Replies: 2 comments 1 reply
-
|
To complement, not even Trivy itself can properly parse the generated JSON report that has the invalid By using the following test code: package main
import (
"encoding/json"
"fmt"
"os"
trivyTypes "github.com/aquasecurity/trivy/pkg/types"
)
func main() {
f, err := os.ReadFile("output.json")
if err != nil {
fmt.Println("failed to read file")
fmt.Println(err)
os.Exit(1)
}
var trivyReport trivyTypes.Report
if err = json.Unmarshal(f, &trivyReport); err != nil {
fmt.Println("failed to parse Trivy report")
fmt.Println(err)
os.Exit(1)
}
}And then running it on the report - The error comes from Lines 84 to 86 in 4a2be6b |
Beta Was this translation helpful? Give feedback.
-
|
Hello @macedogm This issue relates to the That’s why Trivy builds an incorrect SBOM file and suppresses vulnerabilities for these packages. I also created #9465 to fix a mistake in the VEX code. Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
Uh oh!
There was an error while loading. Please reload this page.
Uh oh!
There was an error while loading. Please reload this page.
-
Description
When using a VEX report on an image, some CVEs can be wrongly filtered out. If a JSON output is used, it will contain an empty and invalid
ExperimentalModifiedFindings[]:The filtered out CVEs are also wrongly missing from the default's table output.
Desired Behavior
CVEs that are not inside a VEX report must not be filtered out.
Actual Behavior
CVEs that are not inside a VEX are being suppressed and filtered out.
Reproduction Steps
Target
Container Image
Scanner
Vulnerability
Output Format
JSON
Mode
Standalone
Debug Output
Operating System
openSUSE Tumbleweed-Slowroll
Version
Checklist
trivy clean --allBeta Was this translation helpful? Give feedback.
All reactions