Skip to content

Commit 59f3f0e

Browse files
authored
Chore: [AEA-0000] - upgrade to latest trivy (#49)
## Summary - Routine Change ### Details - upgrade to latest trivy
1 parent 12e73aa commit 59f3f0e

File tree

6 files changed

+50
-3
lines changed

6 files changed

+50
-3
lines changed

.github/workflows/build_multi_arch_image.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,7 @@ jobs:
6666
- name: setup trivy
6767
uses: aquasecurity/setup-trivy@3fb12ec12f41e471780db15c232d5dd185dcb514
6868
with:
69-
version: v0.69.1
69+
version: v0.69.3
7070
- name: setup node
7171
uses: actions/setup-node@6044e13b5dc448c55e2357c09f80417699197238
7272
with:

.tool-versions

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -5,5 +5,5 @@ shellcheck 0.11.0
55
direnv 2.37.1
66
actionlint 1.7.10
77
ruby 3.3.0
8-
trivy 0.69.1
8+
trivy 0.69.3
99
yq 4.52.2

src/base/.devcontainer/.tool-versions

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,5 +2,5 @@ shellcheck 0.11.0
22
direnv 2.37.1
33
actionlint 1.7.10
44
ruby 3.3.0
5-
trivy 0.69.1
5+
trivy 0.69.3
66
yq 4.52.2

src/common/.trivyignore.yaml

Lines changed: 37 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -323,3 +323,40 @@ vulnerabilities:
323323
purls:
324324
- "pkg:golang/stdlib@v1.25.6"
325325
expired_at: 2026-08-13
326+
- id: CVE-2025-15558
327+
statement: "docker/cli: Docker CLI for Windows: Privilege escalation via malicious plugin binaries"
328+
purls:
329+
- "pkg:golang/github.com/docker/cli@v28.5.1%2Bincompatible"
330+
- "pkg:golang/github.com/docker/cli@v29.0.3%2Bincompatible"
331+
- "pkg:golang/github.com/docker/cli@v29.1.1%2Bincompatible"
332+
expired_at: 2026-09-09
333+
- id: CVE-2026-24051
334+
statement: "OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking"
335+
purls:
336+
- "pkg:golang/go.opentelemetry.io/otel/sdk@v1.36.0"
337+
expired_at: 2026-09-09
338+
- id: CVE-2024-35870
339+
statement: "kernel: smb: client: fix UAF in smb2_reconnect_server()"
340+
purls:
341+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-170.180?arch=amd64&distro=ubuntu-22.04"
342+
expired_at: 2026-09-09
343+
- id: CVE-2024-53179
344+
statement: "kernel: smb: client: fix use-after-free of signing key"
345+
purls:
346+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-170.180?arch=amd64&distro=ubuntu-22.04"
347+
expired_at: 2026-09-09
348+
- id: CVE-2025-21780
349+
statement: "kernel: drm/amdgpu: avoid buffer overflow attach in smu_sys_set_pp_table()"
350+
purls:
351+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-170.180?arch=amd64&distro=ubuntu-22.04"
352+
expired_at: 2026-09-09
353+
- id: CVE-2025-37899
354+
statement: "kernel: ksmbd: fix use-after-free in session logoff"
355+
purls:
356+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-170.180?arch=amd64&distro=ubuntu-22.04"
357+
expired_at: 2026-09-09
358+
- id: CVE-2025-38118
359+
statement: "kernel: Linux kernel: Bluetooth MGMT use-after-free vulnerability allows privilege escalation"
360+
purls:
361+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-170.180?arch=amd64&distro=ubuntu-22.04"
362+
expired_at: 2026-09-09

src/common_node_24/.trivyignore.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -53,3 +53,8 @@ vulnerabilities:
5353
- "pkg:npm/minimatch@10.0.3"
5454
- "pkg:npm/minimatch@9.0.5"
5555
expired_at: 2026-08-27
56+
- id: CVE-2026-29786
57+
statement: "node-tar is a full-featured Tar for Node.js. Prior to version 7.5.10, ..."
58+
purls:
59+
- "pkg:npm/tar@7.5.1"
60+
expired_at: 2026-09-09

src/projects/eps-storage-terraform/.trivyignore.yaml

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -105,3 +105,8 @@ vulnerabilities:
105105
purls:
106106
- "pkg:deb/ubuntu/firefox@147.0.4%2Bbuild1-0ubuntu0.22.04.1~mt1?arch=amd64&distro=ubuntu-22.04"
107107
expired_at: 2026-08-16
108+
- id: CVE-2026-24051
109+
statement: "OpenTelemetry Go SDK Vulnerable to Arbitrary Code Execution via PATH Hijacking"
110+
purls:
111+
- "pkg:golang/go.opentelemetry.io/otel/sdk@v1.38.0"
112+
expired_at: 2026-09-10

0 commit comments

Comments
 (0)