-
Bug
-
Resolution: Not a Bug
-
Normal
-
None
-
rhel-7.9.z, rhel-8.0.0, rhel-9.0.0, rhel-10.0
-
None
-
Moderate
-
Patch
-
rhel-sst-csi-client-tools
-
ssg_core_services
-
None
-
False
-
-
None
-
Red Hat Enterprise Linux
-
None
-
None
-
None
-
-
All
-
None
Many customers need to review the detailed information of each CVE when encountering a large number of CVEs, which is time-consuming and detrimental to the customer experience.
- Expected results:
a. Use the [Red Hat CVE Checker](https://access.redhat.com/labs/cvechecker/) or other tools to automatically generate an analysis report, informing customers which CVEs affect which packages and which versions they need to upgrade to for a fix.
b. Generate targeted reports based on the customer's chosen RHEL version.
c. The report can be converted into PDF, DOC, and other formats for customers to download.
d. Maybe more good ideas from your sides.
- Actual results:
After querying a large number of CVEs using the Red Hat CVE Checker, it is still necessary to check the information of each CVE individually.