Bug 2028435
| Summary: | Update source of CVE data in data stream | ||
|---|---|---|---|
| Product: | Red Hat Enterprise Linux 9 | Reporter: | Matus Marhefka <mmarhefk> |
| Component: | scap-security-guide | Assignee: | Watson Yuuma Sato <wsato> |
| Status: | CLOSED ERRATA | QA Contact: | BaseOS QE Security Team <qe-baseos-security> |
| Severity: | high | Docs Contact: | Jan Fiala <jafiala> |
| Priority: | unspecified | ||
| Version: | 9.0 | CC: | ekolesni, ggasparb, jafiala, jcerny, matyc, mhaicman, mlysonek, openscap-maint, qe-baseos-security, vpolasek, wsato |
| Target Milestone: | rc | Keywords: | Triaged |
| Target Release: | --- | Flags: | pm-rhel:
mirror+
|
| Hardware: | Unspecified | ||
| OS: | Unspecified | ||
| Whiteboard: | |||
| Fixed In Version: | scap-security-guide-0.1.60-1.el9 | Doc Type: | Enhancement |
| Doc Text: |
.CVE OVAL feeds now compressed
With this update, Red Hat provides CVE OVAL feeds in a compressed form. They are no longer available as XML files, but are in the `bzip2` format instead. The location of the feeds for RHEL9 has also been updated to reflect this change.
Note that third-party SCAP scanners might have problems with scanning rules that use a compressed feed because referencing compressed content is not standardized.
|
Story Points: | --- |
| Clone Of: | 2028428 | Environment: | |
| Last Closed: | 2022-05-17 13:53:40 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 2028428 | ||
| Bug Blocks: | 2028432 | ||
|
Comment 2
Jan Černý
2021-12-06 10:18:59 UTC
The scapval utility is not happy with xml.bz2 extension and it does not understand its contents, but we don't really care. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (new packages: scap-security-guide), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:2610 |