023-01-12T01:59:48.416+0800    WARN    unsupported os : none
2023-01-12T01:59:48.416+0800    INFO    Number of language-specific files: 1
2023-01-12T01:59:48.416+0800    INFO    Detecting python-pkg vulnerabilities...
[root@localhost ~]#

2.2.3 openeuler:22.03镜像扫描结果

trivy工具不支持openeuler的系统的漏洞扫描

2.3  rockylinux:8.7云原生镜像漏洞扫描

2.3.1 rockylinux:8.7下载去官网:

docker-hub官网-rockylinux镜像下载icon-default.png?t=MBR7https://hub.docker.com/_/rockylinux

[root@localhost ~]# docker pull rockylinux:8.7
8.7: Pulling from library/rockylinux
5461c86c2e54: Pull complete
Digest: sha256:80fccd745a0f0ce80e02a50c271c6b59e85d780c47759edb2e5f4f0f4d73e31a
Status: Downloaded newer image for rockylinux:8.7
docker.io/library/rockylinux:8.7
[root@localhost ~]#

2.3.2 对rockylinux:8.7镜像进行安全扫描

[root@localhost ~]# trivy image rockylinux:8.7
2023-01-12T01:49:48.588+0800    INFO    Need to update DB
2023-01-12T01:49:48.588+0800    INFO    DB Repository: ghcr.io/aquasecurity/trivy-db
2023-01-12T01:49:48.588+0800    INFO    Downloading DB...
36.03 MiB / 36.03 MiB [-------------------------------------------------------------------------------------------------------------------------------------------------------------] 100.00% 1.05 MiB p/s 34s
2023-01-12T01:50:25.590+0800    INFO    Vulnerability scanning is enabled
2023-01-12T01:50:25.590+0800    INFO    Secret scanning is enabled
2023-01-12T01:50:25.590+0800    INFO    If your scanning is slow, please try '--security-checks vuln' to disable secret scanning
2023-01-12T01:50:25.590+0800    INFO    Please see also https://aquasecurity.github.io/trivy/v0.31.3/docs/secret/scanning/#recommendation for faster secret detection
2023-01-12T01:50:31.168+0800    INFO    Detected OS: rocky
2023-01-12T01:50:31.168+0800    INFO    Detecting Rocky Linux vulnerabilities...
2023-01-12T01:50:31.170+0800    INFO    Number of language-specific files: 1
2023-01-12T01:50:31.170+0800    INFO    Detecting python-pkg vulnerabilities...

rockylinux:8.7 (rocky 8.7)

Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

2023-01-12T01:50:31.189+0800    INFO    Table result includes only package filenames. Use '--format json' option to get the full path to the package file.

Python (python-pkg)

Total: 1 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 1, CRITICAL: 0)

┌───────────────────────┬────────────────┬──────────┬───────────────────┬───────────────┬───────────────────────────────────────────────────────┐
│        Library        │ Vulnerability  │ Severity │ Installed Version │ Fixed Version │                         Title                         │
├───────────────────────┼────────────────┼──────────┼───────────────────┼───────────────┼───────────────────────────────────────────────────────┤
│ setuptools (METADATA) │ CVE-2022-40897 │ HIGH     │ 39.2.0            │ 65.5.1        │ pypa-setuptools: Regular Expression Denial of Service │
│                       │                │          │                   │               │ (ReDoS) in package_index.py                           │
│                       │                │          │                   │               │ https://avd.aquasec.com/nvd/cve-2022-40897            │
└───────────────────────┴────────────────┴──────────┴───────────────────┴───────────────┴───────────────────────────────────────────────────────┘
[root@localhost ~]#

2.3.3 rockylinux:8.7镜像扫描结果

setuptools (METADATA)存在一个高危漏洞

2.4  anolisos:8.6-x86_64云原生镜像漏洞扫描

2.4.1 anolisos:8.6-x86_64下载去官网:

docker-hub官网-anolisos镜像下载icon-default.png?t=MBR7https://hub.docker.com/r/openanolis/anolisos

[root@localhost ~]# docker pull openanolis/anolisos:8.6-x86_64
8.6-x86_64: Pulling from openanolis/anolisos
f4bed4d02f43: Pull complete
Digest: sha256:0546f1e8b0526f5c0b554a6e5d96b5c7374dbc7260c22a9ca9110ba2a95393c3
Status: Downloaded newer image for openanolis/anolisos:8.6-x86_64
docker.io/openanolis/anolisos:8.6-x86_64
[root@localhost ~]# 

2.4.2 对anolisos:8.6-x86_64镜像进行安全扫描

 

[root@localhost ~]# trivy image openanolis/anolisos:8.6-x86_64
2023-01-12T01:38:21.471+0800    INFO    Vulnerability scanning is enabled
2023-01-12T01:38:21.472+0800    INFO    Secret scanning is enabled
2023-01-12T01:38:21.472+0800    INFO    If your scanning is slow, please try '--security-checks vuln' to disable secret scanning
2023-01-12T01:38:21.472+0800    INFO    Please see also https://aquasecurity.github.io/trivy/v0.31.3/docs/secret/scanning/#recommendation for faster secret detection
2023-01-12T01:38:26.584+0800    INFO    Detected OS: none
2023-01-12T01:38:26.584+0800    WARN    unsupported os : none
2023-01-12T01:38:26.584+0800    INFO    Number of language-specific files: 1
2023-01-12T01:38:26.584+0800    INFO    Detecting python-pkg vulnerabilities...
2023-01-12T01:38:26.585+0800    INFO    Table result includes only package filenames. Use '--format json' option to get the full path to the package file.

Python (python-pkg)

Total: 1 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 1, CRITICAL: 0)

┌───────────────────────┬────────────────┬──────────┬───────────────────┬───────────────┬───────────────────────────────────────────────────────┐
│        Library        │ Vulnerability  │ Severity │ Installed Version │ Fixed Version │                         Title                         │
├───────────────────────┼────────────────┼──────────┼───────────────────┼───────────────┼───────────────────────────────────────────────────────┤
│ setuptools (METADATA) │ CVE-2022-40897 │ HIGH     │ 39.2.0            │ 65.5.1        │ pypa-setuptools: Regular Expression Denial of Service │
│                       │                │          │                   │               │ (ReDoS) in package_index.py                           │
│                       │                │          │                   │               │ https://avd.aquasec.com/nvd/cve-2022-40897            │
└───────────────────────┴────────────────┴──────────┴───────────────────┴───────────────┴───────────────────────────────────────────────────────┘
[root@localhost ~]#

2.4.3 anolisos:8.6-x86_64镜像扫描结果

setuptools (METADATA)存在一个高危漏洞

2.5 ubuntu:23.04云原生镜像漏洞扫描

2.5.1 ubuntu:23.04下载去官网:

docker-hub官网-ubuntu镜像下载icon-default.png?t=MBR7https://hub.docker.com/_/ubuntu

[root@localhost ~]# docker pull ubuntu:23.04
23.04: Pulling from library/ubuntu
2627e5235478: Pull complete
Digest: sha256:2ca8fe42bcc2979f66dd80c2987a43cfc5502626094b7f838f89759173f3956b
Status: Downloaded newer image for ubuntu:23.04
docker.io/library/ubuntu:23.04
[root@localhost ~]#

