-
Notifications
You must be signed in to change notification settings - Fork 571
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Java packages sometimes missing version information #504
Comments
Thanks @ahrycej! It looks like we're surfacing packages without a version. Here's the Grype JSON for a scan I just ran on This needs more investigation. cc: @wagoodman |
I'm running tomcat 10.0.14 and seeing false positives. grype dir:/java/tomcat --scope all-layerstomcat-jdbc CVE-2000-1210 Medium |
for us the issue is that we dont use the package manager when adding tomcat and version is not present. For our tomcat version that is 8.5.72 these are all false positive. I had a case open with anchore enterprise. Regards. Anna |
I tracked this down to the |
@kzantow Just for my understanding, is that fix handling the missing versions, or additionally this request below?
|
What happened:
Anchore Enterprise finds vulnerabilities in docker image in tomcat-jdbc.jar (docker image with tomcat 8.5.72)
Grype finds vulnerabilities in docker image in tomcat-jdbc.jar
No version reported
What you expected to happen:
Officially disputed vulnerabilities or vulnerabilities with no CVSS score in the e.g. NIST database or sw provider score are not listed or at least marked. Example: CVE-2013-2185
Fuzzy match -> is it working? We have latest tomcat 8.5.72 -> how grype matches the vulnerabilities, we dont understand what is behind the method
How to reproduce it (as minimally and precisely as possible):
run anchore and/or grype
using
https://hub.docker.com/_/tomcat?tab=tags&page=1&name=8.5.72
Anything else we need to know?:
Environment:
We run it in our own mirroring repo as we do not have direct access to dockerhub. Mirror is up to date.
Part of the output:
The text was updated successfully, but these errors were encountered: