Skip to content

Commit f75e451

Browse files
authored
Merge pull request #39 from dash14/update/deps-and-image-scan-workflow
Bump base image deps and improve image-scan workflow
2 parents bf50c3d + 1d7c5b1 commit f75e451

File tree

3 files changed

+28
-3
lines changed

3 files changed

+28
-3
lines changed

.github/workflows/image-scan.yml

Lines changed: 13 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -37,7 +37,7 @@ jobs:
3737
tags: buildcage:scan
3838

3939
- name: Scan image with Trivy
40-
id: trivy-scan
40+
if: github.ref == 'refs/heads/main'
4141
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0
4242
with:
4343
image-ref: ${{ github.event_name == 'schedule' && format('ghcr.io/{0}:latest', github.repository) || 'buildcage:scan' }}
@@ -49,6 +49,18 @@ jobs:
4949
severity: CRITICAL,HIGH
5050

5151
- name: Upload Trivy scan results to GitHub Security
52+
if: github.ref == 'refs/heads/main'
5253
uses: github/codeql-action/upload-sarif@c10b8064de6f491fea524254123dbe5e09572f13 # v4.35.1
5354
with:
5455
sarif_file: trivy-results.sarif
56+
57+
- name: Scan image with Trivy
58+
if: github.ref != 'refs/heads/main'
59+
uses: aquasecurity/trivy-action@57a97c7e7821a5776cebc9bb87c984fa69cba8f1 # v0.35.0
60+
with:
61+
image-ref: buildcage:scan
62+
ignore-unfixed: true
63+
trivyignores: .trivyignore
64+
scanners: vuln
65+
format: table
66+
severity: CRITICAL,HIGH

.trivyignore

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,3 +48,16 @@ CVE-2026-1229
4848
# libexpat: XML_ExternalEntityParserCreate does not copy encoding handler user data.
4949
# No external XML entity processing path exists in this product.
5050
CVE-2026-24515
51+
52+
# QuickJS stack overflow via deeply nested JS input.
53+
# Only internal tool scripts (convert-rule.mjs, report.mjs) are executed;
54+
# no untrusted JavaScript is evaluated.
55+
CVE-2023-31922
56+
57+
# zlib: buffer overflow in standalone untgz demo utility.
58+
# The core zlib library (libz) is unaffected; untgz is not used in this image.
59+
CVE-2026-22184
60+
61+
# Go stdlib net/url: incorrect parsing of IPv6 host literals.
62+
# CNI plugins do not parse user-supplied URLs.
63+
CVE-2026-25679

docker/Dockerfile

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
ARG CNI_VERSION=v1.9.0
1+
ARG CNI_VERSION=v1.9.1
22

33
# Prepare dependencies
44
FROM alpine:3.23@sha256:25109184c71bdad752c8312a8623239686a9a2071e8825f20acb8f2198c3f659 AS deps
@@ -10,7 +10,7 @@ RUN apk add --no-cache curl gettext && \
1010
| tar -C /opt/cni/bin -xz ./bridge ./host-local ./loopback
1111

1212
# Final image
13-
FROM moby/buildkit:v0.28.0@sha256:37539dd4d60fc70968d164d3850d903a2c56f6402214a1953fbf9fcb81ada731
13+
FROM moby/buildkit:v0.29.0@sha256:0039c1d47e8748b5afea56f4e85f14febaf34452bd99d9552d2daa82262b5cc5
1414

1515
LABEL org.opencontainers.image.title="buildcage" \
1616
org.opencontainers.image.description="Secure Docker build environment with network access control" \

0 commit comments

Comments
 (0)