2.5.2 对ubuntu:23.04镜像进行安全扫描

[root@localhost ~]# trivy image ubuntu:23.04
2023-01-12T01:14:22.448+0800    INFO    Vulnerability scanning is enabled
2023-01-12T01:14:22.448+0800    INFO    Secret scanning is enabled
2023-01-12T01:14:22.448+0800    INFO    If your scanning is slow, please try '--security-checks vuln' to disable secret scanning
2023-01-12T01:14:22.448+0800    INFO    Please see also https://aquasecurity.github.io/trivy/v0.31.3/docs/secret/scanning/#recommendation for faster secret detection
2023-01-12T01:14:24.518+0800    INFO    Detected OS: ubuntu
2023-01-12T01:14:24.518+0800    WARN    This OS version is not on the EOL list: ubuntu 23.04
2023-01-12T01:14:24.518+0800    INFO    Detecting Ubuntu vulnerabilities...
2023-01-12T01:14:24.518+0800    INFO    Number of language-specific files: 0
2023-01-12T01:14:24.518+0800    WARN    This OS version is no longer supported by the distribution: ubuntu 23.04
2023-01-12T01:14:24.518+0800    WARN    The vulnerability detection may be insufficient because security updates are not provided

ubuntu:23.04 (ubuntu 23.04)

Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

[root@localhost ~]#

2.5.3 ubuntu:23.04镜像扫描结果

无漏洞

2.6 centos7.9.2009 云原生镜像漏洞扫描

2.6.1 centos7.9.2009 下载去官网:

docker-hub官网-centos镜像下载icon-default.png?t=MBR7https://hub.docker.com/_/centos

[root@localhost ~]# docker pull centos:7.9.2009
7.9.2009: Pulling from library/centos
Digest: sha256:9d4bcbbb213dfd745b58be38b13b996ebb5ac315fe75711bd618426a630e0987
Status: Downloaded newer image for centos:7.9.2009
docker.io/library/centos:7.9.2009
[root@localhost ~]#

2.6.2 对centos7.9.2009镜像进行安全扫描

[root@localhost ~]# trivy image centos:7.9.2009
2023-01-12T02:50:03.014+0800    INFO    Vulnerability scanning is enabled
2023-01-12T02:50:03.014+0800    INFO    Secret scanning is enabled
2023-01-12T02:50:03.014+0800    INFO    If your scanning is slow, please try '--security-checks vuln' to disable secret scanning
2023-01-12T02:50:03.014+0800    INFO    Please see also https://aquasecurity.github.io/trivy/v0.31.3/docs/secret/scanning/#recommendation for faster secret detection
2023-01-12T02:50:03.020+0800    INFO    Detected OS: centos
2023-01-12T02:50:03.020+0800    INFO    Detecting RHEL/CentOS vulnerabilities...
2023-01-12T02:50:03.048+0800    INFO    Number of language-specific files: 0

centos:7.9.2009 (centos 7.9.2009)

Total: 927 (UNKNOWN: 0, LOW: 461, MEDIUM: 442, HIGH: 21, CRITICAL: 3)

...

2.6.3 centos7.9.2009镜像扫描结果

Total: 927 (UNKNOWN: 0, LOW: 461, MEDIUM: 442, HIGH: 21, CRITICAL: 3)

2.7 对网上安装了组件的镜像进行扫描

docker pull how2j/centos7_tools_ftp_java_mysql55_tomcat7
trivy image how2j/centos7_tools_ftp_java_mysql55_tomcat7

2.7.1扫描结果3个严重,98个高危,812个中危

[root@localhost ~]# trivy image how2j/centos7_tools_ftp_java_mysql55_tomcat7
2023-01-12T02:58:08.823+0800    INFO    Need to update DB
2023-01-12T02:58:08.823+0800    INFO    DB Repository: ghcr.io/aquasecurity/trivy-db
2023-01-12T02:58:08.823+0800    INFO    Downloading DB...
36.03 MiB / 36.03 MiB [------------------------------------------------------------------------------------------------------------------------------------------------------------] 100.00% 6.63 MiB p/s 5.6s
2023-01-12T02:58:16.322+0800    INFO    Vulnerability scanning is enabled
2023-01-12T02:58:16.322+0800    INFO    Secret scanning is enabled
2023-01-12T02:58:16.322+0800    INFO    If your scanning is slow, please try '--security-checks vuln' to disable secret scanning
2023-01-12T02:58:16.322+0800    INFO    Please see also https://aquasecurity.github.io/trivy/v0.31.3/docs/secret/scanning/#recommendation for faster secret detection
2023-01-12T02:58:16.335+0800    INFO    Detected OS: centos
2023-01-12T02:58:16.335+0800    INFO    Detecting RHEL/CentOS vulnerabilities...
2023-01-12T02:58:16.379+0800    INFO    Number of language-specific files: 1
2023-01-12T02:58:16.379+0800    INFO    Detecting jar vulnerabilities...

