Skip to content

Commit 51cf8c8

Browse files
jorgebrazJorge Brazafsmeira
authored
fix: Make Trivy DB update earlier (#161)
* Make Trivy DB update earlier With more orgs being added to proactive SCA and a trend on regular analysis starting earlier in the day there is starting to be quite a bit of overlap between SCA jobs and regular jobs resulting in worst analysis times. Trivy-db is built and published to GH Container Registry every 6 hours (https://github.com/aquasecurity/trivy-db/blob/main/.github/workflows/cron.yml#L5) resulting in a publishing schedule of 6:00 UTC, 12:00 UTC, 18:00 UTC and 00:00 UTC (https://github.com/aquasecurity/trivy-db/pkgs/container/trivy-db). With this scheduled we should be ok to run the Trivy DB update cron at 00:30 UTC with good guarantees of having fresh data. * tests: Add new expected vulnerabilities to test results --------- Co-authored-by: Jorge Braz <[email protected]> Co-authored-by: André Meira <[email protected]>
1 parent aef31db commit 51cf8c8

File tree

3 files changed

+50
-2
lines changed

3 files changed

+50
-2
lines changed

.circleci/config.yml

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -62,8 +62,8 @@ workflows:
6262
update_vulnerability_dbs:
6363
triggers:
6464
- schedule:
65-
# this is running at 2am everyday to avoid doing it at midnight (same time as nightly)
66-
cron: "0 2 * * *"
65+
# run at 00:30 UTC (30 minutes after being updated on the source)
66+
cron: "30 0 * * *"
6767
filters:
6868
branches:
6969
only:

docs/multiple-tests/pattern-vulnerability-medium/results.xml

Lines changed: 36 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -110,6 +110,18 @@
110110
message="Insecure dependency golang/[email protected] (CVE-2025-22871: net/http: Request smuggling due to acceptance of invalid chunked data in net/http) (update to 1.23.8)"
111111
severity="warning"
112112
/>
113+
<error
114+
source="vulnerability_medium"
115+
line="3"
116+
message="Insecure dependency golang/[email protected] (CVE-2025-0913: Inconsistent handling of O_CREATE|O_EXCL on Unix and Windows in os in syscall) (update to 1.23.10)"
117+
severity="warning"
118+
/>
119+
<error
120+
source="vulnerability_medium"
121+
line="3"
122+
message="Insecure dependency golang/[email protected] (CVE-2025-4673: net/http: Sensitive headers not cleared on cross-origin redirect in net/http) (update to 1.23.10)"
123+
severity="warning"
124+
/>
113125
</file>
114126

115127
<file name="gradle/gradle.lockfile">
@@ -173,6 +185,24 @@
173185
message="Insecure dependency pypi/[email protected] (CVE-2024-35195: requests: subsequent requests to the same host ignore cert verification) (update to 2.32.0)"
174186
severity="warning"
175187
/>
188+
<error
189+
source="vulnerability_medium"
190+
line="131"
191+
message="Insecure dependency pypi/[email protected] (CVE-2024-47081: requests: Requests vulnerable to .netrc credentials leak via malicious URLs) (update to 2.32.4)"
192+
severity="warning"
193+
/>
194+
<error
195+
source="vulnerability_medium"
196+
line="140"
197+
message="Insecure dependency pypi/[email protected] (CVE-2025-50181: urllib3: urllib3 redirects are not disabled when retries are disabled on PoolManager instantiation) (update to 2.5.0)"
198+
severity="warning"
199+
/>
200+
<error
201+
source="vulnerability_medium"
202+
line="140"
203+
message="Insecure dependency pypi/[email protected] (CVE-2025-50182: urllib3: urllib3 does not control redirects in browsers and Node.js) (update to 2.5.0)"
204+
severity="warning"
205+
/>
176206
</file>
177207

178208
<file name="python/requirements.txt">
@@ -188,6 +218,12 @@
188218
message="Insecure dependency pypi/[email protected] (CVE-2024-35195: requests: subsequent requests to the same host ignore cert verification) (update to 2.32.0)"
189219
severity="warning"
190220
/>
221+
<error
222+
source="vulnerability_medium"
223+
line="2"
224+
message="Insecure dependency pypi/[email protected] (CVE-2024-47081: requests: Requests vulnerable to .netrc credentials leak via malicious URLs) (update to 2.32.4)"
225+
severity="warning"
226+
/>
191227
</file>
192228

193229
<file name="ruby/Gemfile.lock">

docs/multiple-tests/pattern-vulnerability/results.xml

Lines changed: 12 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -52,6 +52,18 @@
5252
message="Insecure dependency golang/github.com/ollama/[email protected] (CVE-2025-0312: ollama: NULL Pointer Dereference in ollama/ollama) (no fix available)"
5353
severity="error"
5454
/>
55+
<error
56+
source="vulnerability"
57+
line="8"
58+
message="Insecure dependency golang/github.com/ollama/[email protected] (CVE-2024-8063: ollama: Divide by Zero in ollama/ollama) (no fix available)"
59+
severity="error"
60+
/>
61+
<error
62+
source="vulnerability"
63+
line="8"
64+
message="Insecure dependency golang/github.com/ollama/[email protected] (CVE-2025-1975: ollama: Improper Validation of Array Index in ollama/ollama) (no fix available)"
65+
severity="error"
66+
/>
5567
<!-- stdlib -->
5668
<error
5769
source="vulnerability"

0 commit comments

Comments
 (0)