このコンテンツは選択した言語では利用できません。
Chapter 1. Searching for vulnerability information
You can use the Trusted Profile Analyzer managed service to find existing Software Bill of Materials (SBOM) documents, Vulnerability Exploitability eXchange (VEX) documents, license information, and common vulnerability and exposure (CVE) information, along advisory information for Red Hat products and software packages.
Trusted Profile Analyzer managed service provides only information for the following Red Hat products:
- Red Hat Enterprise Linux Universal Base Image (UBI) versions 8 and 9.
- The Java Quarkus library.
Prerequisites
- A Red Hat user account to access the Red Hat Hybrid Cloud Console.
Procedure
- Open a web browser.
- Go to the Application Services home page on the Hybrid Cloud Console.
- If prompted, log in to the Hybrid Cloud Console with your credentials.
- On the navigation menu, click Trusted Profile Analyzer.
- A new web browser window opens to the Trusted Profile Analyzer console home page. From the Trusted Profile Analyzer home page, on the navigational menu, click Search.
- Enter your search criteria into the dialog box to begin your search.
On the search results page, you can filter the results by Red Hat products, download SBOM files, view package vulnerability and advisory information, along with any possible remediations.
NoteThe number shown on the Advisories tab is how many times your search criteria made a match.