Red Hat Training

A Red Hat training course is available for Red Hat Enterprise Linux

8.7. Practical Examples

This section demonstrates practical usage of certain security content provided for Red Hat products.

8.7.1. Auditing Security Vulnerabilities of Red Hat Products

Red Hat continuously provides OVAL definitions for their products. These definitions allow for fully automated audit of vulnerabilities in the installed software. To find out more information about this project, see To download these definitions, run the following command:
~]$ wget
The users of Red Hat Satellite 5 may find useful the XCCDF part of the patch definitions. To download these definitions, run the following command:
~]$ wget
To audit security vulnerabilities for the software installed on the system, run the following command:
~]$ oscap oval eval --results rhsa-results-oval.xml --report oval-report.html com.redhat.rhsa-all.xml
The oscap utility maps Red Hat Security Advisories to CVE identifiers that are linked to the National Vulnerability Database and reports which security advisories are not applied.


Note that these OVAL definitions are designed to only cover software and updates released by Red Hat. You need to provide additional definitions in order to detect the patch status of third-party software.