-
Task
-
Resolution: Done
-
Normal
-
None
-
None
-
False
-
-
False
We are ingesting the RedHat VEX CVE cve-2023-6597.json, which contains the following "product_status" details:
"product_status":
This data is generating the following entry in our system, which applies to any Python version:
{{
}}
The issue arises because we do not correlate python-urllib3 with the specific Python version (e.g., Python 3.9), As a result, we generate false positives (FPs).
In the above example, we cannot distinguish whether the python-urllib3 package is for Python 3.9 or Python 3.6 (the latter is marked as "not affected" in the RedHat VEX document).
regarding python3.6, the VEX document points that this python product is declared as a `rpmmod`
{ "category": "product_version", "name": "python36:3.6/python36", "product": { "name": "python36:3.6/python36", "product_id": "python36:3.6/python36", "product_identification_helper":
} },
Would the support for modules help resolve this issue?
How can we establish a connection between the Python version and the associated vulnerable package?
Please help us understand the logic we need to implement in order to achieve support for those cases.