how2j/centos7_tools_ftp_java_mysql55_tomcat7 (centos 7.6.1810)

Total: 1566 (UNKNOWN: 0, LOW: 653, MEDIUM: 812, HIGH: 98, CRITICAL: 3)

...

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.coloradmin.cn/o/156045.html

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈,一经查实,立即删除!

相关文章

【算法刷题 DAY03】剑指offer树相关算法题总结2

JZ7 重建二叉树 描述 给定节点数为 n 的二叉树的前序遍历和中序遍历结果,请重建出该二叉树并返回它的头结点。 例如输入前序遍历序列{1,2,4,7,3,5,6,8}和中序遍历序列{4,7,2,1,5,3,8,6},则重建出如下图所示。 提示: 1.vin.length pre.length 2.pre 和…

CSS入门二、美化页面元素

零、文章目录 文章地址 个人博客-CSDN地址:https://blog.csdn.net/liyou123456789个人博客-GiteePages:https://bluecusliyou.gitee.io/techlearn 代码仓库地址 Gitee:https://gitee.com/bluecusliyou/TechLearnGithub:https:…

【高速数字化仪应用案例系列】虹科数字化仪在光纤领域的应用

光纤应用 光纤越来越多地应用于各种领域。它们能够以光速长距离传输信息,并且损耗低,这使它们成为大容量远程数据通信的主要媒介。因此,光纤网络可以在电信系统中找到,它们用于传输和接收的目的。它们还用于提供各种数字服务&…

Docker命令-常用命令讲解

Docker常用命令 一:帮助命令二:镜像命令1. docker images 查看所有本地的主机上的镜像2. docker search 镜像名3. docker pull 下载镜像4. docker rmi三:容器命令1.docker run 新建容器并启动2.从容器返回到主机:3.docker ps 列出…

收银软件哪家强?2023年收银软件排行榜新鲜出炉!

每家实体店都少不了收银的程序,每个实体店老板都离不开收银的工具。随着信息技术的发展,收银的工具不再只有收银机,更高效、更方便的收银软件,已经成为了零售店老板们的新宠。收银机和收银软件有什么区别?收银机只能对…

1.11 LED灯点亮串口解析器

LED点灯实验 一.电路图: 三极管: NPN类型: PNP类型: NPN类型当基极为高电平时,集电极和发射极导通 PNP类型当基极为低电平时,集电极和发射极导通 由电路图可知LED电路图中三极管为NPN类型&am…

我在CSDN的2022---2023Flag

一、加入CSDN我是在2020年12月注册的CSDN,大一上学期就听同学给我讲了这个软件,然后就下载了,里面确实很多优质文章,对于当时向我们这样的初学者来说就是很实用。还记得都是搜什么,求最大值,最小值&#xf…

Redis热点数据处理

1、概念热点数据就是访问量特别大的数据。2、热点数据引起的问题流量集中,达到物理网卡上限。请求过多,缓存分片服务被打垮。redis作为一个单线程的结构,所有的请求到来后都会去排队,当请求量远大于自身处理能力时,后面…

RabbitMQ消息可靠性问题、死信交换机、延迟消息、惰性队列

目录消息可靠性生产者确保将消息成功送入队列消息确认消息回执消费者确保消息成功从队列中取出并成功消费消费确认机制消费失败重试机制失败策略使用第三种方式:消费者指定失败后转发的交换机使用第一种方式:在队列中指定死信交换机消息持久化问题交换机…

