Co-authored-by: Jason Woltje <jason@diversecanvas.com> Co-committed-by: Jason Woltje <jason@diversecanvas.com>
43 lines
2.5 KiB
Plaintext
43 lines
2.5 KiB
Plaintext
# Trivy CVE Suppressions — Upstream Dependencies
|
||
# Reviewed: 2026-02-13 | Milestone: M11-CIPipeline
|
||
#
|
||
# MITIGATED:
|
||
# - Go stdlib CVEs (6): gosu rebuilt from source with Go 1.26
|
||
# - npm bundled CVEs (5): npm removed from production Node.js images
|
||
# - Node.js 20 → 24 LTS migration (#367): base images updated
|
||
#
|
||
# REMAINING: OpenBao (5 CVEs) + Next.js bundled tar/minimatch (5 CVEs)
|
||
# Re-evaluate when upgrading openbao image beyond 2.5.0 or Next.js beyond 16.1.6.
|
||
|
||
# === OpenBao false positives ===
|
||
# Trivy reads Go module pseudo-version (v0.0.0-20260204...) from bin/bao
|
||
# and reports CVEs fixed in openbao 2.0.3–2.4.4. We run openbao:2.5.0.
|
||
CVE-2024-8185 # HIGH: DoS via Raft join (fixed in 2.0.3)
|
||
CVE-2024-9180 # HIGH: privilege escalation (fixed in 2.0.3)
|
||
CVE-2025-59043 # HIGH: DoS via malicious JSON (fixed in 2.4.1)
|
||
CVE-2025-64761 # HIGH: identity group root escalation (fixed in 2.4.4)
|
||
|
||
# === Next.js bundled tar/minimatch CVEs (upstream — waiting on Next.js release) ===
|
||
# Next.js 16.1.6 bundles tar@7.5.2 and minimatch@9.0.5 in next/dist/compiled/ (pre-compiled).
|
||
# These are NOT pnpm dependencies — they're embedded in the Next.js package itself.
|
||
# pnpm overrides cannot reach these; only a Next.js upgrade can fix them.
|
||
# Affects web image only (orchestrator and API are clean).
|
||
# npm was also removed from all production images, eliminating the npm-bundled copy.
|
||
# To resolve: upgrade Next.js when a release bundles tar >= 7.5.8 and minimatch >= 10.2.1.
|
||
CVE-2026-23745 # HIGH: tar arbitrary file overwrite via unsanitized linkpaths (fixed in 7.5.3)
|
||
CVE-2026-23950 # HIGH: tar arbitrary file overwrite via Unicode path collision (fixed in 7.5.4)
|
||
CVE-2026-24842 # HIGH: tar arbitrary file creation via hardlink path traversal (needs tar >= 7.5.7)
|
||
CVE-2026-26960 # HIGH: tar arbitrary file read/write via malicious archive hardlink (needs tar >= 7.5.8)
|
||
CVE-2026-26996 # HIGH: minimatch DoS via specially crafted glob patterns (needs minimatch >= 10.2.1)
|
||
|
||
# === OpenBao Go stdlib (waiting on upstream rebuild) ===
|
||
# OpenBao 2.5.0 compiled with Go 1.25.6, fix needs Go >= 1.25.7.
|
||
# Cannot build OpenBao from source (large project). Waiting for upstream release.
|
||
CVE-2025-68121 # CRITICAL: crypto/tls session resumption
|
||
|
||
# === multer CVEs (upstream via @nestjs/platform-express) ===
|
||
# multer <2.1.0 — waiting on NestJS to update their dependency
|
||
# These are DoS vulnerabilities in file upload handling
|
||
GHSA-xf7r-hgr6-v32p # HIGH: DoS via incomplete cleanup
|
||
GHSA-v52c-386h-88mc # HIGH: DoS via resource exhaustion
|