Skip to content

Trivy detect false positive vunerabilities about jetty ? #7767

Closed Answered by DmitriyLewen
sbernard31 asked this question in Q&A
Discussion options

You must be logged in to vote

I found a problem!

Your pom.xml file contains extra space prefix:

➜ cat pom.xml | grep 9.4.56.v20240826
        <jetty.version> 9.4.56.v20240826</jetty.version>

That's why the version comparison is not working correctly.
We fixed this problem in #7747
Trivy from main branch works correctly:

➜ ./trivy -q fs ./pom.xml

pom.xml (pom)

Total: 1 (UNKNOWN: 0, LOW: 1, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

┌──────────────────────────────┬───────────────┬──────────┬────────┬───────────────────┬───────────────┬───────────────────────────────────────────────────────────┐
│           Library            │ Vulnerability │ Severity │ Status │ Installed Version │ Fixed Version │                           Ti…

Replies: 2 comments 6 replies

Comment options

You must be logged in to vote
6 replies
@DmitriyLewen
Comment options

@sbernard31
Comment options

@DmitriyLewen
Comment options

@DmitriyLewen
Comment options

Answer selected by DmitriyLewen
@sbernard31
Comment options

Comment options

You must be logged in to vote
0 replies
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
scan/vulnerability Issues relating to vulnerability scanning
2 participants