[Bug] Rootio Images are showing old false positives vulnerabilities that did not appear in "original" image #9170
Replies: 2 comments 20 replies
-
@knqyf263 @DmitriyLewen can you guys look at this? Were ending up with tons of false positives in all our images now 😅 |
Beta Was this translation helpful? Give feedback.
-
OK so after digging into this deeper we've identified the actual issue it looks like, while all those CVEs do exist in the pre-root image the severity for them is defined as "low" while in the new scan they are defined as Critical or High. We think this might be caused by Trivy now for some reason using a different severity source (NVD) in scans for us as oppose to the existing one (Debian in this case) and that the reason for this is because the ecosystem source for our images is now "root" and not "Debian" or whichever. We looked into the SBOM where the full severity data is provided, and each of these CVEs seems to match the "debian" source severity in the pre-root image, and the NVD severity in the post-root image, so this looks like the culprit. Looking at the logic in the Given we don't provide severity for vulnerabilities, the correct behaviour in Trivy should be to use the severity source of the underlining image, so if a root debian image - the severity source should be debian, if root ubuntu than ubuntu etc, and only then follow the next default pattern to NVD if that severity does not exist. Does this make sense? |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
-
IDs
CVE-2019-1010022 CVE-2019-1010023 CVE-2023-31486 CVE-2018-20796 CVE-2019-9192 CVE-2018-5709 CVE-2018-6951 CVE-2018-6829 CVE-2018-6952 CVE-2017-17740 CVE-2015-3276 CVE-2011-4116 CVE-2022-24975 CVE-2020-36325
Description
These vulnerabilities are showing up in many rootio images that did not appear in the original image. These all look to be old vulnerabilities that have been marked as false positives in someway by Debian, but are now being surfaced in our images.
Reproduction Steps
Target
Container Image
Scanner
Vulnerability
Target OS
Debian: Bookworm (rootio)
Debug Output
Version
Checklist
-f json
that shows data sources and confirmed that the security advisory in data sources was correctBeta Was this translation helpful? Give feedback.
All reactions