-
-
Notifications
You must be signed in to change notification settings - Fork 607
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
'Enable fuzzy CPE matching' options lead to I/O Exception in the FuzzyVulnerableSoftwareSearchManager #2104
Comments
I upgraded from 4.5 to 4.6.2 and am seeing this error in the log as well. Although, I haven't noticed any missing vulnerabilities after I enabled the new fuzzy matching options. |
Hi proteus-russ, thank you for prompt confirmation! Concerning the difference that the FuzzyVulnerableSoftwareSearchManager makes, kindly see the examples below. I downloaded the image with 4.5.0 and compared the results with 4.6.2, using two very simple projects. This is how you can easily reproduce it. Without using the Fuzzy Logic the system will not find any vulnerability; the Tracker does need Fuzzy Logic to locate the correct package in this case. As a result, v.4.6.2 finds nothing. and if we add a component with the following PURL pkg:pypi/[email protected], v 4.5.0 will find 29 vulnerabilities. |
All in all, I wanted to emphasize, how important the Fuzzy Logic module is; it would be great if we could use it again.... |
Also having these errors on v4.6.1 |
@officerNordberg Ever ran into this before? |
We are using v4.6.2 and FuzzyMatchingEnabled with no errors that I can see. My suggestion would be to stop the server and delete your VulnerableSoftwareIndex. Restart it and make sure the indexer completes before restarting or testing again. This takes a long time. I've corrupted the index by doing successive reboots before it has completed. I've noted here #1641 my frustration with the Indexer. We found and fixed threading issues it had a couple releases ago but I still think there are problems with the implementation overall. It is not resilient and can get itself into stuck states that seem to only be fixed by a manual deletion. I'm no Lucene expert so I'm not sure how to improve this without all sorts of health checks and/or automatically rebuilding the index whenever exceptions like this are caught. It is very frustrating when you can't find a record that you know is in the database because the query is not SQL and goes against Lucene instead. DO NOT TRY THIS WITHOUT A BACKUP OF THE INDEX FOLDER, reindexing appears to be broken
|
Hi officerNordberg, Could you try it once again, enable the internal analyzer and set ALL the three 'Fuzzy' options ON?
|
The reindex events are dispatched in DefaultObjectGenerator prior to the Event system initialization.
DefaultObjectGenerator's reindex events are getting dropped. I'm never seeing this line executed in any of the Indexers. LOGGER.info("Starting reindex task. This may take some time."); It used to come before the DefaultObjectGenerator
@AndrewR777 you'll still need to reindex your server but that can't happen until this is resolved. Maybe an admin feature to trigger a reindex through the UI might be useful down the road as well. |
@syalioune can you describe why this change was needed? |
@officerNordberg Thanks for investigating. I think the change was necessary because Perhaps it makes sense to move the initialization of default config properties into its own class, and switch the order of |
That's exactly the reason. However that was maybe a bit strict since the default values can be derived from the enum
Maybe create a distinct
Totally agree. |
See DependencyTrack/dependency-track#2104 Signed-off-by: Alioune SY <[email protected]>
See DependencyTrack/dependency-track#2104 Signed-off-by: Alioune SY <[email protected]>
…d listener A REST API is also exposed to allow index rebuild through the GUI. See DependencyTrack#2104 Automatic periodic consistency check with database are performed if enabled Signed-off-by: Alioune SY <[email protected]>
* Feature: Enable lucene index rebuild through UI See DependencyTrack/dependency-track#2104 Signed-off-by: Alioune SY <[email protected]> * Feature: Enable lucene index rebuild through UI See DependencyTrack/dependency-track#2104 Signed-off-by: Alioune SY <[email protected]> * Fix: Restoring lucene index build during startup by having a dedicated listener Takint into account review comments Signed-off-by: Alioune SY <[email protected]> Signed-off-by: Alioune SY <[email protected]>
…dencyTrack#2200) * Fix: Restoring lucene index build during startup by having a dedicated listener A REST API is also exposed to allow index rebuild through the GUI. See DependencyTrack#2104 Automatic periodic consistency check with database are performed if enabled Signed-off-by: Alioune SY <[email protected]> * Fix: Restoring lucene index build during startup by having a dedicated listener Takint into account review comments Signed-off-by: Alioune SY <[email protected]> * Fix: Restoring lucene index build during startup by having a dedicated listener Fixing unit tests. Signed-off-by: Alioune SY <[email protected]> Signed-off-by: Alioune SY <[email protected]> Fixes DependencyTrack#2104 Signed-off-by: mulder999 <[email protected]>
This thread has been automatically locked since there has not been any recent activity after it was closed. Please open a new issue for related bugs. |
…dencyTrack#2200) * Fix: Restoring lucene index build during startup by having a dedicated listener A REST API is also exposed to allow index rebuild through the GUI. See DependencyTrack#2104 Automatic periodic consistency check with database are performed if enabled Signed-off-by: Alioune SY <[email protected]> * Fix: Restoring lucene index build during startup by having a dedicated listener Takint into account review comments Signed-off-by: Alioune SY <[email protected]> * Fix: Restoring lucene index build during startup by having a dedicated listener Fixing unit tests. Signed-off-by: Alioune SY <[email protected]> Signed-off-by: Alioune SY <[email protected]> Fixes DependencyTrack#2104
Selecting 'Enable fuzzy CPE matching' options leads to I/O Exception in the FuzzyVulnerableSoftwareSearchManager
Steps to Reproduce:
One may reproduce the error on a clean install.
I used Ubuntu 22.04 clean image with 30 GB HDD and 16 GB RAM.
I started as a sudo user and switched to root:
sudo -i
Than I installed Docker:
and the latest (4.6.2) version of Dependency Track:
I opened Administration -> Analyzers -> Internal and ticked all 3 'Enable fuzzy CPE matching' checkboxes.
Now one can upload a SBOM file and inspect the log file (dependency-track.log):
Additional Details:
As a result of this error a number of vulnerabilities are not found.
See the log file in attachment.
dependency-track.log
The text was updated successfully, but these errors were encountered: