Release Notes


Red Hat Trusted Profile Analyzer 2.1

Release notes for Red Hat Trusted Profile Analyzer 2.1

Red Hat Trusted Documentation Team

Abstract

Welcome to Red Hat Trusted Profile Analyzer's official release notes for version 2.1!
The release notes describes new features, enhancements, known issues, bug fixes, and deprecation implemented for the Red Hat Trusted Profile Analyzer 2.1 software release.

Chapter 1. Introduction

Red Hat’s Trusted Profile Analyzer (RHTPA) is a proactive service that assists in risk management of Open Source Software (OSS) packages and dependencies. The Trusted Profile Analyzer service brings awareness to and remediation of OSS vulnerabilities discovered within the software supply chain.

The Trusted Profile Analyzer software Release Notes documents new features and enhancements, bug fixes, and known issues for the latest version, 2.1. We add the newest items to the top in each chapter, as we build upon the official release notes over the lifecycle of the major, and minor releases.

New for this release
  • Installing the RHTPA operator for Red Hat’s OpenShift Container Platform is a Technology Preview feature.
  • Added Quay as data importers for Software Bill of Materials (SBOM) documents.
  • The ability to add labels to SBOM documents and advisories.
  • Collection of metric and tracing data for enhanced observability and troubleshooting.

Chapter 2. New features and enhancements

A list of all major enhancements, and new features introduced in this release of Red Hat Trusted Profile Analyzer (RHTPA).

The features and enhancements added by this release are:

Red Hat Trusted Profile Analyzer operator for OpenShift Container Platform is available

With this release, you can deploy the Trusted Profile Analyzer service on Red Hat’s OpenShift Container Platform (RHOCP) by installing the RHTPA operator provided by Red Hat’s Marketplace on the OperatorHub. Installing the RHPTA operator is a Technology Preview feature and is not recommended for running production workloads.

Important

Deploying the RHTPA operator is a Technology Preview feature only. Technology Preview features are not supported with Red Hat production service level agreements (SLAs), might not be functionally complete, and Red Hat does not recommend to use them for production. These features provide early access to upcoming product features, enabling customers to test functionality and provide feedback during the development process. See the support scope for Red Hat Technology Preview features for more details.

Improvements for handling CVSS scores

With this release, we improved how RHTPA handles Common Vulnerability Scoring System (CVSS) scores for vulnerabilities. To take advantage of these improvements, you must remove, and add the Common Vulnerabilities and Exposures (CVE) importer again.

Using the RHTPA API endpoints, do the following steps:

  1. Remove the existing CVE importer: http DELETE <RHTPA_BASE_URL>/api/v2/importer/cve
  2. Add the CVE importer back: http POST <RHTPA_BASE_URL>/api/v2/importer/cve cve[source]=https://github.com/CVEProject/cvelistV5 cve[disabled]:=false cve[period]=30s cve[description]="CVE List V5"
Aggregated severity value removed from RHTPA console
With this release, we removed the Aggregated severity value from the RHTPA console. This value calculated the averages from vulnerability and advisory scores, however this information is not useful to know.
Collecting metrics and tracing data

With this release, we added the ability to stream metrics and tracing data to the OpenTelemetry collector. By using the OpenTelemetry protocol (OTLP), this helps with observability, and troubleshooting problems as they occur. You can enable metrics and tracing by enabling the following options in the Helm chart or in the Ansible Playbook.

Helm chart

metrics.enabled=true
tracing.enabled=true
collector.endpoint="<OPENTELEMETRY_COLLECTOR_URL_ENDPOINT>"
Copy to Clipboard Toggle word wrap

Ansible Playbook

TPA_OTEL_METRICS_ENABLED=true
TPA_OTEL_TRACING_ENABLED=true
TPA_OTEL_COLLECTOR_ENDPOINT=<OPENTELEMETRY_COLLECTOR_URL_ENDPOINT>
Copy to Clipboard Toggle word wrap

Chapter 3. Bug fixes

In this release of Red Hat Trusted Profile Analyzer (RHTPA), we fixed the following bugs. In addition to these fixes, we list the descriptions of previously known issues found in earlier versions that we fixed.

Search queries with a special characters do not work as expected
When searching by text for Software Bill of Material (SBOM) documents you can use some special characters to affect the meaning of a search query. But in some cases an SBOM document name can contain a special character, resulting in an HTTP error response, because the API considers the special character as structured filters. With this release, we fixed this issue by automatically escaping special characters before sending the search query.
SBOM uploads start at 100%
We fixed an issue when uploading multiple files from the Upload page within the RHTPA console would erroneously show 100% completed. The uploading percentage for the SBOM documents is accurately represented.
Long SBOM names display outside the pie chart boundaries
When a Software Bill of Materials (SBOM) has a long name, the name can exceed the pie chart boundaries. With this release, we fixed this issue.
Importer pod stays in a pending state
When starting the importer pod, the OpenShift cluster does not have a default storage class set for persistent volume claims (PVC). This causes the PVC to go into a pending state. We fixed this issue by adding the modules.importer.storageClassName and storage.storageClassName fields. You can configure these fields before or after deploying RHTPA on OpenShift. This allow the PVC to become active as expected.

Chapter 4. Known issues

Resolved known issues for this release of Red Hat Trusted Profile Analyzer (RHTPA):

A list of unresolved known issues found in this release:

License information does not comply with SPDX specification standards
The embedded license information within a package or component of a Software Bill of Materials (SBOM) does not comply with the SPDX specification standards. Because of this issue, RHTPA marks the package URL license details as NOASSERTION. Currently, there is no workaround for this issue.
A custom Quay source with self signed certificate does not import data
When you set a custom Quay source with self signed certificate, the data is not import into RHTPA. This is because the trust anchor for data importers is missing. Currently, there is no workaround for this issue.
An IncompleteBody error when using OpenShift Data Foundation
Red Hat’s OpenShift Data Foundation does not support compression logic that uses the aws-sdk Rust client. When using OpenShift Data Foundation as an object store for RHTPA, you can get a 409 response code, along with an IncompleteBody error message. This issue resides within the OpenShift Data Foundation code base. To workaround this issue, we removed the compression logic capability from RHTPA’s source code when using OpenShift Data Foundation. This workaround results in Software Bill of Materials (SBOM) and Vulnerability Exploitability eXchange (VEX) documents uploading without errors.
The rhtpa-operator-controller-manager pod in a reconciliation loop
The rhtpa-operator-controller-manager pod keeps going into a reconciliation loop each time after updating the server or resource. This makes manual changes impossible because it conflicts with the configuration updates automatically done during reconciliation. This also cause the logs to fill up with a line every second for each new reconciliation trigger event. Currently, there is no workaround for this issue.
Large number of vulnerabilities reported
The logic that correlates vulnerability data between advisories and large Software Bill of Materials (SBOM) documents can cause pages to load slowly, and display large number of vulnerabilities. Currently, there is no workaround for this issue.
Searching by SBOM version gives inconsistent results
When using Software Bill of Materials (SBOM) version numbers as search criteria, you can get inconsistent results. In some cases, the search engine can find SBOM version numbers that have the version number in the file name or in the document_id field. In other cases, the search engine finds no matching SBOM versions, even with a valid SBOM version number. There is currently no workaround for this issue.
Remote server connection drops on bulk uploads that use the API
When uploading a compressed SBOM document that uses the RHTPA API, for example, a 350 MB compressed file, the connection to the remote RHTPA service can drop. This causes a partial uploading of the files. To workaround this issue, split the larger SBOM document into smaller sizes, for example, a compressed file roughly 10-20 MB in size. This allows the uploading to finish successfully.
Vulnerability information cannot be deleted by using the API
Using the RHTPA API to delete vulnerabilities and Common Vulnerabilities and Exposures (CVE) information gives a foreign key constraints error message. With this release, we added a Not implemented message in the return code. In a future release, we are going to deprecate this delete function.
No support for CPE version 2.3
The Common Platform Enumeration (CPE) specification and Software Bill of Materials (SBOM) formatted with string bindings does not render properly in the RHTPA console, and when exporting license information. There is currently no workaround for this issue.
Trusted Profile Analyzer 2.0 requires Helm version 3.17 or later
To install RHTPA 2.0 and later, you must use Helm version 3.17 or later to deploy the Trusted Profile Analyzer service on the Red Hat OpenShift Container Platform.
No support for CVSS v4 scores
Currently, there is no support for Common Vulnerability Scoring System (CVSS) version 4 scores in RHTPA.
Advisories with an environment or temporal score fails to upload
A Common Security Advisory Framework (CSAF) document with a Common Vulnerability Scoring System (CVSS) vector that has an environment or temporal score can fail when uploading it to RHTPA. Because of this upload failure, you cannot see the advisory within the RHTPA console. Currently, there is no workaround for this issue.

Chapter 5. Deprecated functionality

An overview of deprecated functionality in all supported releases up to this release of Red Hat Trusted Profile Analyzer (RHTPA).

Vulnerability information cannot be deleted by using the API
Using the RHTPA API to delete vulnerabilities and Common Vulnerabilities and Exposures (CVE) information gives a foreign key constraints error message. With this release, we added a Not implemented message in the return code, and deprecated this delete function.

Legal Notice

Copyright © 2025 Red Hat, Inc.
The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/. In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version.
Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law.
Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries.
Linux® is the registered trademark of Linus Torvalds in the United States and other countries.
Java® is a registered trademark of Oracle and/or its affiliates.
XFS® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries.
MySQL® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
Node.js® is an official trademark of Joyent. Red Hat is not formally related to or endorsed by the official Joyent Node.js open source or commercial project.
The OpenStack® Word Mark and OpenStack logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community.
All other trademarks are the property of their respective owners.
Back to top
Red Hat logoGithubredditYoutubeTwitter

Learn

Try, buy, & sell

Communities

About Red Hat Documentation

We help Red Hat users innovate and achieve their goals with our products and services with content they can trust. Explore our recent updates.

Making open source more inclusive

Red Hat is committed to replacing problematic language in our code, documentation, and web properties. For more details, see the Red Hat Blog.

About Red Hat

We deliver hardened solutions that make it easier for enterprises to work across platforms and environments, from the core datacenter to the network edge.

Theme

© 2025 Red Hat