Skip to content

Commit ce7e829

Browse files
moves to common trivyignore
1 parent 2810e0d commit ce7e829

File tree

2 files changed

+21
-46
lines changed

2 files changed

+21
-46
lines changed

src/base/.trivyignore.yaml

Lines changed: 0 additions & 41 deletions
Original file line numberDiff line numberDiff line change
@@ -1,42 +1 @@
11
vulnerabilities:
2-
- id: CVE-2024-35870
3-
statement: "kernel: smb: client: fix UAF in smb2_reconnect_server()"
4-
purls:
5-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=amd64&distro=ubuntu-22.04"
6-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=arm64&distro=ubuntu-22.04"
7-
expired_at: 2026-08-26
8-
- id: CVE-2024-53179
9-
statement: "kernel: smb: client: fix use-after-free of signing key"
10-
purls:
11-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=amd64&distro=ubuntu-22.04"
12-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=arm64&distro=ubuntu-22.04"
13-
expired_at: 2026-08-26
14-
- id: CVE-2025-37849
15-
statement: "kernel: KVM: arm64: Tear down vGIC on failed vCPU creation"
16-
purls:
17-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=amd64&distro=ubuntu-22.04"
18-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=arm64&distro=ubuntu-22.04"
19-
expired_at: 2026-08-26
20-
- id: CVE-2025-37899
21-
statement: "kernel: ksmbd: fix use-after-free in session logoff"
22-
purls:
23-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=amd64&distro=ubuntu-22.04"
24-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=arm64&distro=ubuntu-22.04"
25-
expired_at: 2026-08-26
26-
- id: CVE-2025-38118
27-
statement: "kernel: Linux kernel: Bluetooth MGMT use-after-free vulnerability allows privilege escalation"
28-
purls:
29-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=amd64&distro=ubuntu-22.04"
30-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=arm64&distro=ubuntu-22.04"
31-
expired_at: 2026-08-26
32-
- id: CVE-2026-23111
33-
statement: "kernel: Kernel: Privilege escalation or denial of service in nf_tables via inverted element activity check"
34-
purls:
35-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=amd64&distro=ubuntu-22.04"
36-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=arm64&distro=ubuntu-22.04"
37-
expired_at: 2026-08-26
38-
- id: CVE-2025-61594
39-
statement: "uri: URI module: Credential exposure via URI + operator"
40-
purls:
41-
- "pkg:gem/uri@0.13.0"
42-
expired_at: 2026-08-26

src/common/.trivyignore.yaml

Lines changed: 21 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -2,28 +2,44 @@ vulnerabilities:
22
- id: CVE-2024-35870
33
statement: "kernel: smb: client: fix UAF in smb2_reconnect_server()"
44
purls:
5-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-170.180?arch=amd64&distro=ubuntu-22.04"
5+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=amd64&distro=ubuntu-22.04"
6+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=arm64&distro=ubuntu-22.04"
67
expired_at: 2026-08-12
78
- id: CVE-2024-53179
89
statement: "kernel: smb: client: fix use-after-free of signing key"
910
purls:
10-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-170.180?arch=amd64&distro=ubuntu-22.04"
11+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=amd64&distro=ubuntu-22.04"
12+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=arm64&distro=ubuntu-22.04"
1113
expired_at: 2026-08-12
1214
- id: CVE-2025-37849
1315
statement: "kernel: KVM: arm64: Tear down vGIC on failed vCPU creation"
1416
purls:
15-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-170.180?arch=amd64&distro=ubuntu-22.04"
17+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=amd64&distro=ubuntu-22.04"
18+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=arm64&distro=ubuntu-22.04"
1619
expired_at: 2026-08-12
1720
- id: CVE-2025-37899
1821
statement: "kernel: ksmbd: fix use-after-free in session logoff"
1922
purls:
20-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-170.180?arch=amd64&distro=ubuntu-22.04"
23+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=amd64&distro=ubuntu-22.04"
24+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=arm64&distro=ubuntu-22.04"
2125
expired_at: 2026-08-12
2226
- id: CVE-2025-38118
2327
statement: "kernel: Linux kernel: Bluetooth MGMT use-after-free vulnerability allows privilege escalation"
2428
purls:
25-
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-170.180?arch=amd64&distro=ubuntu-22.04"
29+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=amd64&distro=ubuntu-22.04"
30+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=arm64&distro=ubuntu-22.04"
2631
expired_at: 2026-08-12
32+
- id: CVE-2026-23111
33+
statement: "kernel: Kernel: Privilege escalation or denial of service in nf_tables via inverted element activity check"
34+
purls:
35+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=amd64&distro=ubuntu-22.04"
36+
- "pkg:deb/ubuntu/linux-libc-dev@5.15.0-171.181?arch=arm64&distro=ubuntu-22.04"
37+
expired_at: 2026-08-26
38+
- id: CVE-2025-61594
39+
statement: "uri: URI module: Credential exposure via URI + operator"
40+
purls:
41+
- "pkg:gem/uri@0.13.0"
42+
expired_at: 2026-08-26
2743
- id: CVE-2026-26007
2844
statement: "cryptography: cryptography Subgroup Attack Due to Missing Subgroup Validation for SECT Curves"
2945
purls:

0 commit comments

Comments
 (0)