Trivy is not reporting many vulnerabilties #6377
venkatasandeeplade
started this conversation in
False Detection
Replies: 1 comment 4 replies
-
Hello @venkatasandeeplade Can you send your image? Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
4 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
IDs
CVE-2020-3810,CVE-2021-43618,CVE-2022-1271,CVE-2022-44640,CVE-2023-26604,CVE-2023-26604,CVE-2021-24032,CVE-2022-40897,CVE-2023-35945,CVE-2020-29363
Description
Team we have a docker image which uses Ubuntu Focal version . We are trying to a comparison between Trivy and other commercial tool and observed below vulnerabilities are not reported in Trivy though they are applicable to Ubuntu Focal. Image OS details
NAME="Ubuntu"
VERSION="20.04.6 LTS (Focal Fossa)"
ID=ubuntu
ID_LIKE=debian
PRETTY_NAME="Ubuntu 20.04.6 LTS"
VERSION_ID="20.04"
HOME_URL="https://www.ubuntu.com/"
SUPPORT_URL="https://help.ubuntu.com/"
BUG_REPORT_URL="https://bugs.launchpad.net/ubuntu/"
PRIVACY_POLICY_URL="https://www.ubuntu.com/legal/terms-and-policies/privacy-policy"
VERSION_CODENAME=focal
UBUNTU_CODENAME=focal
Please find packages and CVEs that are applicable which trivy is not reporting
apt/2.0.9/amd64. https://nvd.nist.gov/vuln/detail/CVE-2020-3810
gmp/2:6.1.0+dfsg-2 https://ubuntu.com/security/CVE-2021-43618
gzip/1.10-0ubuntu https://ubuntu.com/security/CVE-2022-1271
libhcrypto4-heimdal/7.7.0+dfsg-1ubuntu1.2/amd64 https://ubuntu.com/security/CVE-2022-44640
libsystemd0/245.4-4ubuntu3.22/amd64 https://ubuntu.com/security/CVE-2023-26604
libudev1/245.4-4ubuntu3.22/amd64 https://ubuntu.com/security/CVE-2023-26604
libzstd/1.4.3+dfsg-1 https://ubuntu.com/security/CVE-2021-24032
nativesdk-python3-setuptools/45.2.0-r0/x86_64-nativesdk https://ubuntu.com/security/CVE-2022-40897
nghttp2/1.40.0-1 https://ubuntu.com/security/CVE-2023-35945
p11-kit/0.23.19-2 https://ubuntu.com/security/CVE-2020-29363
Trivy version details
Version: 0.45.1
Vulnerability DB:
Version: 2
UpdatedAt: 2024-03-23 12:13:41.031654956 +0000 UTC
NextUpdate: 2024-03-23 18:13:41.031654705 +0000 UTC
DownloadedAt: 2024-03-23 14:28:01.102631756 +0000 UTC
Trivy command used
/tmp/trivy/trivy image --exit-code 0 --ignore-unfixed --no-progress --timeout 15m --format json -o /tmp/trivy/image_vul.json
Reproduction Steps
Target
Container Image
Scanner
Vulnerability
Target OS
Ubuntu 20.04.6 LTS
Debug Output
Version
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions