<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: After more than 2 years Linux vulnerability reporting is still useless. in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/after-more-than-2-years-linux-vulnerability-reporting-is-still/m-p/1253628#M9322</link>
    <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1660628707"&gt;@edvardgooijenga&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="25" data-start="0"&gt;Thank you for the update.&lt;/P&gt;
&lt;P data-end="25" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="124" data-start="27"&gt;Understood. We will wait for the TAC response and proceed further based on their recommendations.&lt;/P&gt;
&lt;P data-end="124" data-start="27"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="216" data-start="126"&gt;If any additional information or assistance is required from our side, please let us know.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Thu, 07 May 2026 13:38:52 GMT</pubDate>
    <dc:creator>susekar</dc:creator>
    <dc:date>2026-05-07T13:38:52Z</dc:date>
    <item>
      <title>After more than 2 years Linux vulnerability reporting is still useless.</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/after-more-than-2-years-linux-vulnerability-reporting-is-still/m-p/1250679#M9206</link>
      <description>&lt;P&gt;It is about 2 years ago that the Linux vulnerabilities reporting issues where announced to Palo Alto.&lt;BR /&gt;It's still not fixed. &lt;span class="lia-unicode-emoji" title=":disappointed_face:"&gt;😞&lt;/span&gt;&lt;BR /&gt;&lt;BR /&gt;It looks like Cortex does not look beyond the dash in the version numbers of installed applications.&amp;nbsp; For example; Cortex is reporting a vulnerable zlib 1.2.11&lt;BR /&gt;The one actually installed was: zlib.x86_64 1.2.11-40.el9&lt;BR /&gt;which was the patched version.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Reported it again and so far no progress or action.&lt;BR /&gt;We're currently investigating a Cortex replacement due to Palo's lack of actions on this one and other reported Cortex issues.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2026 08:32:53 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/after-more-than-2-years-linux-vulnerability-reporting-is-still/m-p/1250679#M9206</guid>
      <dc:creator>edvardgooijenga</dc:creator>
      <dc:date>2026-03-23T08:32:53Z</dc:date>
    </item>
    <item>
      <title>Re: After more than 2 years Linux vulnerability reporting is still useless.</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/after-more-than-2-years-linux-vulnerability-reporting-is-still/m-p/1250725#M9209</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1660628707"&gt;@edvardgooijenga&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Greetings for the day.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="257" data-start="0"&gt;The behavior you’re seeing—where Cortex XDR Vulnerability Assessment flags a patched Linux package (e.g., reporting &lt;CODE data-end="129" data-start="116"&gt;zlib 1.2.11&lt;/CODE&gt; as vulnerable even though &lt;CODE data-end="171" data-start="156"&gt;1.2.11-40.el9&lt;/CODE&gt; is installed)—is a known limitation related to how backported packages are evaluated.&lt;/P&gt;
&lt;H3 data-end="286" data-start="264" data-section-id="11evcgg"&gt;Root Cause Analysis&lt;/H3&gt;
&lt;P data-end="460" data-start="288"&gt;Cortex XDR’s Vulnerability Assessment for Linux currently compares installed package versions against generic version ranges from the &lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;National Vulnerability Database&lt;/SPAN&gt;&lt;/SPAN&gt;.&lt;/P&gt;
&lt;P data-end="508" data-start="462"&gt;The mismatch happens due to a few key reasons:&lt;/P&gt;
&lt;UL data-end="1241" data-start="510"&gt;
&lt;LI data-end="869" data-start="510" data-section-id="1k8t9lv"&gt;&lt;STRONG data-end="539" data-start="512"&gt;Backporting methodology&lt;/STRONG&gt;&lt;BR data-end="542" data-start="539" /&gt;Enterprise Linux distributions like &lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Red Hat Enterprise Linux&lt;/SPAN&gt;&lt;/SPAN&gt;, &lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Ubuntu&lt;/SPAN&gt;&lt;/SPAN&gt;, and &lt;SPAN class="hover:entity-accent entity-underline inline cursor-pointer align-baseline"&gt;&lt;SPAN class="whitespace-normal"&gt;Debian&lt;/SPAN&gt;&lt;/SPAN&gt; often apply security fixes without changing the main version number.&lt;BR data-end="771" data-start="768" /&gt;Instead, they update the build suffix (e.g., &lt;CODE data-end="827" data-start="818"&gt;-40.el9&lt;/CODE&gt;), which contains the actual patch status.&lt;/LI&gt;
&lt;LI data-end="1029" data-start="871" data-section-id="11zkthj"&gt;&lt;STRONG data-end="891" data-start="873"&gt;NVD limitation&lt;/STRONG&gt;&lt;BR data-end="894" data-start="891" /&gt;The NVD tracks upstream versions (e.g., “&amp;lt; 1.2.12”) but does not account for distribution-specific build strings used in backporting.&lt;/LI&gt;
&lt;LI data-end="1241" data-start="1031" data-section-id="2p87bg"&gt;&lt;STRONG data-end="1057" data-start="1033"&gt;Current engine logic&lt;/STRONG&gt;&lt;BR data-end="1060" data-start="1057" /&gt;Cortex XDR primarily evaluates the base version (&lt;CODE data-end="1119" data-start="1111"&gt;1.2.11&lt;/CODE&gt;) against NVD ranges and does not fully validate whether vendor-specific patches (via build suffixes) are already applied.&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1277" data-start="1248" data-section-id="sf6l9z"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-end="1277" data-start="1248" data-section-id="sf6l9z"&gt;Current Status and Roadmap&lt;/H4&gt;
&lt;P data-end="1409" data-start="1279"&gt;Palo Alto Networks engineering is working on improving this behavior by enhancing how vulnerabilities are detected and correlated.&lt;/P&gt;
&lt;P data-end="1440" data-start="1411"&gt;Ongoing improvements include:&lt;/P&gt;
&lt;UL data-end="1643" data-start="1441"&gt;
&lt;LI data-end="1480" data-start="1441" data-section-id="5bewvp"&gt;Better handling of backported patches&lt;/LI&gt;
&lt;LI data-end="1550" data-start="1481" data-section-id="zfrqtc"&gt;Integration with vendor-specific security data (such as OVAL feeds)&lt;/LI&gt;
&lt;LI data-end="1643" data-start="1551" data-section-id="w0tvfh"&gt;A next-generation vulnerability scanning approach that goes beyond simple version matching&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="1683" data-start="1650" data-section-id="t9htou"&gt;&amp;nbsp;&lt;/H4&gt;
&lt;H4 data-end="1683" data-start="1650" data-section-id="t9htou"&gt;Recommended Management Actions&lt;/H4&gt;
&lt;P data-end="1779" data-start="1685"&gt;Until these improvements are fully implemented, you can handle these false positives manually:&lt;/P&gt;
&lt;H3 data-end="1803" data-start="1781" data-section-id="1vdrzq"&gt;1. Exclude the CVE&lt;/H3&gt;
&lt;UL data-end="1990" data-start="1804"&gt;
&lt;LI data-end="1849" data-start="1804" data-section-id="1hhjdhk"&gt;Go to &lt;STRONG data-end="1849" data-start="1812"&gt;Assets → Vulnerability Assessment&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI data-end="1874" data-start="1850" data-section-id="hz7duj"&gt;Locate the flagged CVE&lt;/LI&gt;
&lt;LI data-end="1911" data-start="1875" data-section-id="ecg2z2"&gt;Right-click and select &lt;STRONG data-end="1911" data-start="1900"&gt;Exclude&lt;/STRONG&gt;&lt;/LI&gt;
&lt;LI data-end="1990" data-start="1912" data-section-id="f4ze9f"&gt;Choose &lt;STRONG data-end="1948" data-start="1921"&gt;Report CVE as incorrect&lt;/STRONG&gt; to provide feedback to Palo Alto Networks&lt;/LI&gt;
&lt;/UL&gt;
&lt;H4 data-end="2026" data-start="1992" data-section-id="7n2ifj"&gt;2. Verify Patch Status Locally&lt;/H4&gt;
&lt;P data-end="2113" data-start="2028"&gt;On your RHEL 9 system, you can confirm whether the vulnerability is actually patched:&lt;/P&gt;
&lt;DIV class="relative w-full mt-4 mb-1"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="h-full min-h-0 min-w-0"&gt;
&lt;DIV class="border border-token-border-light border-radius-3xl corner-superellipse/1.1 rounded-3xl"&gt;
&lt;DIV class="h-full w-full border-radius-3xl bg-token-bg-elevated-secondary corner-superellipse/1.1 overflow-clip rounded-3xl lxnfua_clipPathFallback"&gt;
&lt;DIV class=""&gt;
&lt;DIV class="relative z-0 flex max-w-full"&gt;
&lt;DIV id="code-block-viewer" class="q9tKkq_viewer cm-editor z-10 light:cm-light dark:cm-light flex h-full w-full flex-col items-stretch ͼ5 ͼj" dir="ltr"&gt;
&lt;DIV class="cm-scroller"&gt;
&lt;DIV class="cm-content q9tKkq_readonly"&gt;&lt;SPAN&gt;rpm &lt;/SPAN&gt;&lt;SPAN class="ͼf"&gt;-q&lt;/SPAN&gt; &lt;SPAN class="ͼf"&gt;--changelog&lt;/SPAN&gt;&lt;SPAN&gt; zlib | &lt;/SPAN&gt;&lt;SPAN class="ͼd"&gt;grep&lt;/SPAN&gt;&lt;SPAN&gt; CVE&lt;/SPAN&gt;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class=""&gt;
&lt;DIV class=""&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;LI-WRAPPER&gt;&lt;/LI-WRAPPER&gt;&lt;/P&gt;
&lt;P data-end="2262" data-start="2163"&gt;This command shows whether the relevant CVE fixes have been applied in the installed package build.&lt;/P&gt;
&lt;P data-end="2262" data-start="2163"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="117" data-start="0"&gt;To move this forward as quickly as possible, the best approach is to escalate it through the proper support channels:&lt;/P&gt;
&lt;UL data-end="590" data-start="119"&gt;
&lt;LI data-end="367" data-start="119" data-section-id="1s9g4ps"&gt;&lt;STRONG data-end="148" data-start="121"&gt;Raise a P1 support case&lt;/STRONG&gt;&lt;BR data-end="151" data-start="148" /&gt;Submit a Priority 1 case in the Palo Alto Networks support portal and clearly describe the impact. Request that the case be escalated to the Engineering team for deeper investigation or to obtain the latest update.&lt;/LI&gt;
&lt;LI data-end="590" data-start="369" data-section-id="1mbi93x"&gt;&lt;STRONG data-end="399" data-start="371"&gt;Engage your account team&lt;/STRONG&gt;&lt;BR data-end="402" data-start="399" /&gt;Reach out to your Palo Alto Networks account manager or SE. They can help internally track the issue, push for prioritization, and provide an estimated timeline (ETA) or roadmap updates.&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you feel this has answered your query, please let us know by clicking like and on&amp;nbsp;&lt;STRONG&gt;"mark this as a Solution".&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks &amp;amp; Regards,&lt;BR /&gt;S. Subashkar Sekar&lt;/P&gt;</description>
      <pubDate>Mon, 23 Mar 2026 14:16:43 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/after-more-than-2-years-linux-vulnerability-reporting-is-still/m-p/1250725#M9209</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-03-23T14:16:43Z</dc:date>
    </item>
    <item>
      <title>Re: After more than 2 years Linux vulnerability reporting is still useless.</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/after-more-than-2-years-linux-vulnerability-reporting-is-still/m-p/1253622#M9319</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;Thanks for the reply, there are already two TAC cases ongoing for this.&amp;nbsp;&lt;BR /&gt;The XDR agent reports the full package name (e.g. the same details as the rpm command reports).&lt;BR /&gt;But somewhere this data gets truncated (for reasons beyond me) which results in the false positives.&lt;BR /&gt;We've received confirmation that PA is going to look into the issue again so fingers crossed this can still be resolved soon,&lt;BR /&gt;This would save us having to purchase an extra Nessus host for vulnerability scanning that does work as it should.&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2026 10:39:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/after-more-than-2-years-linux-vulnerability-reporting-is-still/m-p/1253622#M9319</guid>
      <dc:creator>edvardgooijenga</dc:creator>
      <dc:date>2026-05-07T10:39:22Z</dc:date>
    </item>
    <item>
      <title>Re: After more than 2 years Linux vulnerability reporting is still useless.</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/after-more-than-2-years-linux-vulnerability-reporting-is-still/m-p/1253628#M9322</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/1660628707"&gt;@edvardgooijenga&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="25" data-start="0"&gt;Thank you for the update.&lt;/P&gt;
&lt;P data-end="25" data-start="0"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-end="124" data-start="27"&gt;Understood. We will wait for the TAC response and proceed further based on their recommendations.&lt;/P&gt;
&lt;P data-end="124" data-start="27"&gt;&amp;nbsp;&lt;/P&gt;
&lt;P data-is-only-node="" data-is-last-node="" data-end="216" data-start="126"&gt;If any additional information or assistance is required from our side, please let us know.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2026 13:38:52 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/after-more-than-2-years-linux-vulnerability-reporting-is-still/m-p/1253628#M9322</guid>
      <dc:creator>susekar</dc:creator>
      <dc:date>2026-05-07T13:38:52Z</dc:date>
    </item>
  </channel>
</rss>

