Skip to content

Fix Trivy CI: pin libnghttp2-14 to patched deb13u1 for CVE-2026-27135#102

Merged
akwirick merged 1 commit into
mainfrom
aw/trivy-libnghttp2-cve-2026-27135
May 15, 2026
Merged

Fix Trivy CI: pin libnghttp2-14 to patched deb13u1 for CVE-2026-27135#102
akwirick merged 1 commit into
mainfrom
aw/trivy-libnghttp2-cve-2026-27135

Conversation

@akwirick
Copy link
Copy Markdown
Contributor

Summary

  • Today's Trivy scan failed with one HIGH/CRITICAL fixable vuln: CVE-2026-27135 in libnghttp2-14, pulled transitively via wget → libcurl3-gnutls in the runtime image.
  • Pins libnghttp2-14=1.64.0-1.1+deb13u1 (the Debian trixie security-tracker fix) alongside the existing libngtcp2-* pins added in Fix Trivy CI: pin libngtcp2 to patched deb13u1 for CVE-2026-40170 #99 for CVE-2026-40170. Same pattern, same justification.

Test plan

  • CI Trivy scan passes (no HIGH/CRITICAL findings)
  • Image still builds on linux/amd64 and linux/arm64
  • Local trivy image --severity HIGH,CRITICAL --ignore-unfixed on the rebuilt image confirms CVE-2026-27135 drops

Session: d85c2c45 · Worktree: axon/primary

🤖 Generated with Claude Code

Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
@akwirick akwirick enabled auto-merge (squash) May 15, 2026 18:11
@akwirick akwirick merged commit 1fe409d into main May 15, 2026
19 checks passed
@akwirick akwirick deleted the aw/trivy-libnghttp2-cve-2026-27135 branch May 15, 2026 18:12
Copy link
Copy Markdown

Copilot AI left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Pull request overview

Updates the runtime Docker image dependency installation to ensure Trivy no longer flags a fixable HIGH/CRITICAL vulnerability by pinning a patched Debian package version, following the existing approach used for prior transitive-dependency CVE fixes.

Changes:

  • Pin libnghttp2-14 to 1.64.0-1.1+deb13u1 in the runtime-stage apt-get install to address CVE-2026-27135.
  • Update the Dockerfile comment to document the additional pin and associated CVE.

💡 Add Copilot custom instructions for smarter, more guided reviews. Learn how to get started.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

3 participants