-
Notifications
You must be signed in to change notification settings - Fork 84
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Red Hat Container Catalog uses CVE name instead of advisory link in vulnerability name field #627
Comments
Here's an example of a patched vulnerability from the rhel parser:
|
An example from the existing RHCC updater:
Some things of note:
|
jasinner
added a commit
to jasinner/claircore
that referenced
this issue
Jun 6, 2022
The updater in rhcc matcher was using CVE Name as the vulnerability name which more closely aligns with vulnerabilities coming from unpatched OVAL definitions. This change switchs rhcc matcher to use the advisory name in the vulnerablity name field. See-Also: quay#627
hdonnay
pushed a commit
to jasinner/claircore
that referenced
this issue
Jun 7, 2022
The updater in rhcc matcher was using CVE Name as the vulnerability name which more closely aligns with vulnerabilities coming from unpatched OVAL definitions. This change switchs rhcc matcher to use the advisory name in the vulnerablity name field. See-Also: quay#627
This is merged. |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Change the way Vulnerabilities are created by Red Hat Container Catalog updater so that they match the way the OVAL parser save Vulnerabilities. Specifically:
name
field should include the advisory IDlinks
field should include the advisory link, and the relevant RH CVE database linkUse a Vulnerability entry created by rhel/parser.go as an example if in doubt.
We need to do this so that it's easier to tell Vulnerabilities created by the
rhcc
matcher apart from unpatched vulnerabilities created by therhel
parser.The text was updated successfully, but these errors were encountered: