-
Notifications
You must be signed in to change notification settings - Fork 870
POC: Transition Ubuntu vulnerabilities from OVAL to OSV feeds #40201
Copy link
Copy link
Closed
Labels
#g-security-complianceSecurity & Compliance product groupSecurity & Compliance product group:releaseReady to write code. Scheduled in a release. See "Making changes" in handbook.Ready to write code. Scheduled in a release. See "Making changes" in handbook.storyA user story defining an entire featureA user story defining an entire feature~timeboxA task that is completed in a predetermined amount of time.A task that is completed in a predetermined amount of time.
Milestone
Metadata
Metadata
Assignees
Labels
#g-security-complianceSecurity & Compliance product groupSecurity & Compliance product group:releaseReady to write code. Scheduled in a release. See "Making changes" in handbook.Ready to write code. Scheduled in a release. See "Making changes" in handbook.storyA user story defining an entire featureA user story defining an entire feature~timeboxA task that is completed in a predetermined amount of time.A task that is completed in a predetermined amount of time.
Type
Projects
Status
Done
Status
Done
Goal
This is a POC for #39900.
Changes
Product
Engineering
This POC should cover the following areas:
1. Add OSV feed
https://storage.googleapis.com/osv-vulnerabilities/Ubuntu/all.zip) or the official https://github.com/canonical/ubuntu-security-notices2. Check the results against OVAL using osquery-perf
emacs-commonper #39370).3. Have a fallback to OVAL for 1 or more releases
4. Recommended: get more customer data
Collect vulnerability scan results from customer environments (with appropriate permissions) to validate OSV accuracy against real-world host configurations.
Compare OSV vs OVAL results on customer data to quantify the improvement in false positive rates.
Test plan is finalized
Contributor API changes: No changes
Feature guide changes: No changes
Database schema migrations: No changes
Load testing: Compare OSV scan performance against current OVAL scan across Ubuntu hosts using osquery-perf
Pre-QA load test: Yes — run comparative scan with osquery-perf before QA
Load testing/osquery-perf improvements: No changes
This is a premium only feature: No
QA
Risk assessment
Test plan
emacs-commonon Ubuntu 24.04 when using OSV (the known false positive from #39370).emacs-commonon Ubuntu 24.04 when using OSV (legitimate vulnerability).Testing notes
This is a POC. Testing focuses on validating accuracy of OSV data compared to OVAL, not on production readiness.
Confirmation