mirror of
https://github.com/vmware-tanzu/pinniped.git
synced 2026-03-27 04:45:23 +00:00
also add trivy image-scan exclusion for CVE-2026-24051
This commit is contained in:
@@ -1,4 +1,4 @@
|
||||
# Copyright 2020-2024 the Pinniped contributors. All Rights Reserved.
|
||||
# Copyright 2020-2026 the Pinniped contributors. All Rights Reserved.
|
||||
# SPDX-License-Identifier: Apache-2.0
|
||||
|
||||
---
|
||||
@@ -12,8 +12,16 @@ inputs:
|
||||
outputs:
|
||||
params:
|
||||
GITHUB_TOKEN:
|
||||
# For format see https://aquasecurity.github.io/trivy/v0.24.2/vulnerability/examples/filter/#by-vulnerability-ids
|
||||
IGNORE_VULNERABILITY_IDS: ""
|
||||
# For format see https://trivy.dev/docs/latest/guide/configuration/filtering/#by-finding-ids
|
||||
IGNORE_VULNERABILITY_IDS: |
|
||||
# CVE-2026-24051 is in go.opentelemetry.io/otel/sdk before v1.40.0. This is an indirect dep that we
|
||||
# get through various k8s modules and through fosite. The CVE description says that it only applies
|
||||
# to MacOS. We do not use opentelemetry in the Pinniped CLI, and our other code never runs on MacOS,
|
||||
# so we should have no exposure to this issue. We can wait for the next version of k8s packages to
|
||||
# update this dependency, if they choose to do so.
|
||||
# See https://ossindex.sonatype.org/vulnerability/CVE-2026-24051?component-type=golang&component-name=go.opentelemetry.io%2Fotel%2Fsdk&utm_source=nancy-client&utm_medium=integration&utm_content=1.2.0
|
||||
CVE-2026-24051 exp:2026-06-04
|
||||
|
||||
run:
|
||||
path: ash
|
||||
args:
|
||||
|
||||
Reference in New Issue
Block a user