이 콘텐츠는 선택한 언어로 제공되지 않습니다.
Chapter 2. Requirements for Vulnerability Management reports
The Vulnerability Management Certification focuses on scan accuracy and completeness for Red Hat content, including RPMs, RPM modules, non-RPM components, and layered products. Red Hat also encourages the use of the CSAF-VEX for gathering information about the non-RPM content.
The following requirements define technical compliance criteria.
2.1. Red Hat security data usage requirements 링크 복사링크가 클립보드에 복사되었습니다!
You must use Red Hat’s CSAF-VEX (Common Security Advisory Framework – Vulnerability Exploitability eXchange) files as the standard data source for identifying and reporting Red Hat CVEs (Common Vulnerabilities and Exposures). These files ensure accurate and consistent reporting of vulnerabilities that are affected, fixed, or not applicable across Red Hat products.
Success Criteria:
- The report uses CSAF-VEX for Red Hat product assessments
- The vulnerability output includes VEX metadata
To know more about VEX files, see Red Hat VEX files.
2.2. Red Hat package identification 링크 복사링크가 클립보드에 복사되었습니다!
To minimize false positives, your security tool must accurately identify Red Hat package versions across RPMs, RPM modules, and non-RPM content, including container-first non-RPM and Maven-based artifacts. Red Hat uses backporting to apply security fixes from newer versions of upstream software packages to older package versions it distributes. When backporting a fix, Red Hat:
- Identifies the specific security fixes and isolates them from unrelated changes
- Ensures the fixes do not introduce unwanted side effects
- Applies the fixes to the appropriate older package version
Basing vulnerability assessments solely on software package version numbers can be misleading. This approach can fail to account for backported security fixes and can result in false positives.
Success Criteria:
- The report correctly interprets Red Hat RPM versioning
- The report avoids version-only judgments and accurately recognizes backported fixes
- The report demonstrates a reduced false-positive rate
To know more about backporting, see Red Hat security fixes backporting.
2.3. Red Hat Severity Ratings 링크 복사링크가 클립보드에 복사되었습니다!
Your scanner must include Red Hat CVE metadata in the default scan reports. This includes both the severity rating and the Common Vulnerability Scoring System (CVSS) base score provided by Red Hat. If your tool displays Red Hat CVE metadata separately from general severity or CVSS fields, it must do so by default, without requiring additional configuration.
Red Hat Product Security assigns severity ratings by using a four-point scale: Low, Moderate, Important, and Critical. It also provides a Common Vulnerability Scoring System (CVSS) base score to offer a more detailed, standardized view of risk. These scores help users prioritize vulnerabilities and make informed decisions about system upgrades based on their specific environments.
For open source software shipped by multiple vendors, the CVSS base scores can vary between vendors depending on several factors, including package versions, compilation methods, platforms, and deployment scenarios. This makes scoring vulnerabilities difficult for third-party vulnerability databases, such as the National Vulnerability Database (NVD), which assigns a single CVSS base score per vulnerability, which might not align with how Red Hat packages and uses the software.
Additional discrepancies can occur based on factors such as compiler flags, hardening techniques, or how you use the software within the product. In some cases, code can be present but not exploitable within Red Hat’s usage context.
Because of these differences, Red Hat strongly recommends using Red Hat-provided severity ratings and CVSS scores instead of relying on third-party sources. As part of the certification requirements, your scanner must display Red Hat’s severity scale and scoring data to ensure users receive accurate and actionable information.
Success Criteria:
- The scan report uses Red Hat-provided CVE metadata at the correct product and component level
- The report displays Red Hat’s severity scale (Low, Moderate, Important, Critical)
- The report includes Red Hat’s CVSS base scores alongside severity ratings
To know more about Rat Hat severity ratings, see Red Hat four-point scale severity ratings.
2.4. Red Hat Security Advisory Requirements 링크 복사링크가 클립보드에 복사되었습니다!
For any CVE with an available fix from Red Hat, you must accurately identify and report the corresponding Red Hat Security Advisory (RHSA). The RHSA must match the specific vulnerable component and the impacted artifact reported in the scan.
Providing accurate RHSA data ensures that users can locate official Red Hat remediation guidance and apply verified fixes aligned with Red Hat’s supported software lifecycle.
Success Criteria:
- The report includes the correct RHSA for each applicable CVE
- The RHSA matches the affected component and artifact as identified in the scan
2.5. Red Hat CVEs exclusion criteria 링크 복사링크가 클립보드에 복사되었습니다!
Your scanner must exclude CVEs that Red Hat has marked as Not affected, Rejected, or Disputed. These vulnerabilities should not appear in the scan results. If your scanner includes them, the report must clearly indicate their status to avoid misinterpretation or false alarms.
Success Criteria:
- The scan report does not include CVEs marked as Not affected, Rejected, or Disputed by Red Hat
- If listed, these CVEs are clearly labeled with their correct status