mirror of
https://github.com/freedomofpress/dangerzone.git
synced 2025-04-28 18:02:38 +02:00
ci: Ignore CVE-2023-28322 from security scans
Ignore CVE-2023-28322 from our security scans, because it targets `libcurl`, which is not used/exploitable in our offline container.
This commit is contained in:
parent
3f3d0be2b4
commit
a2506e6968
1 changed files with 11 additions and 1 deletions
12
.grype.yaml
12
.grype.yaml
|
@ -10,7 +10,6 @@ ignore:
|
||||||
#
|
#
|
||||||
# 1. This CVE affects software that performs encryption, typically disk
|
# 1. This CVE affects software that performs encryption, typically disk
|
||||||
# encryption, which is not the case for Dangerzone.
|
# encryption, which is not the case for Dangerzone.
|
||||||
# Also, the worst outcome
|
|
||||||
# 2. The NVD entry reports the severity of this CVE as "Medium", which is
|
# 2. The NVD entry reports the severity of this CVE as "Medium", which is
|
||||||
# yet another sign that we can ignore it.
|
# yet another sign that we can ignore it.
|
||||||
# 3. The worst outcome is denial of service, which is acceptable in our
|
# 3. The worst outcome is denial of service, which is acceptable in our
|
||||||
|
@ -41,3 +40,14 @@ ignore:
|
||||||
# place after the document has been converted to pixels, so the attacker
|
# place after the document has been converted to pixels, so the attacker
|
||||||
# has no control over it.
|
# has no control over it.
|
||||||
- vulnerability: CVE-2023-28879
|
- vulnerability: CVE-2023-28879
|
||||||
|
|
||||||
|
# CVE-2023-28322
|
||||||
|
# ==============
|
||||||
|
#
|
||||||
|
# NVD Entry: https://nvd.nist.gov/vuln/detail/CVE-2023-28322
|
||||||
|
# Verdict: Dangerzone is not affected. The rationale is the following:
|
||||||
|
#
|
||||||
|
# 1. The CVE targets `libcurl`, which to the best of our knowledge is not
|
||||||
|
# used in the container.
|
||||||
|
# 2. The container is offline, so the attack does not apply to it.
|
||||||
|
- vulnerability: CVE-2023-28322
|
||||||
|
|
Loading…
Reference in a new issue