-
Notifications
You must be signed in to change notification settings - Fork 441
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve macOS vulnerability detection #6628
Comments
Hey @michalnicp do you have stats or examples for how macOS vulnerability detection improved in Fleet 4.20? For example, was Fleet not detecting vulns for some apps (false negatives) ? What apps are these? I'd like to include these stats or examples in the release blogpost. This way, our users can answer "how did vulnerability detection improve for macOS?" |
|
@michalnicp what's left to close #4804? Do we need to move #4804 into the "QA" column of the release board so that we can test to make sure all Fleet users, by default, get correct vulns for Ruby? |
Yes, we should probably move this to the QA column. |
WARNING: For users that download and sync Fleet's vulnerability feeds manually, there are required adjustments or else vulnerability processing will stop working.
Users with the default vulnerability processing settings can safely upgrade without adjustments.
Required adjustments
If the
FLEET_VULNERABILITIES_DISABLE_DATA_SYNC
environment variable, or the CLI flag equivalent, is set totrue
, you must manually download the latest CPE database and CPE translations files and copy them to the configured vulnerabilities databases path. The latest CPE database and CPE translations files can be downloaded from Fleet's NVD Releases repository on GitHub.If the
FLEET_VULNERABILITIES_CPE_DATABASE_URL
environment variable, or the CLI flag equivalent, you must make sure that the CPE database file the URL points to is updated to the latest version. The latest CPE database and CPE translations files can be downloaded from Fleet's NVD Releases repository on GitHub.Goal
How?
Implement the proposed changes in proposals/improv-mac-os-vuln-detection.md.
Backend
The text was updated successfully, but these errors were encountered: