-
Notifications
You must be signed in to change notification settings - Fork 601
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
False Positive for pkg:gem/[email protected] CVE-2022-29631 #921
Comments
Hi @ben-elttam, thanks for reporting this! I'm trying to reproduce it, but I haven't been able to. Here's what I've tried:
which prints But we can see that syft is finding some packages, since
If you believe this is still an issue, could you please provide a link to a public artifact that exhibits this false positive? For example, a public container image or git repository, or a Dockerfile or script that will produce an artifact that exhibits this false positive? Thanks! |
@willmurphyscode thanks for looking into this, I've updated the OP to include more details on how to reproduce this, including the full contents of the I'll hazard a guess that the problem is related to using the CPE |
I removed the sbom2.json: {
"artifacts": [
{
"id": "ae4c21b898bad8f6",
"name": "http",
"version": "5.1.0",
"type": "gem",
"foundBy": "ruby-gemfile-cataloger",
"locations": [
{
"path": "Gemfile.lock"
}
],
"licenses": [],
"language": "ruby",
"purl": "pkg:gem/[email protected]"
}
],
"source": {
"id": "cdb4ee2aea69cc6a83331bbe96dc2caa9a299d21329efb0336fc02a82e1839a8",
"type": "directory",
"target": "."
},
"schema": {
"version": "7.0.1",
"url": "https://raw.githubusercontent.com/anchore/syft/main/schema/json/schema-7.0.1.json"
}
} Running without
|
Hi @ben-elttam, do know what version of Syft generated the SBOM with I've tried re-generating the SBOM, and I can't get it to re-generate. Here's what I tried:
This doesn't produce any output:
Are you able to get syft or grype to generate the overly broad Edit: I believe this was fixed by anchore/syft#1647. Please feel free to comment if you believe there's still something here we should investigate. |
The SBOM with Thanks for investigating. With Syft no longer producing SBOMs with wildcard CPEs, grype will no longer match vulnerabilities from other ecosystems. |
What happened:
False Positive for CVE-2022-29631
oblac/jodd-http#9
Which is Java not Ruby, and
jodd-http
vshttp
What you expected to happen:
No vulnerability reported
How to reproduce it (as minimally and precisely as possible):
Gemfile.lock
withhttp (5.1.0)
Gemfile.lock
:Produce sbom with
syft
:syft . -o json=sbom.json
Minimised Syft
sbom.json
:Reproduce grype reporting CVE-2022-29631 false positive:
Anything else we need to know?:
Environment:
grype version
:I have reproduced on v0.49.0 (latest when first reported) and v0.62.3 (latest at as of now 2023-06-14)
cat /etc/os-release
or similar):The text was updated successfully, but these errors were encountered: