From 4c69feb486090439821f6572f1db2a18ea975eeb Mon Sep 17 00:00:00 2001 From: rajith Date: Wed, 12 Feb 2025 14:20:05 +0530 Subject: [PATCH] removed trivyignore.yaml and adding plain text --- .trivyignore | 2 ++ .trivyignore.yaml | 13 ------------- 2 files changed, 2 insertions(+), 13 deletions(-) create mode 100644 .trivyignore delete mode 100644 .trivyignore.yaml diff --git a/.trivyignore b/.trivyignore new file mode 100644 index 0000000000..5bf578a27d --- /dev/null +++ b/.trivyignore @@ -0,0 +1,2 @@ +# Accept the risk +CVE-2025-0395 diff --git a/.trivyignore.yaml b/.trivyignore.yaml deleted file mode 100644 index 53c726fe89..0000000000 --- a/.trivyignore.yaml +++ /dev/null @@ -1,13 +0,0 @@ -# This file is used to suppress both: -# * Trivy vulnerability scans (under the 'vulnerabilities' section). -# * Trivy's linting warnings (under the 'misconfigurations' section). -# For more information about the Trivy Ignore YAML file, please refer to: -# https://aquasecurity.github.io/trivy/v0.48/docs/configuration/filtering/#trivyignoreyaml -# Justification should be included above each suppression group. - -######################## Trivy CVE supressions ######################## -vulnerabilities: - # * Relevant packages:: libc-bin - # * These packages are part of Intel's latest official Ubuntu base image. - - id: CVE-2025-0395 -