Skip to content

Commit 87fb6d6

Browse files
authored
Signed-off-by: Matheus Pimenta <matheuscscp@gmail.com>
1 parent d8dd517 commit 87fb6d6

4 files changed

Lines changed: 32 additions & 0 deletions

File tree

releases/release-v2.6.trivyignore

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
11
# justification: vulnerable_code_not_in_execute_path
22
CVE-2025-66506
33
CVE-2025-66564
4+
5+
# status: fixed (backported via patch; false positive from pseudo-version semver)
6+
CVE-2026-40109

releases/release-v2.7.trivyignore

Lines changed: 3 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -1,3 +1,6 @@
11
# justification: vulnerable_code_not_in_execute_path
22
CVE-2025-66506
33
CVE-2025-66564
4+
5+
# status: fixed (backported via patch; false positive from pseudo-version semver)
6+
CVE-2026-40109

vex/v2.6.json

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -132,6 +132,19 @@
132132
"status": "not_affected",
133133
"justification": "vulnerable_code_not_in_execute_path",
134134
"impact_statement": "The vulnerable code is not executed by Flux"
135+
},
136+
{
137+
"vulnerability": {
138+
"name": "CVE-2026-40109"
139+
},
140+
"timestamp": "2026-04-13T10:00:00Z",
141+
"products": [
142+
{
143+
"@id": "pkg:oci/notification-controller"
144+
}
145+
],
146+
"status": "fixed",
147+
"impact_statement": "False positive: the fix for this vulnerability has been backported to the Enterprise Flux v2.6 release branch of notification-controller via a patch and is included in the shipped binary. Trivy flags this based on the pseudo-version of the Go module being lower than the upstream fixed version (1.8.3), but the vulnerable code path is not present in the binary."
135148
}
136149
]
137150
}

vex/v2.7.json

Lines changed: 13 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -188,6 +188,19 @@
188188
"status": "not_affected",
189189
"justification": "vulnerable_code_not_in_execute_path",
190190
"impact_statement": "The vulnerable code is not executed by Flux"
191+
},
192+
{
193+
"vulnerability": {
194+
"name": "CVE-2026-40109"
195+
},
196+
"timestamp": "2026-04-13T10:00:00Z",
197+
"products": [
198+
{
199+
"@id": "pkg:oci/notification-controller"
200+
}
201+
],
202+
"status": "fixed",
203+
"impact_statement": "False positive: the fix for this vulnerability has been backported to the Enterprise Flux v2.7 release branch of notification-controller via a patch and is included in the shipped binary. Trivy flags this based on the pseudo-version of the Go module being lower than the upstream fixed version (1.8.3), but the vulnerable code path is not present in the binary."
191204
}
192205
]
193206
}

0 commit comments

Comments
 (0)