Ubuntu debsecan feed mirror served via GitHub Pages.
This repository publishes debsecan database files for Ubuntu suites so debsecan
works with Ubuntu codenames (noble, jammy, etc.) instead of Debian-only
tracker endpoints.
debsecan --suite "$(lsb_release --codename --short)" \
--source "https://trikusec.github.io/ubt2dsa/release/1/" \
--format summaryPublished paths:
https://trikusec.github.io/ubt2dsa/release/1/noblehttps://trikusec.github.io/ubt2dsa/release/1/jammyhttps://trikusec.github.io/ubt2dsa/release/1/focalhttps://trikusec.github.io/ubt2dsa/release/1/bionichttps://trikusec.github.io/ubt2dsa/release/1/GENERIC
git clone https://github.com/trikusec/ubt2dsa.git
cd ubt2dsa
git clone --depth=1 https://git.launchpad.net/ubuntu-cve-tracker uct
# Fast incremental mode (default): active/ only + parser state cache
python3 scripts/generate.py \
--uct uct \
--out release/1 \
--metadata metadata.json \
--state-file .cache/uct-state.json
# Full rebuild mode: parse active/ + retired/ and ignore incremental state
python3 scripts/generate.py \
--uct uct \
--out release/1 \
--metadata metadata.json \
--include-retired \
--no-state-cache- Primary source: Canonical Ubuntu CVE Tracker (
active/by default for performance;--include-retiredfor full rebuilds). - Binary package mapping is resolved from Ubuntu
Packages.gzindices (main,restricted,universe,multiverse; release/updates/security). - ESM-only fixes are not currently split from public fixes in debsecan output.
- Version-based fixed detection can still produce false positives for some Ubuntu backports.
GENERICfeed keeps CVE section only (no package rows) to avoid extremely heavy generation and memory usage.- Per-suite source→binary expansion is capped (
--max-binaries-per-source, default 25; CI currently uses 10) and prunes debug/kernel-versioned binaries to keep feed sizes publishable on GitHub. - Because of this pruning/capping, some source packages may not list every possible binary variant in Section 2/3; this is an intentional tradeoff to stay within GitHub's file size limits.
If you spot an incorrect CVE/package mapping, open an issue in this repo and include:
- CVE ID
- Ubuntu suite
- Package name
- Expected status and source reference
This project is a successor in spirit to earlier work such as
BBVA/ust2dsa (archived).