-
Notifications
You must be signed in to change notification settings - Fork 3
Expand file tree
/
Copy path.trivyignore
More file actions
59 lines (57 loc) · 3.18 KB
/
.trivyignore
File metadata and controls
59 lines (57 loc) · 3.18 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
# =============================================================================
# .trivyignore — Temporary Trivy suppressions
# =============================================================================
#
# Rules:
# 1. Every entry MUST have an expiration date (exp:YYYY-MM-DD).
# 2. Every entry MUST link to an upstream tracking issue/advisory.
# 3. When an entry expires, re-evaluate: remove it if the CVE is fixed,
# or extend the date with a new justification if the fix still isn't
# available. Never extend without re-checking upstream.
# 4. Keep the file short. A growing ignorefile is a smell.
# 5. Verify against the pinned CI Trivy (TRIVY_VERSION in security.yml /
# cve-scan.yml) and its DB source — local `brew install trivy` uses
# the ghcr.io DB which can classify severities differently from the
# CI's mirror.gcr.io/aquasec/trivy-db:2.
#
# Format:
# CVE-XXXX-XXXXX exp:YYYY-MM-DD
# =============================================================================
# CVE-2026-4046 — glibc iconv() DoS in AL2023 base image (lambda/helm-installer).
# ALAS2023-2026-1622 (published 2026-04-30) lists fixed RPMs
# (glibc-2.34-231.amzn2023.0.4) in AL2023 repo snapshot 2023.11.20260427, but
# public.ecr.aws/lambda/python:3.14 still ships glibc-2.34-231.amzn2023.0.3
# confirmed by CI scan on 2026-05-13. The image is pinned to a repo snapshot
# older than 2026-04-27, so `dnf upgrade glibc` in the Dockerfile would be the
# only way to pull the fix — and that would make builds non-reproducible.
# Wait for AWS to publish a rebuilt Lambda Python base image.
#
# CVE record: https://www.cve.org/CVERecord?id=CVE-2026-4046
# AL2023 ALAS: https://alas.aws.amazon.com/AL2023/ALAS2023-2026-1622.html
# Base image: public.ecr.aws/lambda/python:3.14
CVE-2026-4046 exp:2026-06-13
# CVE-2026-33811, CVE-2026-33814, CVE-2026-39820, CVE-2026-39836,
# CVE-2026-42499 — Go stdlib vulnerabilities (net, net/http, net/mail)
# affecting three binaries in the helm-installer Lambda container:
# - aws-lambda-rie (Go 1.26.2, bundled in public.ecr.aws/lambda/python:3.14)
# - helm v4.1.4 (Go 1.25.9, latest release as of 2026-05-13)
# - kubectl v1.35.4 pinned in Dockerfile (Go 1.25.9; v1.35.5 released
# 2026-05-12 is still go1.25.9 per build-image/cross/VERSION)
#
# Fix requires Go ≥1.25.10 or ≥1.26.3 in the compiled binaries. Go released
# those versions on 2026-05-07, but no downstream rebuild has shipped yet:
# - Helm: v4.1.4 is still latest (https://github.com/helm/helm/releases);
# v4.2.0-rc.1 exists but we pin to stable.
# - kubectl: v1.35.5 (2026-05-12) still ships Go 1.25.9
# (https://raw.githubusercontent.com/kubernetes/kubernetes/v1.35.5/build/build-image/cross/VERSION)
# - aws-lambda-rie: latest is v1.35 (2026-03-30) still Go 1.26.2;
# AWS-controlled, no user-serviceable update path.
#
# Re-evaluate when Helm ships v4.1.5+ with Go 1.25.10, when kubectl ships
# v1.35.6+ rebuilt with Go 1.25.10, and when AWS rebuilds aws-lambda-rie.
# Go release: https://groups.google.com/g/golang-announce/c/qcCIEXso47M
CVE-2026-33811 exp:2026-06-13
CVE-2026-33814 exp:2026-06-13
CVE-2026-39820 exp:2026-06-13
CVE-2026-39836 exp:2026-06-13
CVE-2026-42499 exp:2026-06-13