软件测试常见性能问题案例分析

在用户场景不确定的情况下,我们为了保障软件的正常运行就必须对软件的性能进行测试。下面我们一起来看看在软件测试中常见的性能问题,希望大家可以通过这七个比较典型的案例分析,充分掌握各种性能问题的解决方法。 案例一:某次压…

Spring Cloud 03 --- Nacos注册中心

前言 注册中心以Map形式存储消费者与生产者的IP和端口 基本概念 (1)Nacos 是阿里巴巴推出来的一个新开源项目,是一个更易于构建云原生应用的动态服务发现、配置管理和服务管理平台。Nacos 致力于帮助您发现、配置和管理微服务。Nacos 提供…

2023年使用率会很高的9个SSH远程连接工具有这些!网工、运维你们用的是哪个?

网络工程师和运维工程师我想每天做的最多的一件事就是远程连接了,例如远程连接网络设备、远程连接服务器(物理服务器或者云服务器),这个时候大多数用的工具都是基于SSH协议的,每位工程我想都有自己熟悉或者青睐的SSH工…

时序图文献精度——5.2019-IJCIA-Node Embedding over Temporal Graphs

Node Embedding over Temporal Graphs Abstract 作者提出了一种在时间图中嵌入节点的方法。学习时间图的节点和边随时间的演变,并将这种动态整合到时间节点嵌入框架中,用于不同的图预测任务。作者也提出了一个联合损失函数,它通过学习组合节…

【java算法】稀疏数组/队列/单双链表

文章目录线性和非线性结构稀疏数组前言代码刷类型题队列非环形队列环形队列刷题单链表单链表的定义案例演示--代码1.按照顺序添加2.按英雄排名插入3.根据no编号来修改节点信息4.删除节点单链表刷题1.求单链表中有效节点的个数2.查找单链表中的倒数第k个节点3.单链表的反转4.从尾…

SAP入门技术分享三:OPEN SQL

OPEN SQL1. 概要(1)R/3体系结构(2)SQL定义(3)OPEN SQL经常使用的命令2. OPEN SQL(1)SELECT 语句(2)INTO语句3. FROM语句(1)选择静态表…

JSONArray

目录1. 需求2. 测试3. 实现需求4. 相关操作1. 将JSONObject装入JSONArray2. JSONArray与String的相互转换1. 需求 最近有个需求: 要接收某个接口的 JSON 数据,而这个JSON数据有可能是一个 JSON 对象,也有可能是一个 JSON数组。 "{name…

python数据结构之字符串

一、字符串的格式化输出 1.1、格式化运算符 print("我跑完了第" str(lap 1) "圈")上面这段输出的代码使用了两个加号做了字符串拼接,并且将整形转换成了字符串。也可以使用一种更好的办法,格式化输出来打印这句话。 print(&quo…

内存取证——基础知识(volatility内存取证)

目录 一、基本概念 二、运行内存镜像的获取 2.1 Windows内存镜像获取 2.1.1 Magnet RAM Capture获取内存镜像 2.1.2 AccessData FTK Imager软件获取内存镜像 2.1.3 DumpIt软件获取内存镜像 2.1.4 额外知识补充: 2.2 Linux\Mac OS 下内存镜像获取方法 三、内…

什么是云渲染?云渲染速度快吗?

近年来随着计算机技术的逐步发展,万物上‘’云‘’的趋势越发明显,一种基于云计算的SAAS服务平台——云渲染农场开始走入CG行业。而且云渲染农场(如Renderbus瑞云渲染)也在众多CG小伙伴的眼里成为了不可或缺的一部分。有人问云渲染…

[ docker相关知识 ] 删除 docker 拉取的容器 -- 解决删除镜像报错问题

🍬 博主介绍 👨‍🎓 博主介绍:大家好,我是 _PowerShell ,很高兴认识大家~ ✨主攻领域:【渗透领域】【数据通信】 【通讯安全】 【web安全】【面试分析】 🎉点赞➕评论➕收藏 养成习…