Skip to content

Commit

Permalink
security: add scan triage for CVE-2024-25620 (helm/v3)
Browse files Browse the repository at this point in the history
Triage this scan result as `consul-k8s` should not be directly
impacted and it is medium severity. Follow-up ticket filed for
remediation.

Also improve formatting of scan config since this change will be
backported.
  • Loading branch information
zalimeni committed Feb 20, 2024
1 parent 442232e commit e0afade
Show file tree
Hide file tree
Showing 2 changed files with 24 additions and 11 deletions.
31 changes: 20 additions & 11 deletions .release/security-scan.hcl
Original file line number Diff line number Diff line change
Expand Up @@ -13,19 +13,28 @@
# See `security-scanner` docs or run with `--help` for scan target syntax.

container {
dependencies = true
alpine_secdb = true
dependencies = true
alpine_secdb = true

secrets {
all = true
}
secrets {
all = true
}
}

binary {
go_modules = true
osv = true
go_modules = true
osv = true

secrets {
all = true
}
}
secrets {
all = true
}

triage {
suppress {
vulnerabilites = [
# NET-8174 (2024-02-20): Chart YAML path traversal (not impacted)
"GHSA-v53g-5gjp-272r", # alias CVE-2024-25620
]
}
}
}
4 changes: 4 additions & 0 deletions scan.hcl
Original file line number Diff line number Diff line change
Expand Up @@ -31,6 +31,10 @@ repository {
"acceptance/*",
"hack/*",
]
vulnerabilites = [
# NET-8174 (2024-02-20): Chart YAML path traversal (not impacted)
"GHSA-v53g-5gjp-272r", # alias CVE-2024-25620
]
}
}
}

0 comments on commit e0afade

Please sign in to comment.