We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Our Nightly build detected CVE-2024-53103.
Total: 1 (HIGH: 1, CRITICAL: 0) ┌────────────────┬────────────────┬──────────┬──────────┬───────────────────┬───────────────┬───────────────────────────────────────────────────────────┐ │ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │ ├────────────────┼────────────────┼──────────┼──────────┼───────────────────┼───────────────┼───────────────────────────────────────────────────────────┤ │ linux-libc-dev │ CVE-2024-53103 │ HIGH │ affected │ 5.15.0-126.136 │ │ In the Linux kernel, the following vulnerability has been │ │ │ │ │ │ │ │ resolved: h... │ │ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2024-53103 │ └────────────────┴────────────────┴──────────┴──────────┴───────────────────┴───────────────┴───────────────────────────────────────────────────────────┘
However, Kernel CVE's should be suppressed in the trivy.rego file:
ignore { input.PkgName == "linux-libc-dev" regex.match("^kernel:", input.Title) }
=> Looks there is no other way to identify Kernel related CVE's. So, need to adjust the regular expression.
Security Scans should ignore CVE-2024-53103.
The text was updated successfully, but these errors were encountered:
#1029: Extended trivy rego for Kernel CVE's (#482)
ab70c0d
related to exasol/script-languages-release#1029
#1029: Extended trivy rego for Kernel CVE's
f4af2bc
154f465
Merge pull request #1033 from exasol/develop
3ed56f1
Changelog: - Update version to 9.1.0 (#1030) - #1029: Extended trivy rego for Kernel CVE's (#1031)
tomuben
No branches or pull requests
Background
Our Nightly build detected CVE-2024-53103.
However, Kernel CVE's should be suppressed in the trivy.rego file:
=> Looks there is no other way to identify Kernel related CVE's. So, need to adjust the regular expression.
Acceptance Criteria
Security Scans should ignore CVE-2024-53103.
The text was updated successfully, but these errors were encountered: