-
Notifications
You must be signed in to change notification settings - Fork 171
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
chore: cleanup stale grype ignores and patch golang.org/x/net CVE (#2492
) ## Description 1. Removes stale ignores from `.grype.yaml` 2. Patches [CVE-2023-45288](https://nvd.nist.gov/vuln/detail/CVE-2023-45288) - https://pkg.go.dev/vuln/GO-2024-2687 ```bash go get -u golang.org/x/net ``` ## Related Issue Fixes https://github.com/defenseunicorns/zarf/security/dependabot/121 ## Checklist before merging - [ ] Test, docs, adr added or updated as needed - [ ] [Contributor Guide Steps](https://github.com/defenseunicorns/zarf/blob/main/.github/CONTRIBUTING.md#developer-workflow) followed
- Loading branch information
Lucas Rodriguez
authored
May 10, 2024
1 parent
3060538
commit ace284e
Showing
3 changed files
with
15 additions
and
28 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -1,20 +1,6 @@ | ||
# Ignore file for false positives from protobuf, see the following for more information: | ||
# https://github.com/anchore/grype/issues/558 | ||
ignore: | ||
# This vulnerability does not affect Zarf as we do not instantiate a rekor client | ||
- vulnerability: GHSA-2h5h-59f5-c5x9 | ||
|
||
# This vulnerability does not affect Zarf as we do not instantiate a rekor client | ||
- vulnerability: GHSA-frqx-jfcm-6jjr | ||
|
||
# From rouille - The Zarf injector does not expose endpoints that use multipart form data | ||
- vulnerability: GHSA-mc8h-8q98-g5hr | ||
|
||
# From semver - This comes through nodemon which is only used for development | ||
- vulnerability: GHSA-c2qf-rxjj-qqgw | ||
|
||
# From k8s.io/apiserver - This is a false positive due to the difference in versioning between the library / binary k8s versioning | ||
- vulnerability: GHSA-82hx-w2r5-c2wq | ||
|
||
# From helm - This behavior was introduced intentionally, and cannot be removed without breaking backwards compatibility (some users may be relying on these values). | ||
- vulnerability: GHSA-jw44-4f3j-q396 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters