We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Modular rpms are a special type of rpms which require different vulnerability detection.
Modular rpms are stored in the rpm database and can be distinguished from normal rpms by RPMTAG_MODULARITYLABEL label.
RPMTAG_MODULARITYLABEL
Clair v3 already has a modular rpm detection: quay/clair#891
In oval vulnerability data, modular rpms can be also distinguished by looking at criterion comments.
<criterion test_ref="oval:com.redhat.rhsa:tst:20190980027" comment="Module httpd:2.4 is enabled"/>
The text was updated successfully, but these errors were encountered:
@Allda would you have the time to work this into ClairCore?
Sorry, something went wrong.
This feature has been already implemented in the following PRs. #156 #148
No branches or pull requests
Modular rpms are a special type of rpms which require different vulnerability detection.
Modular rpms are stored in the rpm database and can be distinguished from normal rpms by
RPMTAG_MODULARITYLABEL
label.Clair v3 already has a modular rpm detection: quay/clair#891
In oval vulnerability data, modular rpms can be also distinguished by looking at criterion comments.
<criterion test_ref="oval:com.redhat.rhsa:tst:20190980027" comment="Module httpd:2.4 is enabled"/>
The text was updated successfully, but these errors were encountered: