Filter Vulnerabilities

    Result

    1. 2019-05-16T12:49:52.656+0900 INFO Updating vulnerability database...
    2. 2019-05-16T12:50:14.786+0900 INFO Detecting Debian vulnerabilities...
    3. ruby:2.4.0 (debian 8.7)
    4. =======================
    5. Total: 4730 (UNKNOWN: 1, LOW: 145, MEDIUM: 3487, HIGH: 1014, CRITICAL: 83)
    6. +------------------------------+------------------+----------+----------------------------+----------------------------------+-----------------------------------------------------+
    7. | LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE |
    8. +------------------------------+------------------+----------+----------------------------+----------------------------------+-----------------------------------------------------+
    9. | apt | CVE-2019-3462 | CRITICAL | 1.0.9.8.3 | 1.0.9.8.5 | Incorrect sanitation of the |
    10. | | | | | | 302 redirect field in HTTP |
    11. | | | | | | transport method of... |
    12. + +------------------+----------+ +----------------------------------+-----------------------------------------------------+
    13. | | CVE-2016-1252 | MEDIUM | | 1.0.9.8.4 | The apt package in Debian |
    14. | | | | | | jessie before 1.0.9.8.4, in |
    15. | | | | | | Debian unstable before... |
    16. +------------------------------+------------------+----------+----------------------------+----------------------------------+-----------------------------------------------------+
    17. | bash | CVE-2019-9924 | HIGH | 4.3-11 | 4.3-11+deb8u2 | bash: BASH_CMD is writable in |
    18. | | | | | | restricted bash shells |
    19. + +------------------+ + +----------------------------------+-----------------------------------------------------+
    20. | | CVE-2016-7543 | | | 4.3-11+deb8u1 | bash: Specially crafted |
    21. | | | | | | SHELLOPTS+PS4 variables allows |
    22. | | | | | | command substitution |
    23. + +------------------+----------+ + +-----------------------------------------------------+
    24. | | CVE-2016-0634 | MEDIUM | | | bash: Arbitrary code execution |
    25. | | | | | | via malicious hostname |
    26. + +------------------+----------+ +----------------------------------+-----------------------------------------------------+
    27. | | CVE-2016-9401 | LOW | | 4.3-11+deb8u2 | bash: popd controlled free |
    28. +------------------------------+------------------+----------+----------------------------+----------------------------------+-----------------------------------------------------+
    29. ...

    Use --severity option.

    1. $ trivy image --severity HIGH,CRITICAL ruby:2.4.0

    Result

    1. $ cat .trivyignore
    2. # Accept the risk
    3. CVE-2018-14618
    4. # No impact in our settings
    5. CVE-2019-1543
    6. $ trivy image python:3.4-alpine3.9

    Result

    1. 2019-05-16T12:53:10.076+0900 INFO Updating vulnerability database...
    2. 2019-05-16T12:53:28.134+0900 INFO Detecting Alpine vulnerabilities...
    3. python:3.4-alpine3.9 (alpine 3.9.2)
    4. ===================================
    5. Total: 0 (UNKNOWN: 0, LOW: 0, MEDIUM: 0, HIGH: 0, CRITICAL: 0)

    Use --vuln-type option.

