trivy detecting vulnerabilities in linux header packages? #6562
Replies: 2 comments 1 reply
-
This is a known problem. Security advisories are issued for source packages (e.g. We welcome any better solution. |
Beta Was this translation helpful? Give feedback.
-
Thanks for the explanation! Yeah, took some digging based on your input but I see where you are coming from now - no immediately great ideas here :/ You say it is a known problem: Is this documented anywhere? I tried to search for the problem and found this but did not clearly make the connection back then. Could it make sense to include this challenge in the documentation so people can adjust their triaging processes with that information? |
Beta Was this translation helpful? Give feedback.
-
IDs
CVE-2024-26828
Description
Hi,
trivy seems to often report linux-headers packages as vulnerable to kernel CVEs. I get that headers are part of the kernel, however, they rarely do contain the actual vulnerability. Often the actual kernel or the corresponding modules package is reported as well, however, I cannot seem to get a good understanding of the logic behind it.
Is the detection/evaluation logic explained somewhere?
Thanks,
Matthias
Reproduction Steps
Run trivy on any Ubuntu system and header packages will be reported as vulnerable. The Ubuntu vulnerability information (also as mentioned in the data sources) does not list the header packages as vulnerable.
Target
Filesystem
Scanner
Vulnerability
Target OS
Ubuntu 20.04
Debug Output
Version
# trivy --version Version: 0.50.4 Vulnerability DB: Version: 2 UpdatedAt: 2024-04-25 12:12:20.162732803 +0000 UTC NextUpdate: 2024-04-25 18:12:20.162732522 +0000 UTC DownloadedAt: 2024-04-25 14:20:08.779009059 +0000 UTC
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions