Skip to main content
Redhat Developers  Logo
  • AI

    Get started with AI

    • Red Hat AI
      Accelerate the development and deployment of enterprise AI solutions.
    • AI learning hub
      Explore learning materials and tools, organized by task.
    • AI interactive demos
      Click through scenarios with Red Hat AI, including training LLMs and more.
    • AI/ML learning paths
      Expand your OpenShift AI knowledge using these learning resources.
    • AI quickstarts
      Focused AI use cases designed for fast deployment on Red Hat AI platforms.
    • No-cost AI training
      Foundational Red Hat AI training.

    Featured resources

    • OpenShift AI learning
    • Open source AI for developers
    • AI product application development
    • Open source-powered AI/ML for hybrid cloud
    • AI and Node.js cheat sheet

    Red Hat AI Factory with NVIDIA

    • Red Hat AI Factory with NVIDIA is a co-engineered, enterprise-grade AI solution for building, deploying, and managing AI at scale across hybrid cloud environments.
    • Explore the solution
  • Learn

    Self-guided

    • Documentation
      Find answers, get step-by-step guidance, and learn how to use Red Hat products.
    • Learning paths
      Explore curated walkthroughs for common development tasks.
    • See all learning

    Hands-on

    • Developer Sandbox
      Spin up Red Hat's products and technologies without setup or configuration.
    • Interactive labs
      Learn by doing in these hands-on, browser-based experiences.
    • Interactive demos
      Click through product features in these guided tours.

    Browse by topic

    • AI/ML
    • Automation
    • Java
    • Kubernetes
    • Linux
    • See all topics

    Training & certifications

    • Courses and exams
    • Certifications
    • Skills assessments
    • Red Hat Academy
    • Learning subscription
    • Explore training
  • Build

    Get started

    • Red Hat build of Podman Desktop
      A downloadable, local development hub to experiment with our products and builds.
    • Developer Sandbox
      Spin up Red Hat's products and technologies without setup or configuration.

    Download products

    • Access product downloads to start building and testing right away.
    • Red Hat Enterprise Linux
    • Red Hat AI
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Featured

    • Red Hat build of OpenJDK
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenShift Dev Spaces
    • Red Hat Developer Toolset

    References

    • E-books
    • Documentation
    • Cheat sheets
    • Architecture center
  • Community

    Get involved

    • Events
    • Live AI events
    • Red Hat Summit
    • Red Hat Accelerators
    • Community discussions

    Follow along

    • Articles & blogs
    • Developer newsletter
    • Videos
    • Github

    Get help

    • Customer service
    • Customer support
    • Regional contacts
    • Find a partner

    Join the Red Hat Developer program

    • Download Red Hat products and project builds, access support documentation, learning content, and more.
    • Explore the benefits

How to reduce false positives in security scans

December 15, 2025
Miro Hrončok
Related topics:
LinuxPythonSecurity
Related products:
Red Hat Enterprise Linux

    If you've ever run a security scanner on a containerized Python application built on Fedora or Red Hat Enterprise Linux (RHEL), you might have encountered a frustrating problem: the scanner flags your setuptools or pip installation as vulnerable to a CVE that's already been patched in your RPM package. The problem? Security scanners typically only see the upstream Python package version number, not the fact that you're running a backported, security-patched version from your distribution.

    We're experimenting with a solution to this problem in Fedora Rawhide, and we'd like your feedback.

    The problem

    Version numbers don't tell the whole story. In stable Fedora releases and RHEL, the versions of setuptools and pip are often relatively old compared to upstream. However, these packages include backported security fixes. When you create a Python virtual environment in a container, security scanning tools see the version number and flag it as vulnerable—even though the actual code contains the necessary patches.

    For example, a scanner might detect setuptools 65.5.1 and flag it as vulnerable to CVE-2024-6345, without realizing that the RPM package python3.11-setuptools-65.5.1-3.el9 has already mitigated that vulnerability.

    The solution

    We're now including the Software Bill of Materials (SBOM) information directly in Python wheels packaged as RPMs in Fedora Rawhide. The SBOM data is injected into the wheels when we build them in our rpmbuild infrastructure. This metadata allows security scanners and other tools to identify that a Python package was installed from a specific Fedora or RHEL RPM-packaged wheel, complete with version and release information.

    Here's what that looks like in practice. Without SBOM, a scanner sees the following:

    $ cat /opt/app-root/lib/python3.11/site-packages/setuptools-65.5.1.dist-info/METADATA | grep Name -A1
    Name: setuptools
    Version: 65.5.1

    With SBOM included, the scanner could also read as follows:

    $ cat /opt/app-root/lib/python3.11/site-packages/setuptools-65.5.1.dist-info/sboms/bom.json 
    {
      "bomFormat": "CycloneDX",
      "specVersion": "1.6",
      "components": [
        {
          "type": "library",
          "name": "python3.11-setuptools",
          "version": "65.5.1-3.el9",
          "purl": "pkg:rpm/redhat/python3.11-setuptools@65.5.1-3.el9?arch=src"
        }
      ]
    }

    The key is the purl (package URL) field, which provides a standardized way to identify the package as originating from a specific RPM. Security scanners can use this information to check CVE databases and see that python3.11-setuptools-65.5.1-3.el9 is not vulnerable, even though upstream setuptools 65.5.1 might be.

    Note: The previous RHEL example is hypothetical. This feature is not yet available in RHEL and exists only in Fedora Rawhide as a technological preview.

    Try it in Fedora Rawhide

    This feature is currently available as a technology preview in Fedora Rawhide (the development version of Fedora) and is subject to change. Right now, we're only packaging wheels for pip and setuptools—the minimal set needed to create Python virtual environments.

    You can test it using a Fedora Rawhide container:

    $ podman run --rm -ti fedora:rawhide
    bash-5.3# dnf install python3.11
    ...
    bash-5.3# python3.11 -m venv venv
    bash-5.3# cat venv/lib/python3.11/site-packages/setuptools-80.9.0.dist-info/sboms/bom.json 
    {
      "bomFormat": "CycloneDX",
      "specVersion": "1.6",
      "components": [
        {
          "type": "library",
          "name": "python-setuptools",
          "version": "80.9.0-1.fc44",
          "purl": "pkg:rpm/fedora/python-setuptools@80.9.0-1.fc44?arch=src"
        }
      ]
    }

    This works the same way with other Python versions.

    The SBOM data is included according to PEP 770, which defines a standard location for SBOM information in Python packages. We're currently using the CycloneDX SBOM format, though this choice isn't set in stone. It was selected as a quick proof of concept rather than after an exhaustive analysis of all available SBOM standards.

    We welcome your feedback

    We're sharing this technology preview to raise awareness and gather feedback from the developer community, particularly from security scanner vendors and tool maintainers. If you're interested in seeing this feature in a future RHEL release, have concerns about the approach, or want to test integration with your scanning tools, we'd love to hear from you.

    You can start a public discussion on the Fedora Python mailing list or reach us privately at python-maint@redhat.com. Your feedback will help us determine priorities and shape the future direction of this feature. Give it a try and let us know what you think!

    Related Posts

    • Python 3.9 reaches end of life: What it means for RHEL users

    • How to implement observability with Python and Llama Stack

    • How RHEL provides secure and stable Python streams

    • Containerize Node.js applications at the edge on RHEL and Fedora

    Recent Posts

    • Confidential virtual machine storage attack scenarios

    • Introducing virtualization platform autopilot

    • Integrate zero trust workload identity manager with Red Hat OpenShift GitOps

    • Best Practice Configuration and Tuning for Linux and Windows VMs

    • Red Hat UBI 8 builders have been promoted to the Paketo Buildpacks organization

    What’s up next?

    Learning Path Python Flask App learning path feature image

    Build a bootable Python Flask application using image mode for RHEL with Podman...

    Use Podman Desktop to create a bootable Flask-based application using image...
    Red Hat Developers logo LinkedIn YouTube Twitter Facebook

    Platforms

    • Red Hat AI
    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    • See all products

    Build

    • Developer Sandbox
    • Developer tools
    • Interactive tutorials
    • API catalog

    Quicklinks

    • Learning resources
    • E-books
    • Cheat sheets
    • Blog
    • Events
    • Newsletter

    Communicate

    • About us
    • Contact sales
    • Find a partner
    • Report a website issue
    • Site status dashboard
    • Report a security problem

    RED HAT DEVELOPER

    Build here. Go anywhere.

    We serve the builders. The problem solvers who create careers with code.

    Join us if you’re a developer, software engineer, web designer, front-end designer, UX designer, computer scientist, architect, tester, product manager, project manager or team lead.

    Sign me up

    Red Hat legal and privacy links

    • About Red Hat
    • Jobs
    • Events
    • Locations
    • Contact Red Hat
    • Red Hat Blog
    • Inclusion at Red Hat
    • Cool Stuff Store
    • Red Hat Summit
    © 2026 Red Hat

    Red Hat legal and privacy links

    • Privacy statement
    • Terms of use
    • All policies and guidelines
    • Digital accessibility