Replies: 3 comments
-
Hi @kiwiz ! I scanned your pom.xml and I didn't have any problems: trivy filesystem pom.xml --scanners vuln -d
2023-09-06T11:54:19.721+0700 DEBUG Severities: ["UNKNOWN" "LOW" "MEDIUM" "HIGH" "CRITICAL"]
2023-09-06T11:54:19.722+0700 DEBUG Ignore statuses {"statuses": null}
2023-09-06T11:54:19.753+0700 DEBUG cache dir: /Users/tososomaru/Library/Caches/trivy
2023-09-06T11:54:19.753+0700 DEBUG DB update was skipped because the local DB is the latest
2023-09-06T11:54:19.753+0700 DEBUG DB Schema: 2, UpdatedAt: 2023-09-06 00:18:07.72565789 +0000 UTC, NextUpdate: 2023-09-06 06:18:07.72565749 +0000 UTC, DownloadedAt: 2023-09-06 04:50:56.531946 +0000 UTC
2023-09-06T11:54:19.753+0700 DEBUG Module dir: /Users/tososomaru/.trivy/modules
2023-09-06T11:54:19.753+0700 INFO Vulnerability scanning is enabled
2023-09-06T11:54:19.753+0700 DEBUG Vulnerability type: [os library]
2023-09-06T11:54:19.753+0700 DEBUG Walk the file tree rooted at 'pom.xml' in parallel
2023-09-06T11:54:19.753+0700 DEBUG Resolving com.google.inject:guice:4.2.3...
2023-09-06T11:54:19.754+0700 DEBUG Start parent: com.google.inject:guice-parent:4.2.3
2023-09-06T11:54:19.755+0700 DEBUG Start parent: com.google:google:5
2023-09-06T11:54:19.755+0700 DEBUG Exit parent: com.google:google:5
2023-09-06T11:54:19.755+0700 DEBUG Exit parent: com.google.inject:guice-parent:4.2.3
2023-09-06T11:54:19.755+0700 DEBUG Resolving javax.inject:javax.inject:1...
2023-09-06T11:54:19.755+0700 DEBUG Resolving aopalliance:aopalliance:1.0...
2023-09-06T11:54:19.755+0700 DEBUG Resolving com.google.guava:guava:27.1-jre...
2023-09-06T11:54:19.755+0700 DEBUG Start parent: com.google.guava:guava-parent:27.1-jre
2023-09-06T11:54:19.756+0700 DEBUG Start parent: org.sonatype.oss:oss-parent:9
2023-09-06T11:54:19.756+0700 DEBUG Exit parent: org.sonatype.oss:oss-parent:9
2023-09-06T11:54:19.756+0700 DEBUG Exit parent: com.google.guava:guava-parent:27.1-jre
2023-09-06T11:54:19.756+0700 DEBUG Resolving com.google.guava:failureaccess:1.0.1...
2023-09-06T11:54:19.756+0700 DEBUG Start parent: com.google.guava:guava-parent:26.0-android
2023-09-06T11:54:19.756+0700 DEBUG Start parent: org.sonatype.oss:oss-parent:9
2023-09-06T11:54:19.756+0700 DEBUG Exit parent: org.sonatype.oss:oss-parent:9
2023-09-06T11:54:19.756+0700 DEBUG Exit parent: com.google.guava:guava-parent:26.0-android
2023-09-06T11:54:19.756+0700 DEBUG Resolving com.google.guava:listenablefuture:9999.0-empty-to-avoid-conflict-with-guava...
2023-09-06T11:54:19.757+0700 DEBUG Start parent: com.google.guava:guava-parent:26.0-android
2023-09-06T11:54:19.757+0700 DEBUG Exit parent: com.google.guava:guava-parent:26.0-android
2023-09-06T11:54:19.757+0700 DEBUG Resolving com.google.code.findbugs:jsr305:3.0.2...
2023-09-06T11:54:19.757+0700 DEBUG Start parent: org.sonatype.oss:oss-parent:7
2023-09-06T11:54:19.757+0700 DEBUG Exit parent: org.sonatype.oss:oss-parent:7
2023-09-06T11:54:19.757+0700 DEBUG Resolving org.checkerframework:checker-qual:2.5.2...
2023-09-06T11:54:19.757+0700 DEBUG Resolving com.google.errorprone:error_prone_annotations:2.2.0...
2023-09-06T11:54:19.757+0700 DEBUG Start parent: com.google.errorprone:error_prone_parent:2.2.0
2023-09-06T11:54:19.757+0700 DEBUG Start parent: org.sonatype.oss:oss-parent:7
2023-09-06T11:54:19.757+0700 DEBUG Exit parent: org.sonatype.oss:oss-parent:7
2023-09-06T11:54:19.757+0700 DEBUG Exit parent: com.google.errorprone:error_prone_parent:2.2.0
2023-09-06T11:54:19.757+0700 DEBUG Resolving com.google.j2objc:j2objc-annotations:1.1...
2023-09-06T11:54:19.757+0700 DEBUG Start parent: org.sonatype.oss:oss-parent:7
2023-09-06T11:54:19.757+0700 DEBUG Exit parent: org.sonatype.oss:oss-parent:7
2023-09-06T11:54:19.757+0700 DEBUG Resolving org.codehaus.mojo:animal-sniffer-annotations:1.17...
2023-09-06T11:54:19.757+0700 DEBUG Start parent: org.codehaus.mojo:animal-sniffer-parent:1.17
2023-09-06T11:54:19.757+0700 DEBUG Start parent: org.codehaus.mojo:mojo-parent:40
2023-09-06T11:54:19.758+0700 DEBUG Exit parent: org.codehaus.mojo:mojo-parent:40
2023-09-06T11:54:19.758+0700 DEBUG Exit parent: org.codehaus.mojo:animal-sniffer-parent:1.17
2023-09-06T11:54:19.774+0700 DEBUG OS is not detected.
2023-09-06T11:54:19.774+0700 DEBUG Detected OS: unknown
2023-09-06T11:54:19.774+0700 INFO Number of language-specific files: 1
2023-09-06T11:54:19.774+0700 INFO Detecting pom vulnerabilities...
2023-09-06T11:54:19.774+0700 DEBUG Detecting library vulnerabilities, type: pom, path: pom.xml
pom.xml (pom)
Total: 2 (UNKNOWN: 0, LOW: 1, MEDIUM: 0, HIGH: 1, CRITICAL: 0)
┌────────────────────────┬───────────────┬──────────┬────────┬───────────────────┬───────────────┬──────────────────────────────────────────────────────────────┐
│ Library │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │ Title │
├────────────────────────┼───────────────┼──────────┼────────┼───────────────────┼───────────────┼──────────────────────────────────────────────────────────────┤
│ com.google.guava:guava │ CVE-2023-2976 │ HIGH │ fixed │ 27.1-jre │ 32.0.0 │ insecure temporary directory creation │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2023-2976 │
│ ├───────────────┼──────────┤ │ ├───────────────┼──────────────────────────────────────────────────────────────┤
│ │ CVE-2020-8908 │ LOW │ │ │ 30.0 │ local information disclosure via temporary directory created │
│ │ │ │ │ │ │ with unsafe permissions │
│ │ │ │ │ │ │ https://avd.aquasec.com/nvd/cve-2020-8908 │
└────────────────────────┴───────────────┴──────────┴────────┴───────────────────┴───────────────┴──────────────────────────────────────────────────────────────┘ |
Beta Was this translation helpful? Give feedback.
0 replies
-
Thanks for the fast response! I can confirm this doesn't happen on a different host or with the image, so it's something specific to my environment. |
Beta Was this translation helpful? Give feedback.
0 replies
-
Found it - there was a bad entry in my cache ( |
Beta Was this translation helpful? Give feedback.
0 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Description
Trivy fails to correctly scan the
pom.xml
included in the Reproduction Steps.Desired Behavior
The scan should finish/not loop forever.
Actual Behavior
The scan recurses infinitely and eventually triggers a Stack overflow.
Reproduction Steps
Target
Filesystem
Scanner
Vulnerability
Output Format
SARIF
Mode
Standalone
Debug Output
Operating System
macOS Ventura
Version
Checklist
trivy image --reset
Beta Was this translation helpful? Give feedback.
All reactions