Replies: 1 comment 2 replies
-
Thanks for your report. Created #9100 |
Beta Was this translation helpful? Give feedback.
2 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
Description
Epoch's are not parsed from RPM entries in
/var/lib/rpmmanifest/container-manifest-2
.I'm writing a container build tool which creates this file so that scanners can detect the contents. The parsing of this file, added for azure linux, assumes epoch's are all zero. This is also not the case as in azure linux 3.0 some packages have epochs (e.g ca-certificates-*).
Desired Behavior
Trivy to detect non-zero epochs from
/var/lib/rpmmanifest/container-manifest-2
.Actual Behavior
Epoch's are never read from this file, resulting in false positive vulnerabilities and epoch's missing from package urls.
Reproduction Steps
1. `trivy image tofay/gnoci-curl:almalinux`. This scans an example image I pushed. Trivy successfully detects that alma linux packages are included. 2. observe openssl vulnerabilities present due to trivy not reading the epoch
Target
Container Image
Scanner
Vulnerability
Output Format
Table
Mode
Standalone
Debug Output
Operating System
Ubuntu 24.04
Version
Checklist
trivy clean --all
Beta Was this translation helpful? Give feedback.
All reactions