-
Notifications
You must be signed in to change notification settings - Fork 574
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
GHSA's present but CVE's missing from output #1660
Comments
Hi, we turned off CPE-based matching in grype by default to reduce the high number of false positive results for the default experience. See https://anchore.com/blog/say-goodbye-to-false-positives/ for more details on that change. If what you want is just to pivot to seeing the CVE id by default rather than the GHSA, then you can pass the If you want to return to doing exhaustive searching based on CPE and are prepared to handle the false positives that will introduce, you can return fully to the previous matching behaviour by setting the following in config or via env vars
|
Excellent, that is exactly what I was looking for. Sorry I missed it in the docs. |
I'm closing this issue, since I think it's resolved by passing |
What happened:
I get output like
but no CVE's are listed in report.
What you expected to happen:
The first one, GHSA-hr8g-6v94-x4m9, should also be listed as CVE-2023-33201; if I only get one, I'd rather have the CVE's
How to reproduce it (as minimally and precisely as possible):
Approach is to apply grype to an existing generated via syft: ./syft scan dir:$dir --output syft-json=$key.syft-json followed by grype sbom:syft-json/$key.json --file grype/$key.txt
Anything else we need to know?:
Condition has been existing since at least Nov 2023, but CVE's were present in Sep 2023. No change to how the scans were taken since 2022, but have updated syft/grype regularly.
Environment:
The text was updated successfully, but these errors were encountered: