CSAF VEX-GA Release🔗
VEX-GA Announcement🔗
Red Hat Product Security is pleased to share that the GA version of our new VEX (Vulnerability Exploit eXchange) files is now available here.
GA Overview🔗
This new release focuses on data precision and standardizing our CSAF VEX format. Key improvements include:
- Improved Product Granularity: Currently, unfixed products are only represented at the major version (RHEL 9). The new version of VEX files explicitly lists supported streams (RHEL 9.6, RHEL 9.4 EUS, RHEL 9.2 EUS, etc.).
- Simplified Product Trees: Removing inconsistent branch nesting for
architectureandproduct_familybranches to simplify the product tree structure. We are also removing redundant architecture representations for components and multiple product variants to reduce the total number of product entries. - Enhanced Validation: Better validation for CSAF VEX formats and identification helpers like CPEs and PURLs.
- Consistency Fixes: Standardized product
nameandproduct_idformats to ensure consistency betweenfixedandunfixedstatuses. - Streamlined Content: We’ve removed unrequired fields (duplicate titles, redundant CVSS scores, unnecessary note objects) and ensured
fixedproduct and components no longer appear inworkaroundremediation objects. - Modernized Infrastructure: We have migrated VEX publication to a completely new service that improves performance and supportability.
More detailed information on the differences between legacy VEX files and GA VEX files will be found here.
Bugs Fixed in GA Release🔗
| Area | Priority | Impact |
|---|---|---|
| Product Tree Deduplication | Blocker | VEX files now contain cleaner, deduplicated product trees. Scanners see fewer ambiguous or repeated product entries per CVE |
| Identifier Fidelity (CPE, PURL, CWE) | Blocker | More accurate CPEs, PURLs, and CWEs. Fewer edge cases where a scanner cannot match the VEX identifier to an installed component |
| Coverage and Reliability | Critical | More CVEs generating valid VEX files. The current 98.9% success rate is primarily driven by these fixes |
| Data Integrity and Confidentiality | Blocker | Partners can trust that no embargoed or pre-disclosure data leaks into the feed, and container VEX entries are correctly structured |
| Data Quality Investigation | Critical | Enabled resolution of multiple Blocker issues |
Future Enhancements🔗
- Component-level Accuracy: Instead of determining affectedness at the SRPM level, we will begin reporting the affectedness of binary RPMs and eventually aim to report down to the individual libraries/files that are affected. Binary RPM information is currently only availble for some vulnerabilities. Product Security is working to address this gap as soon as possible.
- Middleware Improvements: Security Data for Red Hat Middleware products will continue to be improved.
- CSAF Advisory File Improvements: While this effort currently only focuses on VEX files, we plan to make similar changes to our CSAF Advisory files as well.
- Unified Container Reporting: Direct reporting of all vulnerabilities (RPM and non-RPM) to the container image to provide a more streamlined scanning experience for vendors and better remediation information for customers.
- CSAF 2.1 Adoption: We will assess and plan support following the publication of the new version of the CSAF standard, which will include the adoption of
product_version_rangefor components.
How to Provide Feedback🔗
For any issues or questions you have, please file a jira issue with the following:
- Project: SECDATA
- Issue Type: Ticket
- Component: ‘feedback-new-vex’
- Description: The question or issue you wish to raise. Please provide a detailed explanation, the VEX file you are referencing and a specific example of the data.