CVE Database Sources & Version
SUSE® Security Vulnerability (CVE) Database
The SUSE® Security vulnerability database is updated nightly with sources from popular container base images and package providers. These updates are automatically built into the updater container and published to the SUSE® Security private docker hub registry. The list of sources included is evaluated frequently to ensure the accuracy of scan results.
You control when to update the CVE database in your deployment. Please see the section Updating the CVE Database for details on how to update. |
SUSE® Security is able to scan distroless and PhotonOS based images. |
CVE Database Version
The CVE database version and date can be seen in the console in the Platforms, Registries, Vulnerabilities tab in Containers/Nodes in Assets, and Risk Reports Scan Events.
To use the REST API to query the version:
curl -k -H "Content-Type: application/json" -H "X-Auth-Token: $_TOKEN_" "https://127.0.0.1:10443/v1/scan/scanner"
Output:
{
"scanners": [
{
"cvedb_create_time": "2020-07-07T10:34:04Z",
"cvedb_version": "1.950",
"id": "0f043705948557828ac1831ee596588a0d050950113117ddd19ecd604982f4d9",
"port": 18402,
"server": "127.0.0.1"
},
{
"cvedb_create_time": "2020-07-07T10:34:04Z",
"cvedb_version": "1.950",
"id": "9fa02c644d603f59331c95735158d137002d32a75ed1014326f5039f38d4d717",
"port": 18402,
"server": "192.168.9.95"
}
]
}
To query the SUSE® Security scanner for the database version:
kubectl exec <scanner pod> -n neuvector -- scanner -v -d /etc/neuvector/db/
To use docker commands:
docker exec scanner scanner -v -d /etc/neuvector/db/
Querying the CVE Database for Specific CVE Existence
An online service is provided for SUSE® Security Prime (paid subscription) customers to be able to query the CVE database to determine if a specific CVE exists in the current database version. Other CVE database queries are also available from this service. Please request access through your SUSE Support portal (SCC), SUSE Collective link, or contact your SUSE account representative to access this service.
CVE Database Sources
The most up-to-date list of CVE database sources can be found here
Sources include:
General CVE Feeds
Source | URL |
---|---|
nvd and Mitre |
NVD is a superset of CVE https://cve.mitre.org/about/cve_and_nvd_relationship.html |
OS CVE Feeds
Source | URL |
---|---|
alpine |
|
amazon |
|
debian |
|
Microsoft mariner |
|
Oracle |
|
Rancher OS |
|
redhat |
|
SUSE linux |
|
ubuntu |
Application Based Feeds
Source | URL |
---|---|
.NET |
https://github.com/advisories, https://www.cvedetails.com/vulnerability-list/vendor_id-26/ |
apache |
|
busybox |
https://www.cvedetails.com/vulnerability-list/vendor_id-4282/Busybox.html |
golang |
|
java |
|
github maven |
|
kubernetes |
https://kubernetes.io/docs/reference/issues-security/official-cve-feed/ |
nginx |
|
npm/nodejs |
|
python |
|
openssl |
|
ruby |
Scanner Accuracy
SUSE® Security evaluates each source to determine how to most accurately scan for vulnerabilities. It is common for scan results from different vendors' scanners to return different results. This is because each vendor processes the sources differently.
A higher number of vulnerabilities detected by one scanner is not necessarily better than another. This is because there can be false positives which return inaccurate vulnerability results.
SUSE® Security supports both layered and non-layered (compacted) scan results for images. The layered scan shows vulnerabilities in each layer, while the non-layered shows only vulnerabilities at the surface.
Scanner Performance
A number of factors determine scanner performance. For registry scanning, the number and size of images as well as if a layered scan is being performed will determine performance. For run-time scans, the collection of container data is distributed across all Enforcers, then scheduled by the Controller for database comparison.
Multiple parallel scanners can be deployed to increase scan performance for a large number of images. The controller will schedule scan tasks across all scanners. Each scanner is a container which is deployed by a Kubernetes deployment/replicaset.