Skip to content

Commit 66ec9fd

Browse files
committed
more trivy
1 parent b4ebc99 commit 66ec9fd

File tree

1 file changed

+40
-0
lines changed

1 file changed

+40
-0
lines changed

src/common/.trivyignore.yaml

Lines changed: 40 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -392,3 +392,43 @@ vulnerabilities:
392392
purls:
393393
- "pkg:golang/go.opentelemetry.io/otel/sdk@v1.38.0"
394394
expired_at: 2026-09-16
395+
- id: CVE-2024-35870
396+
statement: "kernel: smb: client: fix UAF in smb2_reconnect_server()"
397+
purls:
398+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-173.183?arch=arm64&distro=ubuntu-22.04"
399+
expired_at: 2026-09-16
400+
- id: CVE-2024-53179
401+
statement: "kernel: smb: client: fix use-after-free of signing key"
402+
purls:
403+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-173.183?arch=arm64&distro=ubuntu-22.04"
404+
expired_at: 2026-09-16
405+
- id: CVE-2025-37899
406+
statement: "kernel: ksmbd: fix use-after-free in session logoff"
407+
purls:
408+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-173.183?arch=arm64&distro=ubuntu-22.04"
409+
expired_at: 2026-09-16
410+
- id: CVE-2025-38118
411+
statement: "kernel: Linux kernel: Bluetooth MGMT use-after-free vulnerability allows privilege escalation"
412+
purls:
413+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-173.183?arch=arm64&distro=ubuntu-22.04"
414+
expired_at: 2026-09-16
415+
- id: CVE-2024-35870
416+
statement: "kernel: smb: client: fix UAF in smb2_reconnect_server()"
417+
purls:
418+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-173.183?arch=amd64&distro=ubuntu-22.04"
419+
expired_at: 2026-09-16
420+
- id: CVE-2024-53179
421+
statement: "kernel: smb: client: fix use-after-free of signing key"
422+
purls:
423+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-173.183?arch=amd64&distro=ubuntu-22.04"
424+
expired_at: 2026-09-16
425+
- id: CVE-2025-37899
426+
statement: "kernel: ksmbd: fix use-after-free in session logoff"
427+
purls:
428+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-173.183?arch=amd64&distro=ubuntu-22.04"
429+
expired_at: 2026-09-16
430+
- id: CVE-2025-38118
431+
statement: "kernel: Linux kernel: Bluetooth MGMT use-after-free vulnerability allows privilege escalation"
432+
purls:
433+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-173.183?arch=amd64&distro=ubuntu-22.04"
434+
expired_at: 2026-09-16

0 commit comments

Comments
 (0)