-
Notifications
You must be signed in to change notification settings - Fork 372
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Scan status
files used by Ubuntu
#1293
Comments
Thanks for filing the issue! CC @hogo6002 @another-rex who are currently working on Ubuntu scanning in the context of container scanning. |
This is actively being worked on! At that point it should work as you expect where both scanning on host in an ubuntu machine, or scanning an ubuntu container image will correctly return ubuntu vulnerabilties. |
That is great to hear! Let me know if you need any extra external testing when it lands! Thank you heaps. |
@another-rex do you have any updates or ETA to share on this issue? |
This took a little longer than expected, but we're gearing up for a beta release of OSV-Scanner V2 this week (it's already usable from HEAD)I! We'll ping this thread as soon as it is. We'd love feedback on making sure the results are accurate! |
@oliverchang that's great news thanks! |
v2.0.0-beta1 has been released. Please see https://osv.dev/blog/posts/osv-scanner-v2-beta1-is-ready/ |
Description
With the large amount of OSV data from Ubuntu on osv.dev, is there a plan to support
/var/lib/dpkg/status
"lockfiles" on Ubuntu?For example, using this simplified
/var/lib/dpkg/status
file on a Debian 12 host:we receive the following vulnerability report when running
$ osv-scanner scan --lockfile 'dpkg-status:/var/lib/dpkg/status'
:But when we run an equivalent scan on an Ubuntu 24.04 host with the following simplified
/var/lib/dpkg/status
file:we receive:
What I would like to retrieve is a report like:
Is this functionality able to integrated into osv-scanner?
To Reproduce
Steps to reproduce the behaviour:
Run the commands above and check the output.
Expected behaviour
The following data should be retrieved:
https://osv.dev/vulnerability/UBUNTU-CVE-2024-28882
cc: @dodys
The text was updated successfully, but these errors were encountered: