Skip to content

Commit acd26f8

Browse files
authored
Merge pull request #77 from RedHatProductSecurity/scanning-vendor-guidance
Formatting errors
2 parents b41e50f + b701019 commit acd26f8

2 files changed

Lines changed: 16 additions & 15 deletions

File tree

docs/csaf-vex.md

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -528,7 +528,7 @@ Our other full product ID `7Server-7.4.AUS:kernel-0:3.10.0-693.112.1.el7.src` ca
528528
The `remediations` object provides additional information about the previously identified product status. The following
529529
remediations status are available per `product_status` category:
530530

531-
* `fixed`
531+
`fixed`
532532

533533
* `vendor_fix`: For all the product IDs with a fixed product status there will be a corresponding entry
534534
in the remediations object that correlates each full product ID to the correct RHSAs. The RHSA can be determined by
@@ -538,7 +538,7 @@ remediations status are available per `product_status` category:
538538
* `workaround`: If a mitigation exists, it applies to all components regardless of their fix state.
539539
* `details`: The mitigation statement
540540

541-
* `known_affected`
541+
`known_affected`
542542

543543
* `no_fix_planned`: Will include any product IDs with the known affected product status that will not be fixed by Red
544544
Hat, either because it is out of support scope or the engineering team has decided not to fix it for other reasons.
@@ -549,10 +549,10 @@ remediations status are available per `product_status` category:
549549
* `workaround`: If a mitigation exists, it applies to all components regardless of their fix state.
550550
* `details`: The mitigation statement
551551

552-
* `known_not_affected`: There are no remediation objects for the known not affected status since it is implicitly
552+
`known_not_affected`: There are no remediation objects for the known not affected status since it is implicitly
553553
assumed that no remediation is needed if the product and component are not affected.
554554

555-
* `under_investigation`: There are no remediation objects for the under investigation status since it is implicitly
555+
`under_investigation`: There are no remediation objects for the under investigation status since it is implicitly
556556
assumed that no remediation exist while still under investigation.
557557

558558
Note: As with the `product_status` object, there may not be a `remediations` entry for every category. Additionally,

docs/scanning-vendors.md

Lines changed: 12 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -68,13 +68,14 @@ pkg:rpm/redhat/libgcc@11.3.1-4.3.el9?arch=x86_64
6868
```
6969

7070
#### SRPMs
71-
Additionally, SRPMs can be discovered from a binary RPM by using the following command from within the container image.
72-
```
71+
Additionally, SRPMs can be discovered from a binary RPM by using the following command from within the container image.
72+
73+
```
7374
# Example return of SRPM query
74-
$ r libgcc
75+
$ rpm -q --qf '%{SOURCERPM}\n' libgcc
7576
7677
gcc-11.3.1-4.3.el9.src.rpm
77-
```
78+
```
7879

7980
The gcc source component can be represented using the following purl.
8081
```
@@ -711,21 +712,21 @@ Many scanning vendors face similar challenges when reading and parsing Red Hat's
711712
has already been asked, you can review the list of questions asked [here](https://issues.redhat.com/browse/SECDATA-862?filter=12444038).
712713

713714
### Python and VENV
714-
https://issues.redhat.com/browse/SECDATA-831
715+
[https://issues.redhat.com/browse/SECDATA-831](https://issues.redhat.com/browse/SECDATA-831)
715716

716717
### Repository Relative URLs
717-
https://issues.redhat.com/browse/SECDATA-1089
718-
https://issues.redhat.com/browse/SECDATA-797
719-
https://issues.redhat.com/browse/SECDATA-1020
718+
[https://issues.redhat.com/browse/SECDATA-1089](https://issues.redhat.com/browse/SECDATA-1089)
719+
[https://issues.redhat.com/browse/SECDATA-797](https://issues.redhat.com/browse/SECDATA-797)
720+
[https://issues.redhat.com/browse/SECDATA-1020](https://issues.redhat.com/browse/SECDATA-1020)
720721

721722
### Empty Content Sets
722-
https://issues.redhat.com/browse/SECDATA-966
723+
[https://issues.redhat.com/browse/SECDATA-966](https://issues.redhat.com/browse/SECDATA-966)
723724

724725
### Differences in OVAL and VEX CPEs
725-
https://issues.redhat.com/browse/SECDATA-1141
726+
[https://issues.redhat.com/browse/SECDATA-1141](https://issues.redhat.com/browse/SECDATA-1141)
726727

727728
### Duplicate RHSAs
728-
https://issues.redhat.com/browse/SECDATA-969
729+
[https://issues.redhat.com/browse/SECDATA-969](https://issues.redhat.com/browse/SECDATA-969)
729730

730731
## Additional Questions or Concerns
731732
Red Hat is committed to continually improving our security data; any future changes to the data itself or the format of

0 commit comments

Comments
 (0)