rootfs does not find JAR's #7906
-
IDsCVE-2024-47554, CVE-2022-29599, CVE-2021-26291, CVE-2021-37714 DescriptionI observed different behavior when running Reproduction Steps1. Build docker image with `docker build -t trivy_bug .` with following Dockerfile:
FROM ubuntu:22.04
ENV DEBIAN_FRONTEND=noninteractive
RUN apt-get update && apt-get install -y openjdk-11-jdk-headless maven wget apt-transport-https gnupg lsb-release
RUN wget -qO - https://aquasecurity.github.io/trivy-repo/deb/public.key | apt-key add -
RUN echo deb https://aquasecurity.github.io/trivy-repo/deb $(lsb_release -sc) main | tee -a /etc/apt/sources.list.d/trivy.list
RUN apt-get update && apt-get install trivy
Versionroot@583613954de1:/# trivy --version
Version: 0.57.0
Vulnerability DB:
Version: 2
UpdatedAt: 2024-11-12 12:17:49.02979874 +0000 UTC
NextUpdate: 2024-11-13 12:17:49.029798369 +0000 UTC
DownloadedAt: 2024-11-12 13:59:59.788147942 +0000 UTC
Java DB:
Version: 1
UpdatedAt: 2024-11-12 02:39:01.645741382 +0000 UTC
NextUpdate: 2024-11-15 02:39:01.645741061 +0000 UTC
DownloadedAt: 2024-11-12 14:00:14.09753337 +0000 UTC Checklist
|
Beta Was this translation helpful? Give feedback.
Replies: 3 comments
-
I also uploaded the container image to dockerhub, you can use it with
|
Beta Was this translation helpful? Give feedback.
-
Hello @tomuben These To see these packages - use
Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
-
@DmitriyLewen thanks for the explanation. |
Beta Was this translation helpful? Give feedback.
Hello @tomuben
Thanks for your report!
These
jar
files installed fromapt
.That is why Trivy doesn't check these files.
See https://aquasecurity.github.io/trivy/v0.57/docs/scanner/vulnerability/#handling-software-installed-via-os-packages for more details.
To see these packages - use
--detection-priority comprehensive
flag: