Created attachment 1638308 [details] pop-over panel Description of problem: On "Security breakdown" popover page from Dashboard, click the external link of image will open the external url on current window. Version-Release number of selected component (if applicable): 4.3.0-0.nightly-2019-11-19-122017 How reproducible: Always Steps to Reproduce: 1. enable CSO on OCP cluster 2. Create a deployment with image reference to 'quay.io/hasha/rubyex-vul:latest'. the image have a cve vulnerability 3. On Dashboard page, click "Image Security". On "Security breakdown" popover panel (see attachment), click the image under "Fixable Vulnerabilities" Actual results: Current browser window directs to the image page. Expected results: It should open a new tab window for image page. Additional info:
Created attachment 1686029 [details] Verification screenshot
External link is corrected opened in new window (attached the screenshot) Verified on 4.5.0-0.nightly-2020-05-06-003431
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2020:2409