Closed skothandan closed 1 year ago
@skothandan thanks for your report!
I took a look at CVE-2021-3518
. the CVE affects on libxml2
, but the image ubuntu:16.04
from Docker Hub doesn't contain this package.
Could you tell us a way how you install packages for your image? maybe you can show Dockerfile...
thanks a lot.
Deleted reply to wrong issue -- Apologies
@afdesk Thanks for quick response! We are unable to find the docker file now. so have uploaded the image (built from the docker file) into docker hub in the following path. https://hub.docker.com/r/mraja3007/imagescanning Could you try to narrow down the issue with this image. kindly highlight if you need any further information.
@skothandan we took a look at the image mraja3007/imagescanning
:
DISTRIB_ID=Ubuntu
DISTRIB_RELEASE=16.04
DISTRIB_CODENAME=xenial
DISTRIB_DESCRIPTION="Ubuntu 16.04.7 LTS"
VERSION="16.04.7 LTS (Xenial Xerus)"
and then we took a look at the several of missed vulnerabilities.
the CVEs have an ignored status for xenial
:
"xenial": {
"Status": "ignored",
"Note": "end of standard support, was needs-triage"
}
so trivy
doesn't detect these vulns.
@skothandan also you can see all packages in json format:
$ trivy image --format json --output result.json --list-all-pkgs mraja3007/imagescanning:1.7.0
thanks for your report and help!
This issue is stale because it has been labeled with inactivity.
Description
we run scanning for container images which uses OS ubuntu 16.04 using Trivy 0.23.0. It did not detect all vulnerabilities in OS libraries (supposed to detect the below CVE vulnerabilities which were detected in Tenable.io CS ) CVE-2021-3520 CVE-2017-8872 CVE-2021-3518 CVE-2021-3517 CVE-2021-25217 CVE-2021-3541 CVE-2020-24977 CVE-2020-13529 CVE-2021-33910 CVE-2021-25219
What did you expect to happen?
It should have detected the all fixable and unfixable vulnerabilities for OS library.
What happened instead?
It detected only unfixed vulnerabilities and not above CVE's.
Output of run with
-debug
:Output of
trivy -v
:Additional details (base image name, container registry info...):