Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add CVE-2025-0395 to .trivyignore #1362

Merged
Merged
Show file tree
Hide file tree
Changes from 2 commits
Commits
File filter

Filter by extension

Filter by extension


Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
34 changes: 31 additions & 3 deletions .github/workflows/trivy.yml
Original file line number Diff line number Diff line change
Expand Up @@ -27,7 +27,7 @@ jobs:
docker build --pull -t docker.io/securefederatedai/openfl:${{ github.sha }} -f openfl-docker/Dockerfile.base .

- name: Run Trivy vulnerability scanner
uses: aquasecurity/trivy-action@0.28.0
uses: aquasecurity/trivy-action@0.29.0
with:
image-ref: 'docker.io/securefederatedai/openfl:${{ github.sha }}'
format: 'sarif'
Expand All @@ -52,17 +52,24 @@ jobs:
--ignore-unfixed \
--vuln-type os,library \
--severity CRITICAL,HIGH,MEDIUM,LOW \
--ignorefile .trivyignore.yaml \
--db-repository 'ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db' \
.

- name: Display Trivy Scan Results
if: failure() # Ensure this step runs regardless of the previous step's outcome
run: |
echo "Trivy Scan Results:"
cat trivy-docker-results.json | jq '.Results[] | select(.Vulnerabilities != null) | .Vulnerabilities[] | {VulnerabilityID, PkgName, InstalledVersion, Severity, Description}'

- name: Upload Code Vulnerability Scan Results
uses: actions/upload-artifact@v4
with:
name: trivy-code-report-json
path: trivy-code-results.json

- name: Run Trivy vulnerability scanner for Docker image (JSON Output)
uses: aquasecurity/trivy-action@0.28.0
uses: aquasecurity/trivy-action@0.29.0
with:
image-ref: 'docker.io/securefederatedai/openfl:${{ github.sha }}'
format: 'json'
Expand All @@ -71,9 +78,16 @@ jobs:
ignore-unfixed: true
vuln-type: 'os,library'
severity: 'CRITICAL,HIGH,MEDIUM,LOW'
ignorefile: '.trivyignore.yaml'
env:
TRIVY_DB_REPOSITORY: 'ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db'

- name: Display Trivy Scan Results
if: failure() # Ensure this step runs regardless of the previous step's outcome
run: |
echo "Trivy Scan Results:"
cat trivy-docker-results.json | jq '.Results[] | select(.Vulnerabilities != null) | .Vulnerabilities[] | {VulnerabilityID, PkgName, InstalledVersion, Severity, Description}'

- name: Upload Docker Vulnerability Scan
uses: actions/upload-artifact@v4
with:
Expand All @@ -88,17 +102,24 @@ jobs:
--ignore-unfixed \
--vuln-type os,library \
--severity CRITICAL,HIGH,MEDIUM,LOW \
--ignorefile .trivyignore.yaml \
--db-repository 'ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db' \
.

- name: Display Trivy Scan Results
if: failure() # Ensure this step runs regardless of the previous step's outcome
run: |
echo "Trivy Scan Results:"
cat trivy-docker-results.json | jq '.Results[] | select(.Vulnerabilities != null) | .Vulnerabilities[] | {VulnerabilityID, PkgName, InstalledVersion, Severity, Description}'

- name: Upload Code Vulnerability Scan Results
uses: actions/upload-artifact@v4
with:
name: trivy-code-spdx-report-json
path: trivy-code-spdx-results.json

- name: Run Trivy vulnerability scanner for Docker image (SPDX-JSON Output)
uses: aquasecurity/trivy-action@0.28.0
uses: aquasecurity/trivy-action@0.29.0
with:
image-ref: 'docker.io/securefederatedai/openfl:${{ github.sha }}'
format: 'spdx-json'
Expand All @@ -107,9 +128,16 @@ jobs:
ignore-unfixed: true
vuln-type: 'os,library'
severity: 'CRITICAL,HIGH,MEDIUM,LOW'
ignorefile: '.trivyignore.yaml'
env:
TRIVY_DB_REPOSITORY: 'ghcr.io/aquasecurity/trivy-db,public.ecr.aws/aquasecurity/trivy-db'

- name: Display Trivy Scan Results
if: failure() # Ensure this step runs regardless of the previous step's outcome
run: |
echo "Trivy Scan Results:"
cat trivy-docker-results.json | jq '.Results[] | select(.Vulnerabilities != null) | .Vulnerabilities[] | {VulnerabilityID, PkgName, InstalledVersion, Severity, Description}'

- name: Upload Docker Vulnerability Scan
uses: actions/upload-artifact@v4
with:
Expand Down
13 changes: 13 additions & 0 deletions .trivyignore.yaml
Original file line number Diff line number Diff line change
@@ -0,0 +1,13 @@
# This file is used to suppress both:
# * Trivy vulnerability scans (under the 'vulnerabilities' section).
# * Trivy's linting warnings (under the 'misconfigurations' section).
# For more information about the Trivy Ignore YAML file, please refer to:
# https://aquasecurity.github.io/trivy/v0.48/docs/configuration/filtering/#trivyignoreyaml
# Justification should be included above each suppression group.

######################## Trivy CVE supressions ########################
vulnerabilities:
# * Relevant packages:: libc-bin
# * These packages are part of Intel's latest official Ubuntu base image.
- id: CVE-2025-0395

Loading