Skip acceptable vuln
This commit is contained in:
parent
c00b690ed3
commit
726b6e69f7
2
Jenkinsfile
vendored
2
Jenkinsfile
vendored
@ -207,7 +207,7 @@ pipeline {
|
||||
}
|
||||
post {
|
||||
always {
|
||||
sh 'docker-compose down --rmi all --remove-orphans --volumes -t 30'
|
||||
sh 'docker-compose down --rmi all --remove-orphans --volumes -t 30 || true'
|
||||
sh './scripts/ci/build-cleanup'
|
||||
echo 'Reverting ownership'
|
||||
sh 'docker run --rm -v $(pwd):/data jc21/gotools:latest chown -R "$(id -u):$(id -g)" /data'
|
||||
|
@ -1,22 +1,37 @@
|
||||
# If you need to ignore any of nancy's warnings add them
|
||||
|
||||
# here with a reference to the package/version that
|
||||
|
||||
# triggers them and rational for ignoring it.
|
||||
|
||||
# pkg:golang/github.com/coreos/etcd@3.3.10
|
||||
|
||||
# etcd before versions 3.3.23 and 3.4.10 does not perform any password length validation
|
||||
|
||||
CVE-2020-15115
|
||||
|
||||
# pkg:golang/github.com/coreos/etcd@3.3.10
|
||||
|
||||
# In ectd before versions 3.4.10 and 3.3.23, gateway TLS authentication is only applied to endpoints detected in DNS SRV records
|
||||
|
||||
CVE-2020-15136
|
||||
|
||||
# pkg:golang/github.com/coreos/etcd@3.3.10
|
||||
|
||||
# In etcd before versions 3.3.23 and 3.4.10, the etcd gateway is a simple TCP proxy to allow for basic service discovery and access
|
||||
|
||||
CVE-2020-15114
|
||||
|
||||
# pkg:golang/github.com/gorilla/websocket@1.4.0
|
||||
|
||||
# Integer Overflow or Wraparound
|
||||
|
||||
CWE-190
|
||||
|
||||
# jwt-go before 4.0.0-preview1 allows attackers to bypass intended access restrict...
|
||||
|
||||
CVE-2020-26160
|
||||
|
||||
# https://ossindex.sonatype.org/vulnerability/sonatype-2021-1485
|
||||
|
||||
sonatype-2021-1485
|
||||
|
Loading…
Reference in New Issue
Block a user