Skip to content

Commit c778328

Browse files
sunnywuclaude
andauthored
UID2-6655: Suppress CVE-2026-1584 (gnutls) in .trivyignore (#378)
* Upgrade gnutls to fix CVE-2026-1584 vulnerability Add explicit gnutls upgrade in Dockerfile to address HIGH severity vulnerability CVE-2026-1584 in gnutls 3.8.11-r0 (fixed in 3.8.12-r0) in the alpine base image. The vulnerability allows Remote Denial of Service via crafted ClientHello with invalid PSK. Jira: UID2-6655 Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com> * UID2-6655: Add CVE-2026-1584 to .trivyignore instead of upgrading gnutls gnutls is an OS-level library present in the alpine base image but is not used by our Java service. Upgrading it via apk introduces unnecessary risk of breaking system-level dependencies. The vulnerability (Remote DoS via crafted ClientHello) has no impact on our software. CVE-2026-1584 exp:2026-08-27 Co-Authored-By: Claude Sonnet 4.6 <noreply@anthropic.com> --------- Co-authored-by: Claude Sonnet 4.6 <noreply@anthropic.com>
1 parent 3472987 commit c778328

File tree

1 file changed

+5
-1
lines changed

1 file changed

+5
-1
lines changed

.trivyignore

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,7 @@
11
# List any vulnerability that are to be accepted
2-
# See https://aquasecurity.github.io/trivy/v0.35/docs/vulnerability/examples/filter/
2+
# See https://aquasecurity.github.io/trivy/v0.35/docs/vulnerability/examples/filter/
33
# for more details
4+
5+
# gnutls DoS vulnerability via crafted ClientHello - not impactful as gnutls is not used by our Java service
6+
# See: UID2-6655
7+
CVE-2026-1584 exp:2026-08-27

0 commit comments

Comments
 (0)