I’m getting a lot of false positives from vulnerability scans because openvas does not understand the ‘fips’ versions of ubuntu packages.
Is there a workaround that doesn’t involve overrides?
I’m running the latest community edition
Cheers
Mark Guz
Summary
The remote host is missing an update for the 'strongswan' package(s) announced via the USN-5250-1 advisory.
Detection Result
Vulnerable package: libstrongswan
Installed version: libstrongswan-5.8.2-1ubuntu3.fips.3.5
Fixed version: >=libstrongswan-5.8.2-1ubuntu3.4
Vulnerable package: strongswan
Installed version: strongswan-5.8.2-1ubuntu3.fips.3.5
Fixed version: >=strongswan-5.8.2-1ubuntu3.4
I guess you could duplicate the NVT’s .nasl file, give it a new NVT OID, and customize the detection to include .fips packages then import it to the scan configuration.