-
Notifications
You must be signed in to change notification settings - Fork 377
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Outdated, fixed vulnerabilities are still being reported for new Debian packages #1556
Comments
Thank you for the report! @hogo6002 can you please take a look at this? |
Hi @joell CVE-2023-6129 has two Debian records: one for Debian:12 and one for Debian:13. Because we are querying the |
Even if we hardcode the osv.dev side to only query against |
I think this issue might be fixed in osv-scanner v2, because when scanning dpkg-status, we also check the OS version in We likely want to figure out a way for users to pass in the Debian/Alpine/Ubuntu... release versions when scanning OS package files. |
+1. Our first V2 beta is here: https://github.com/google/osv-scanner/releases/tag/v2.0.0-beta1 |
@another-rex: Yes, when I test with osv-scanner v2-beta1 running inside a Debian 12 container, it correctly outputs only CVE-2024-13176. However, as you suspected the
Adding an option to accompany |
Good idea, created #1565 to track this feature. |
Recently,
osv-scanner
has started reporting old, fixed vulnerabilities for new Debian packages.Here is a quickly reproducible example using the
openssl
package from Debian 12:Taking the first reported vulnerability, when looking up CVE-2023-6129 it shows that under Debian 12 this vulnerability was fixed in version
3.0.13-1~deb12u1
. Since we are scanning on version3.0.15-1~deb12u1
this vulnerability shouldn't apply. Yet it is still being reported.The text was updated successfully, but these errors were encountered: