<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic After more than 2 years Linux vulnerability reporting is still useless. in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/after-more-than-2-years-linux-vulnerability-reporting-is-still/m-p/1250679#M9206</link>
    <description>&lt;P&gt;It is about 2 years ago that the Linux vulnerabilities reporting issues where announced to Palo Alto.&lt;BR /&gt;It's still not fixed. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;It looks like Cortex does not look beyond the dash in the version numbers of installed applications.&amp;nbsp; For example; Cortex is reporting a vulnerable zlib 1.2.11&lt;BR /&gt;The one actually installed was: zlib.x86_64 1.2.11-40.el9&lt;BR /&gt;which was the patched version.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Reported it again and so far no progress or action.&lt;BR /&gt;We're currently investigating a Cortex replacement due to Palo's lack of actions on this one and other reported Cortex issues.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
    <pubDate>Mon, 23 Mar 2026 08:32:53 GMT</pubDate>
    <dc:creator>edvardgooijenga</dc:creator>
    <dc:date>2026-03-23T08:32:53Z</dc:date>
    <item>
      <title>After more than 2 years Linux vulnerability reporting is still useless.</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/after-more-than-2-years-linux-vulnerability-reporting-is-still/m-p/1250679#M9206</link>
      <description>&lt;P&gt;It is about 2 years ago that the Linux vulnerabilities reporting issues where announced to Palo Alto.&lt;BR /&gt;It's still not fixed. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;It looks like Cortex does not look beyond the dash in the version numbers of installed applications.&amp;nbsp; For example; Cortex is reporting a vulnerable zlib 1.2.11&lt;BR /&gt;The one actually installed was: zlib.x86_64 1.2.11-40.el9&lt;BR /&gt;which was the patched version.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Reported it again and so far no progress or action.&lt;BR /&gt;We're currently investigating a Cortex replacement due to Palo's lack of actions on this one and other reported Cortex issues.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2026 08:32:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/after-more-than-2-years-linux-vulnerability-reporting-is-still/m-p/1250679#M9206</guid>
      <dc:creator>edvardgooijenga</dc:creator>
      <dc:date>2026-03-23T08:32:53Z</dc:date>
    </item>
    <item>
      <title>Re: After more than 2 years Linux vulnerability reporting is still useless.</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/after-more-than-2-years-linux-vulnerability-reporting-is-still/m-p/1250725#M9209</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1660628707"&gt;@edvardgooijenga&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="257" data-start="0"&gt;The behavior you’re seeing—where Cortex XDR Vulnerability Assessment flags a patched Linux package (e.g., reporting &lt;CODE data-end="129" data-start="116"&gt;zlib 1.2.11&lt;/CODE&gt; as vulnerable even though &lt;CODE data-end="171" data-start="156"&gt;1.2.11-40.el9&lt;/CODE&gt; is installed)—is a known limitation related to how backported packages are evaluated.&lt;/P&gt;
&lt;H3 data-end="286" data-start="264" data-section-id="11evcgg"&gt;Root Cause Analysis&lt;/H3&gt;
&lt;P data-end="460" data-start="288"&gt;Cortex XDR’s Vulnerability Assessment for Linux currently compares installed package versions against generic version ranges from the &lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;National Vulnerability Database&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P data-end="508" data-start="462"&gt;The mismatch happens due to a few key reasons:&lt;/P&gt;
&lt;UL data-end="1241" data-start="510"&gt;
&lt;LI data-end="869" data-start="510" data-section-id="1k8t9lv"&gt;&lt;STRONG data-end="539" data-start="512"&gt;Backporting methodology&lt;/STRONG&gt;&lt;BR data-end="542" data-start="539" /&gt;Enterprise Linux distributions like &lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Red Hat Enterprise Linux&lt;/SPAN&gt;&lt;/SPAN&gt;, &lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Ubuntu&lt;/SPAN&gt;&lt;/SPAN&gt;, and &lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Debian&lt;/SPAN&gt;&lt;/SPAN&gt; often apply security fixes without changing the main version number.&lt;BR data-end="771" data-start="768" /&gt;Instead, they update the build suffix (e.g., &lt;CODE data-end="827" data-start="818"&gt;-40.el9&lt;/CODE&gt;), which contains the actual patch status.&lt;/LI&gt;
&lt;LI data-end="1029" data-start="871" data-section-id="11zkthj"&gt;&lt;STRONG data-end="891" data-start="873"&gt;NVD limitation&lt;/STRONG&gt;&lt;BR data-end="894" data-start="891" /&gt;The NVD tracks upstream versions (e.g., “&amp;lt; 1.2.12”) but does not account for distribution-specific build strings used in backporting.&lt;/LI&gt;
&lt;LI data-end="1241" data-start="1031" data-section-id="2p87bg"&gt;&lt;STRONG data-end="1057" data-start="1033"&gt;Current engine logic&lt;/STRONG&gt;&lt;BR data-end="1060" data-start="1057" /&gt;Cortex XDR primarily evaluates the base version (&lt;CODE data-end="1119" data-start="1111"&gt;1.2.11&lt;/CODE&gt;) against NVD ranges and does not fully validate whether vendor-specific patches (via build suffixes) are already applied.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1277" data-start="1248" data-section-id="sf6l9z"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-end="1277" data-start="1248" data-section-id="sf6l9z"&gt;Current Status and Roadmap&lt;/H4&gt;
&lt;P data-end="1409" data-start="1279"&gt;Palo Alto Networks engineering is working on improving this behavior by enhancing how vulnerabilities are detected and correlated.&lt;/P&gt;
&lt;P data-end="1440" data-start="1411"&gt;Ongoing improvements include:&lt;/P&gt;
&lt;UL data-end="1643" data-start="1441"&gt;
&lt;LI data-end="1480" data-start="1441" data-section-id="5bewvp"&gt;Better handling of backported patches&lt;/LI&gt;
&lt;LI data-end="1550" data-start="1481" data-section-id="zfrqtc"&gt;Integration with vendor-specific security data (such as OVAL feeds)&lt;/LI&gt;
&lt;LI data-end="1643" data-start="1551" data-section-id="w0tvfh"&gt;A next-generation vulnerability scanning approach that goes beyond simple version matching&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1683" data-start="1650" data-section-id="t9htou"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-end="1683" data-start="1650" data-section-id="t9htou"&gt;Recommended Management Actions&lt;/H4&gt;
&lt;P data-end="1779" data-start="1685"&gt;Until these improvements are fully implemented, you can handle these false positives manually:&lt;/P&gt;
&lt;H3 data-end="1803" data-start="1781" data-section-id="1vdrzq"&gt;1. Exclude the CVE&lt;/H3&gt;
&lt;UL data-end="1990" data-start="1804"&gt;
&lt;LI data-end="1849" data-start="1804" data-section-id="1hhjdhk"&gt;Go to &lt;STRONG data-end="1849" data-start="1812"&gt;Assets → Vulnerability Assessment&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI data-end="1874" data-start="1850" data-section-id="hz7duj"&gt;Locate the flagged CVE&lt;/LI&gt;
&lt;LI data-end="1911" data-start="1875" data-section-id="ecg2z2"&gt;Right-click and select &lt;STRONG data-end="1911" data-start="1900"&gt;Exclude&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI data-end="1990" data-start="1912" data-section-id="f4ze9f"&gt;Choose &lt;STRONG data-end="1948" data-start="1921"&gt;Report CVE as incorrect&lt;/STRONG&gt; to provide feedback to Palo Alto Networks&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2026" data-start="1992" data-section-id="7n2ifj"&gt;2. Verify Patch Status Locally&lt;/H4&gt;
&lt;P data-end="2113" data-start="2028"&gt;On your RHEL 9 system, you can confirm whether the vulnerability is actually patched:&lt;/P&gt;
&lt;DIV class="relative w-full mt-4 mb-1"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl"&gt;
&lt;DIV class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative z-0 flex max-w-full"&gt;
&lt;DIV id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼ5 ͼj" dir="ltr"&gt;
&lt;DIV class="cm-scroller"&gt;
&lt;DIV class="cm-content q9tKkq_readonly"&gt;&lt;SPAN&gt;rpm &lt;/SPAN&gt;&lt;SPAN class="ͼf"&gt;-q&lt;/SPAN&gt; &lt;SPAN class="ͼf"&gt;--changelog&lt;/SPAN&gt;&lt;SPAN&gt; zlib | &lt;/SPAN&gt;&lt;SPAN class="ͼd"&gt;grep&lt;/SPAN&gt;&lt;SPAN&gt; CVE&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P data-end="2262" data-start="2163"&gt;This command shows whether the relevant CVE fixes have been applied in the installed package build.&lt;/P&gt;
&lt;P data-end="2262" data-start="2163"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="117" data-start="0"&gt;To move this forward as quickly as possible, the best approach is to escalate it through the proper support channels:&lt;/P&gt;
&lt;UL data-end="590" data-start="119"&gt;
&lt;LI data-end="367" data-start="119" data-section-id="1s9g4ps"&gt;&lt;STRONG data-end="148" data-start="121"&gt;Raise a P1 support case&lt;/STRONG&gt;&lt;BR data-end="151" data-start="148" /&gt;Submit a Priority 1 case in the Palo Alto Networks support portal and clearly describe the impact. Request that the case be escalated to the Engineering team for deeper investigation or to obtain the latest update.&lt;/LI&gt;
&lt;LI data-end="590" data-start="369" data-section-id="1mbi93x"&gt;&lt;STRONG data-end="399" data-start="371"&gt;Engage your account team&lt;/STRONG&gt;&lt;BR data-end="402" data-start="399" /&gt;Reach out to your Palo Alto Networks account manager or SE. They can help internally track the issue, push for prioritization, and provide an estimated timeline (ETA) or roadmap updates.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2026 14:16:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/after-more-than-2-years-linux-vulnerability-reporting-is-still/m-p/1250725#M9209</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-03-23T14:16:43Z</dc:date>
    </item>
  </channel>
</rss>

