-
Notifications
You must be signed in to change notification settings - Fork 2.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Detect vulnerabilities of the main software in the image #481
Comments
How about allowing the user to manually provide a list of installed software, maybe as a complement to the list generated by the automatic detection? See proposal in #293. |
This would be a very nice addition, either by just letting us place a formatted file somewhere inside the image in question or by just scanning it directly with Trivy. Is there any work being done on a feature like this? |
I have a related issue that could be solved if Trivy could scan dynamic/static links on .so and .a files and imports from header files. Is it possible? |
Not sure if it is possible, but if it is, that would be gold worth! :) |
@knqyf263 is this feature planned to be in Trivy's roadmap? This seems to be an important feature to have, at least IMO. I'm willing to help implement this in my free time if some guidance is provided. |
* fix: Fix Windows support Signed-off-by: Liam Galvin <liam.galvin@aquasec.com> * Update writable.go * Update writable_windows.go
Reading through some of the other tickets it appears binary scanning is part of a commercial license and there are no plans to merge this into the open source version. I could not find a working solution with SBOM either so as a workaround we're toying with adding entries to the distro package database. The caveats are that the software should be available on the image source distribution, the versions should match distro versioning and the distro needs to publish security advisories for the package.
|
Currently, Trivy detects vulnerabilities of packages installed by package manager such as
yum
andapt-get
. But the main software in the image is usually installed bymake install
.For example,
redis
binary inredis:5.0
is installed bymake install
.https://github.com/docker-library/redis/blob/d3a0f3d95ac768db44dbcb87ecf88cfc436581d5/5.0/Dockerfile#L64
Apach HTTP Server in
httpd:2.4
is installed bymake install
.https://github.com/docker-library/httpd/blob/6c8e82e20ecefc94c616439f15d14c4bb215b200/2.4/Dockerfile#L131
The problem is that their versioning is different from the versioning of Linux distributions such as Debian and Red Hat. It means we need to use another vulnerability source to detect vulnerabilities. We probably can use NVD and CPE for the purpose, but it is not easy since we have to convert
redis
tocpe:2.3:a:redislabs:redis:*:*:*:*:*:*:*:*
. For now, it looks difficult to convert it automatically and accurately. There are a lot of products out there with similar names.The text was updated successfully, but these errors were encountered: