Skip to main content

Container Security - Unified Related Results

We have improved the handling of OS-level packages, making it easier to interpret the scan results. Previously, each binary package (e.g., libssl.so) was listed independently, even when it carried the exact same vulnerabilities as the source package it was built from (e.g., openssl-1.1.1k). This inflated vulnerability counts and caused confusion regarding remediation.

Now, if a binary has the same CVEs as its source, then they are shown as a single unified result and the CVEs are only counted once.· If a binary has different vulnerabilities than it's source, then it will still appear separately, so that nothing is missed.

Summary

  • One source, one count – binaries with identical CVEs as their source package are unified into one result.

  • Separate when different – binaries with unique vulnerabilities are still shown separately.

Backwards compatibility

If you triaged binary packages that are now unified with the source package, then that triage is no longer relevant, as the related vulnerabilities are now shown under the source package.

Comparison

Old Behavior

Shows duplicate results for source and binary packages.

For example: The source package systemd:252.39-1~deb12u1 and the binary libsystemd0 252.39-1~deb12u1 containing identical vulnerabilities, are displayed and counted separately.

Image_373.png

New Behavior

Clear visibility into each bin package with no duplication.

For example: The source package systemd:252.39-1~deb12u1 and the binary libsystemd0 252.39-1~deb12u1 are unified into a single result and the vulnerabilities are only counted once.

Image_372.png