Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Support for scanning archlinux #339

Closed
SettRaziel opened this issue Jun 18, 2021 · 6 comments
Closed

Support for scanning archlinux #339

SettRaziel opened this issue Jun 18, 2021 · 6 comments
Assignees
Labels
enhancement New feature or request

Comments

@SettRaziel
Copy link

SettRaziel commented Jun 18, 2021

What would you like to be added:
Support for Arch Linux

Why is this needed:
As a rolling release distribution archlinux provides updated versions for the packages it uses. It is very popular and maintains its own base images on DockerHub. They provide information regarding security issues and a security feed for its advisories.
It would be an awesome addition if the grype engine provides scanning capabilities for it.

Additional context:
Current scanning output:
$ grype archlinux:latest
✔ Vulnerability DB [no update available]
✔ Parsed image
✔ Cataloged packages [0 packages]
✔ Scanned image [0 vulnerabilities]

@SettRaziel SettRaziel added the enhancement New feature or request label Jun 18, 2021
@wagoodman
Copy link
Contributor

To support this we'll need to implement anchore/syft#6 (in syft)

@spiffcs spiffcs added this to OSS Jun 1, 2022
@Foxboron
Copy link
Contributor

Foxboron commented Jul 7, 2022

Syft now has support anchore/syft#241

@spiffcs spiffcs moved this to In Progress (Actively Resolving) in OSS Jul 7, 2022
@spiffcs spiffcs self-assigned this Jul 8, 2022
@spiffcs spiffcs moved this from In Progress (Actively Resolving) to Triage (Comments or Progress Made) in OSS Jul 18, 2022
@tgerla tgerla closed this as completed Jan 26, 2023
@github-project-automation github-project-automation bot moved this from Awaiting Response to Done in OSS Jan 26, 2023
@Foxboron
Copy link
Contributor

@tgerla Which PR solved this issue?

@spiffcs
Copy link
Contributor

spiffcs commented Feb 16, 2023

@Foxboron should have been this one
anchore/syft#943

@Foxboron
Copy link
Contributor

I don't quite understand how the syft implementation solved this grype issue?

It's not parsing the security tracker from Arch?

@Foxboron
Copy link
Contributor

Foxboron commented Mar 2, 2023

The answer is that it doesn't.

λ grype main» ./main archlinux
 ✔ Vulnerability DB        [updated]
 ✔ Parsed image
 ✔ Cataloged packages      [113 packages]
 ✔ Scanned image           [5 vulnerabilities]
NAME        INSTALLED   FIXED-IN  TYPE  VULNERABILITY   SEVERITY
gnupg       2.2.40-1              alpm  CVE-2022-34903  Medium
gnupg       2.2.40-1              alpm  CVE-2022-3515   Critical
libarchive  3.6.2-2               alpm  CVE-2022-36227  Critical
zlib        1:1.2.13-2            alpm  CVE-2018-25032  High
zlib        1:1.2.13-2            alpm  CVE-2022-37434  Critical

CVE-2022-37434 is marked as vulnerable, while it's marked as fixed in our security tracker.

https://security.archlinux.org/AVG-2821

Please disable this support until it can track fixed issues from our tracker.

@spiffcs

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
enhancement New feature or request
Projects
Archived in project
Development

No branches or pull requests

5 participants