Stay organized with collections
Save and categorize content based on your preferences.
COS provides an Open Vulnerability and Assessment Language (OVAL) vulnerability feed, which
is a structured, machine-readable dataset for all supported COS releases. You can use the
feed to evaluate packages installed on a COS system for security issues.
You can access the OVAL feed at gs://cos-oval-vulnerability-feed.
The feed depends on the cos-package-info.json file, which lists installed packages on an
image. This file is located at /etc directory on your VM instances.
Scanning COS VM instances with Oval feed
You can use the OVAL feed to scan any COS instance. For example, assume you want to scan
an instance running the COS-109 image:
Download the Oval feed for your instance. Make sure you choose the correct milestone.
For the current example, it is 109:
Note that the cos-package-info.json file and the COS Oval feed need to be in the same
directory. If not, update the path of the cos-package-info.json in the COS Oval feed file.
How to fix vulnerabilities reported by the scanner
The feed lists all the vulnerabilities fixed in the latest COS image. As such,
you can fix all open vulnerabilities reported by the scanner on your system by
updating to the latest COS image for that particular milestone.
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2025-08-07 UTC."],[[["\u003cp\u003eCOS provides an Open Vulnerability and Assessment Language (OVAL) feed, a structured dataset for identifying security vulnerabilities in supported COS releases.\u003c/p\u003e\n"],["\u003cp\u003eThe OVAL feed, accessible at \u003ccode\u003egs://cos-oval-vulnerability-feed\u003c/code\u003e, relies on the \u003ccode\u003ecos-package-info.json\u003c/code\u003e file, which lists installed packages on an image and is located in the \u003ccode\u003e/etc\u003c/code\u003e directory.\u003c/p\u003e\n"],["\u003cp\u003eScanning a COS instance involves downloading and extracting the OVAL feed for the specific milestone, copying the \u003ccode\u003ecos-package-info.json\u003c/code\u003e file from the VM, and using an SCAP-compliant tool like OpenSCAP.\u003c/p\u003e\n"],["\u003cp\u003eVulnerabilities reported by the scanner can be resolved by updating to the latest COS image for the applicable milestone, as the feed lists vulnerabilities fixed in these images.\u003c/p\u003e\n"]]],[],null,[]]