    Available values: - library - os

    1. 2019-05-22T19:36:50.530+0200 INFO Updating vulnerability database...
    2. 2019-05-22T19:36:51.681+0200 INFO Detecting Alpine vulnerabilities...
    3. 2019-05-22T19:36:51.685+0200 INFO Updating npm Security DB...
    4. 2019-05-22T19:36:52.389+0200 INFO Detecting npm vulnerabilities...
    5. 2019-05-22T19:36:52.390+0200 INFO Updating pipenv Security DB...
    6. Total: 4751 (UNKNOWN: 1, LOW: 150, MEDIUM: 3504, HIGH: 1013, CRITICAL: 83)
    7. +---------+------------------+----------+-------------------+---------------+----------------------------------+
    8. | LIBRARY | VULNERABILITY ID | SEVERITY | INSTALLED VERSION | FIXED VERSION | TITLE |
    9. +---------+------------------+----------+-------------------+---------------+----------------------------------+
    10. | curl | CVE-2018-14618 | CRITICAL | 7.61.0-r0 | 7.61.1-r0 | curl: NTLM password overflow |
    11. | | | | | | via integer overflow |
    12. + +------------------+----------+ +---------------+----------------------------------+
    13. | | CVE-2018-16839 | HIGH | | 7.61.1-r1 | curl: Integer overflow leading |
    14. | | | | | | to heap-based buffer overflow in |
    15. | | | | | | Curl_sasl_create_plain_message() |
    16. + +------------------+ + +---------------+----------------------------------+
    17. | | CVE-2019-3822 | | | 7.61.1-r2 | curl: NTLMv2 type-3 header |
    18. | | | | | | stack buffer overflow |
    19. + +------------------+ + +---------------+----------------------------------+
    20. | | CVE-2018-16840 | | | 7.61.1-r1 | curl: Use-after-free when |
    21. | | | | | | closing "easy" handle in |
    22. | | | | | | Curl_close() |
    23. + +------------------+----------+ +---------------+----------------------------------+
    24. | | CVE-2019-3823 | MEDIUM | | 7.61.1-r2 | curl: SMTP end-of-response |
    25. | | | | | | out-of-bounds read |
    26. + +------------------+ + + +----------------------------------+
    27. | | CVE-2018-16890 | | | | curl: NTLM type-2 heap |
    28. | | | | | | out-of-bounds buffer read |
    29. + +------------------+ + +---------------+----------------------------------+
    30. | | CVE-2018-16842 | | | 7.61.1-r1 | curl: Heap-based buffer |
    31. | | | | | | over-read in the curl tool |
    32. | | | | | | warning formatting |
    33. +---------+------------------+----------+-------------------+---------------+----------------------------------+
    34. | git | CVE-2018-17456 | HIGH | 2.15.2-r0 | 2.15.3-r0 | git: arbitrary code execution |
    35. | | | | | | via .gitmodules |
    36. + +------------------+ + + +----------------------------------+
    37. | | CVE-2018-19486 | | | | git: Improper handling of |
    38. | | | | | | PATH allows for commands to be |
    39. | | | | | | executed from... |
    40. +---------+------------------+----------+-------------------+---------------+----------------------------------+
    41. | libssh2 | CVE-2019-3855 | CRITICAL | 1.8.0-r2 | 1.8.1-r0 | libssh2: Integer overflow in |
    42. | | | | | | transport read resulting in |
    43. | | | | | | out of bounds write... |
    44. + +------------------+----------+ + +----------------------------------+
    45. | | CVE-2019-3861 | MEDIUM | | | libssh2: Out-of-bounds reads |
    46. | | | | | | with specially crafted SSH |
    47. | | | | | | packets |
    48. + +------------------+ + + +----------------------------------+
    49. | | CVE-2019-3857 | | | | libssh2: Integer overflow in |
    50. | | | | | | SSH packet processing channel |
    51. | | | | | | resulting in out of... |
    52. + +------------------+ + + +----------------------------------+
    53. | | CVE-2019-3856 | | | | libssh2: Integer overflow in |
    54. | | | | | | keyboard interactive handling |
    55. | | | | | | resulting in out of bounds... |
    56. + +------------------+ + + +----------------------------------+
    57. | | CVE-2019-3863 | | | | libssh2: Integer overflow |
    58. | | | | | | in user authenticate |
    59. | | | | | | out-of-bounds writes |
    60. + +------------------+ + + +----------------------------------+
    61. | | | | | | comparison with specially |
    62. | | | | | | crafted message channel |
    63. | | | | | | request |
    64. + +------------------+ + + +----------------------------------+
    65. | | CVE-2019-3860 | | | | libssh2: Out-of-bounds reads |
    66. | | | | | | with specially crafted SFTP |
    67. | | | | | | packets |
    68. + +------------------+ + + +----------------------------------+
    69. | | CVE-2019-3858 | | | | libssh2: Zero-byte allocation |
    70. | | | | | | with a specially crafted SFTP |
    71. | | | | | | packed leading to an... |
    72. + +------------------+ + + +----------------------------------+
    73. | | CVE-2019-3859 | | | | libssh2: Unchecked use of |
    74. | | | | | | _libssh2_packet_require and |
    75. | | | | | | _libssh2_packet_requirev |
    76. | | | | | | resulting in out-of-bounds |
    77. | | | | | | read |
    78. +---------+------------------+ +-------------------+---------------+----------------------------------+
    79. | libxml2 | CVE-2018-14404 | | 2.9.7-r0 | 2.9.8-r1 | libxml2: NULL pointer |
    80. | | | | | | dereference in |
    81. | | | | | | xpath.c:xmlXPathCompOpEval() |
    82. | | | | | | can allow attackers to cause |
    83. | | | | | | a... |
    84. + +------------------+ + + +----------------------------------+
    85. | | CVE-2018-14567 | | | | libxml2: Infinite loop when |
    86. | | | | | | --with-lzma is used allows for |
    87. | | | | | | denial of service... |
    88. + +------------------+----------+ + +----------------------------------+
    89. | | CVE-2018-9251 | LOW | | | libxml2: infinite loop in |
    90. | | | | | | xz_decomp function in xzlib.c |
    91. +---------+------------------+----------+-------------------+---------------+----------------------------------+
    92. | openssh | CVE-2019-6109 | MEDIUM | 7.5_p1-r9 | 7.5_p1-r10 | openssh: Missing character |
    93. | | | | | | encoding in progress display |
    94. | | | | | | allows for spoofing of scp... |
    95. + +------------------+ + + +----------------------------------+
    96. | | CVE-2019-6111 | | | | openssh: Improper validation |
    97. | | | | | | of object names allows |
    98. | | | | | | malicious server to overwrite |
    99. | | | | | | files... |
    100. + +------------------+----------+ + +----------------------------------+
    101. | | CVE-2018-20685 | LOW | | | openssh: scp client improper |
    102. | | | | | | directory name validation |
    103. +---------+------------------+----------+-------------------+---------------+----------------------------------+
    104. | sqlite | CVE-2018-20346 | MEDIUM | 3.21.0-r1 | 3.25.3-r0 | CVE-2018-20505 CVE-2018-20506 |
    105. | | | | | | sqlite: Multiple flaws in |
    106. | | | | | | sqlite which can be triggered |
    107. | | | | | | via... |
    108. +---------+------------------+----------+-------------------+---------------+----------------------------------+
    109. | tar | CVE-2018-20482 | LOW | 1.29-r1 | 1.31-r0 | tar: Infinite read loop in |
    110. | | | | | | sparse_dump_region function in |
    111. | | | | | | sparse.c |
    112. +---------+------------------+----------+-------------------+---------------+----------------------------------+

    [EXPERIMENTAL] This feature might change without preserving backwards compatibility.

    Trivy supports Open Policy Agent (OPA) to filter vulnerabilities. You can specify a Rego file with --ignore-policy option.

    The Rego package name must be trivy and it must include a rule called ignore which determines if each individual vulnerability should be excluded (ignore=true) or not (ignore=false). In the policy, each vulnerability will be available for inspection as the input variable. The structure of each vulnerability input is the same as for the Trivy JSON output.
    There is a built-in Rego library with helper functions that you can import into your policy using: import data.lib.trivy. For more info about the helper functions, look at the library here

    Result