You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
From the output above, we can determine the following information for this image:
183
183
184
184
* Container Name and Repository: `Name: registry.redhat.io/openshift4/ose-console-rhel9@sha256:4a6ea66336fc875f84f24bf9ebfdf5b7c166eb19dd68d88ec6035392162b4c5a`
The following are examples of the purls that could be matched depending on both the fix status and the
496
500
fix component version.
497
501
498
-
RPMs, SRPMS, RPM modules
502
+
##### RPMs, SRPMS, RPM modules
499
503
```
500
504
# Example of potential purls that should be checked for libgcc component
501
505
@@ -521,7 +525,7 @@ Example of potential purl matches depending on fix status for the libgcc compone
521
525
| pkg:rpm/redhat/libgcc@11.2.1-9.5.el9_0?arch=x86_64 | libgcc-0:11.2.1-9.5.el9_0.x86_64 |CVE-2020-11023 is fixed |
522
526
523
527
524
-
Containers
528
+
##### Container first content
525
529
```
526
530
# Example of potential purls that should be checked for the ose-console-rhel9 container
527
531
@@ -546,7 +550,7 @@ object. More information about how to determine unique `product_id` combinations
546
550
be found [here](https://redhatproductsecurity.github.io/security-data-guidelines/csaf-vex/#relationships).
547
551
548
552
For CVE-2020-11023, the following product/component IDs are available for the rhel9/python-312 container and the libgcc component, using the
549
-
`BaseOS-9.5.0.Z.MAIN `, `AppStream-9.5.0.Z.MAIN` and `CRB-9.5.0.Z.MAIN ` product IDs to filter out any potential matches purl matches on irrelevant product streams.
553
+
`BaseOS-9.5.0.Z.MAIN `, `AppStream-9.5.0.Z.MAIN` and `CRB-9.5.0.Z.MAIN ` product IDs to filter out any potential purl matches for irrelevant product streams.
@@ -556,7 +560,7 @@ For CVE-2020-11023, the following product/component IDs are available for the rh
556
560
557
561
558
562
For CVE-2024-24791, the following product/component ID is available for the openshift4/ose-console-rhel9 container, using the `9Base-RHOSE-4.16` product ID
559
-
value to filter out any potential purl matches on irrelevant product streams.
563
+
value to filter out any potential purl matches for irrelevant product streams.
|`under_investigation` or `known_affected`| Only main product version information available | No component version information available | Reported |
599
-
|`known_not_affected`| Only main product version information available | No component version information available | Not reported |
600
-
|`fixed`| A direct CPE match exists | The fixed component version is newer than the component version included in the scanned software | Reported: The component is vulnerable and an associated RHSA should also be reported. |
601
-
|`fixed`| A direct CPE match exists | The fixed component version is either a direct match or older than the component version included in the scanned software | ot reported: The component should be considered already fixed and is not vulnerable in the scanned software. |
602
-
600
+
| Product Status | Product Details | Component Details | Reporting Information |
|`under_investigation` or `known_affected`| Only main product version information available | No component version information available | Reported |
603
+
|`known_not_affected`| Only main product version information available | Component version may be available | Not reported |
604
+
|`fixed`| A CPE match exists | The fixed component version is newer than the component version included in the scanned software | Reported: The component is vulnerable and an associated RHSA should also be reported. |
605
+
|`fixed`| A CPE match exists | The fixed component version is either a direct match or older than the component version included in the scanned software | Not reported: The component should be considered already fixed and is not vulnerable in the scanned software. |
603
606
604
607
In the previous example, for CVE-2020-11023, the three product/component `product_id`s identified are listed in the `fixed`
605
-
product status. Because the libgcc-0:11.5.0-5.el9_5 component version is newer than the identified libgcc-0:11.3.1-4.3.el9 that was
606
-
present in the rhel9/python-312 container, the package is considered vulnerable and this CVE should be reported.
608
+
product status. Because the libgcc-0:11.5.0-5.el9_5 component version is newer than the identified libgcc-0:11.3.1-4.3.el9
609
+
component version that was present in the rhel9/python-312 container, the package is considered vulnerable and this CVE should be reported.
607
610
```
608
611
"vulnerabilities": [
609
612
{
@@ -701,7 +704,7 @@ A Low Red Hat severity should be reported for the rhel9/python-312 container and
701
704
702
705
703
706
## Frequently Asked Questions (FAQs)
704
-
Vendors are encouraged to raise any questions regarding security data by opening a ticket in the public
707
+
Vendors are encouraged to raise any questions regarding security data by opening a 'Ticket' issue type in the public
Red Hat is committed to continually improving our security data; any future changes to the data itself or the format of
729
732
the files are tracked in the [Red Hat Security Data Changelog](https://access.redhat.com/articles/5554431).
730
733
731
-
Please contact Red Hat Product Security with any questions regarding security data at [secalert@redhat.com](secalert@redhat.com) or file an
732
-
issue in the public [SECDATA Jira project](https://issues.redhat.com/projects/SECDATA/issues/SECDATA-525?filter=allopenissues).
734
+
For any potential bugs identified regarding security data, please file a 'Bug' issue type in the public [SECDATA Jira project](https://issues.redhat.com/projects/SECDATA/).
0 commit comments