-
Notifications
You must be signed in to change notification settings - Fork 21
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add trivyignore file to ignore false positive CVEs in security scan #1546
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Good ole software supply chain 🙃
Looks good of course besides the |
a7732f7
to
afb1521
Compare
I took another look at the workflow. It turns out the repo isn't getting checked out at all in the |
935fb59
to
7426137
Compare
Got it - thank you! Fixed. I had assumed that since the job |
7426137
to
e1bc357
Compare
Yeah, the quick summary on that is that each subjob is executed on a different runner (you can actually occasionally see a |
e1bc357
to
ec160c3
Compare
Description
This change mitigates certain false positives that appear during the security scan of our
aerie-postgres
container by ignoring them with a.trivyignore
file, used by thetrivy
action which runs our scans.Verification
To determine that these CVE's were in fact false positives, I worked with @skovati and we did the following:
aerie-postgres
Publish workflow, security scan step, and found that the only remaining CVEs are the three in this PR, all associated with version 1.18.2 ofgobinary
'sstdlib
packagestdlib
package is fromgosu
, a small utility used to setup the postgres containergosu
docs which explains how most Go CVEs are false positives for this tool, and how to confirm.govulncheck
tool which checks specifically which parts of theGo
library are being used by a binary:gosu
binary from the postgres machine to local machine withdocker cp
govulncheck
tool against this binary with the commandgovulncheck -mode=binary gosu
GO-2023-1840 - Unsafe behavior in setuid/setgid binaries in runtime
govulncheck-with-excludes
script above, which explains in comments why it is a false positive/mitigated riskTherefore, we believe these other
gobinary
stdlib
CVEs from the security scan are all false positives in our case, and should be excluded from our scans.Future work
Better process for tracking these down in the future?