Created attachment 1638308 [details]
Description of problem:
On "Security breakdown" popover page from Dashboard, click the external link of image will open the external url on current window.
Version-Release number of selected component (if applicable):
Steps to Reproduce:
1. enable CSO on OCP cluster
2. Create a deployment with image reference to 'quay.io/hasha/rubyex-vul:latest'. the image have a cve vulnerability
3. On Dashboard page, click "Image Security". On "Security breakdown" popover panel (see attachment), click the image under "Fixable Vulnerabilities"
Current browser window directs to the image page.
It should open a new tab window for image page.
Created attachment 1686029 [details]
External link is corrected opened in new window (attached the screenshot)
Verified on 4.5.0-0.nightly-2020-05-06-003431
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.
For information on the advisory, and where to find the updated
files, follow the link below.
If the solution does not work for you, open a new bug report.