This repository has been archived by the owner on Jan 6, 2023. It is now read-only.
-
Notifications
You must be signed in to change notification settings - Fork 78
Example for installed packages would be helpful #39
Comments
Hi This isn't how cve-check-tool currently works. It doesn't yet know about installed packages, rather, it deals with source packages and analyses those. However I'm happy to remedy that. |
OK so looking at the new tool, this is some of the output we get about CVE-2014-7187
Please note the glaring absence of 1.0 as per the CVE data. Examining further for 1.0:
No results... To list all known versions of bash as dictated by the National Vulnerability Database:
We can see 1.0 is never listed. Which poses an issue. |
Also note that for this reason the new tool which is being developed in |
Sign up for free
to subscribe to this conversation on GitHub.
Already have an account?
Sign in.
From what I get from the docs and some source browsing, I could provide a list of packages manually via the faux plugin and then scan that list like this:
But it doesn't seem to work the way I expect it to. Let's say I expect to find https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-7187 and provide the following csv:
I get the file listed as scanned (
Scanned 1 source file
), but no results about issues found.Maybe I'm missing something trivial. My goal was to run
dpkg -l -O | awk '/^ii/ { print $2 "," $3 ",," }' > installed_list.csv
and feed that file to cve-check-tool later.The text was updated successfully, but these errors were encountered: