Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Possible False Positive for CVE-2016-1000027 #879

Closed
pin392 opened this issue Aug 16, 2022 · 2 comments
Closed

Possible False Positive for CVE-2016-1000027 #879

pin392 opened this issue Aug 16, 2022 · 2 comments
Labels
bug Something isn't working changelog-ignore Don't include this issue in the release changelog false-positive

Comments

@pin392
Copy link

pin392 commented Aug 16, 2022

What happened:
I checked my docker image with syft and grype. The following vulnerability was reported:
spring-core 5.3.15 java-archive CVE-2016-1000027 Critical

What you expected to happen:
If I understabd it correct this is not an vulnerability of spring core. It is based on deserialization of untrusted data in Java as stated here: spring-projects/spring-framework#24434 (comment)

How to reproduce it (as minimally and precisely as possible):
Use spring-boot-starter 2.5.9

Anything else we need to know?:

Environment:
Application: grype
Version: 0.46.0
Syft Version: v0.53.4
BuildDate: 2022-08-04T14:48:21Z
GitCommit: c755c73
GitDescription: v0.46.0
Platform: linux/amd64
GoVersion: go1.18.4
Compiler: gc
Supported DB Schema: 4

@pin392 pin392 added the bug Something isn't working label Aug 16, 2022
@spiffcs spiffcs added this to OSS Aug 24, 2022
@spiffcs spiffcs moved this to False Positives in OSS Aug 25, 2022
@wagoodman wagoodman changed the title Possible False Positive for 1000027 Possible False Positive for CVE-2016-1000027 Aug 26, 2022
@ThomasVitale
Copy link

This is a duplicate of #773

@wagoodman wagoodman removed the status in OSS Apr 6, 2023
@tgerla tgerla added the changelog-ignore Don't include this issue in the release changelog label Nov 17, 2023
@tgerla
Copy link
Contributor

tgerla commented Nov 17, 2023

This class of problems should be fixed now that we have adjusted our vulnerability matching method as described here: https://anchore.com/blog/say-goodbye-to-false-positives/ -- I'll go ahead and close this issue but please feel free to re-open if you find more false positives, or if this one is still affecting your images. Thanks!

@tgerla tgerla closed this as completed Nov 17, 2023
@github-project-automation github-project-automation bot moved this to Done in OSS Nov 17, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working changelog-ignore Don't include this issue in the release changelog false-positive
Projects
Archived in project
Development

No branches or pull requests

4 participants