Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Trivy scan shows critical vulnerability with snakeyaml #1520

Closed
henson-to-partior opened this issue Mar 30, 2023 · 2 comments
Closed

Trivy scan shows critical vulnerability with snakeyaml #1520

henson-to-partior opened this issue Mar 30, 2023 · 2 comments

Comments

@henson-to-partior
Copy link

henson-to-partior commented Mar 30, 2023

Our image is using Tessera 22.10.1 and during our Trivy Scan it generated a bug report

Package: org.yaml:snakeyaml
Installed Version: 1.33
Vulnerability CVE-2022-1471
Severity: CRITICAL
Fixed Version: 2.0
Link: [CVE-2022-1471 (https://avd.aquasec.com/nvd/cve-2022-1471)](https://avd.aquasec.com/nvd/cve-2022-1471)

Impacted artifact(s): 
tessera/lib/snakeyaml-1.33.jar (from Line: 1 to 1)

I did a git pull of the latest Tesera build (23.4) just now and saw that it is still using snakeyaml 1.33

@henson-to-partior
Copy link
Author

I did a grep and saw that the cve was actually added to the ignore list. Would it be possible to get a reason for this as I wasn't able to see why this was classified as False Positive.

@macfarla
Copy link
Contributor

#1512

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants