not detecting vulnerabilities conan.lock file #7445
Replies: 1 comment
-
Hello @SemProvoost ➜ cat conan.lock
{
"version": "0.5",
"requires": [
"zlib/1.2.11#fca992a7d96a1b92bd956caa8a97d18f%1705999194.642",
"openssl/3.0.1w#a8f0792d7c5121b954578a7149d23e03%1717541485.78"
],
"build_requires": [],
"python_requires": [],
"config_requires": []
}
➜ trivy -q fs ./conan.lock
conan.lock (conan)
Total: 31 (UNKNOWN: 0, LOW: 0, MEDIUM: 14, HIGH: 15, CRITICAL: 2) We use GitLab advisory database (see https://aquasecurity.github.io/trivy/v0.55/docs/scanner/vulnerability/#data-sources_1)
This page contains 2 CVEs (CVE-2024-2511 and CVE-2024-0727). You can create an issue/PR in GitLab to add these vulnerabilities Regards, Dmitriy |
Beta Was this translation helpful? Give feedback.
-
Description
For conan.lock files: Trivy does not seem to detect vulnerabilities when the version is not a semver. Specifically example here for
openssl 1.1.1w
.Desired Behavior
In the example in reproduction steps, trivy does not detect any CVE. I would at least expect
CVE-2024-0727
in there for the openssl package here. 😁Page with CVE for
openssl 1.1.1w
here: https://www.cvedetails.com/vulnerability-list/vendor_id-217/product_id-383/version_id-1657305/year-2024/opdos-1/Openssl-Openssl-1.1.1w.htmlOther scanners do seem to detect this vulnerability.
Actual Behavior
No vulnerabilities are found.
Reproduction Steps
Target
Git Repository
Scanner
Vulnerability
Output Format
JSON
Mode
Standalone
Debug Output
Operating System
macOS 13.3.1
Version
Checklist
trivy clean --all
Beta Was this translation helpful? Give feedback.
All reactions