Open tomersein opened 5 months ago
any ETA for this bug ? got the same issue
Having the same issue, is there any solution in the horizon?
I left some notes on the Syft issue, but at least part of the problem is that the version is not included in the modinfo for this package (and many other kernel module packages).
I'm inclined to say the solution is to modify Grype such that packages with unknown versions are not matched by default, with an option to include them. I have a gut feeling that matching package vulnerabilities against packages with no versions would lead to more FPs than FNs, but don't have data to confirm this.
We have some other options such as excluding these packages altogether at the Syft level, but I think regardless of making that change, a generally useful behavior for Grype would be to omit these types of packages from vuln matching by default.
Thoughts?
I think removing vulnerabilities of packages as a default behavior might be confusing. i have few ideas:
However, I would investigate why so many packages from the linux-kernel-moudle doesn't have version or even package name sometimes.
This might be fixed in https://github.com/anchore/grype/releases/tag/v0.80.2 by https://github.com/anchore/syft/pull/3257.
I don't have an example system handy with this kernel module. Is someone able to re-test and let us know whether this issue still affects grype version v0.80.2 and late?
What happened: I am scanning ec2 with newest grype, and get the CVE-2019-10222 on ceph package. however, I did a little research and I think it might be a FP, since the vulnerability doesn't seem to be related to the kernel. In the SBOM I see the below information:
In Grype I see:
and in json:
What you expected to happen: I think this CVE is not related to the kernel, maybe to the application. How to reproduce it (as minimally and precisely as possible):
grype version
: 0.79.1cat /etc/os-release
or similar): linux arm (ec2)