Skip to content

Commit 1182e54

Browse files
authored
Merge pull request #213 from sboldyreva/os-new
ELS for OS: updates
2 parents 924fc6b + 9283592 commit 1182e54

File tree

4 files changed

+56
-27
lines changed

4 files changed

+56
-27
lines changed

docs/.vuepress/config-client/sidebar.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -40,7 +40,7 @@ export default {
4040
"/els-for-os/ubuntu-16-04-els/",
4141
"/els-for-os/ubuntu-18-04-els/",
4242
"/els-for-os/ubuntu-20-04-els/",
43-
"/els-for-os/security-updates/",
43+
"/els-for-os/machine-readable-security-data/",
4444
]
4545
},
4646
],

docs/.vuepress/routes.json

Lines changed: 10 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -90,9 +90,8 @@
9090
"/els-for-languages/spring-framework-and-spring-boot/#technical-support": "/els-for-runtimes-and-libraries/#technical-support",
9191
"/els-for-languages/python-libraries/": "/els-for-runtimes-and-libraries/python-libraries/",
9292
"/local-mirror-els-for-languages/": "/local-mirror-for-els-php/",
93-
"/els-for-os/#cve-status-definition": "/els-for-os/security-updates/#cve-status-definition",
94-
"/els-for-os/#errata-advisories": "/els-for-os/security-updates/#errata-advisories",
95-
"/els-for-os/#oval-patch-definitions": "/els-for-os/security-updates/#oval-patch-definitions",
93+
"/els-for-os/#errata-advisories": "/els-for-os/machine-readable-security-data/#errata-advisories",
94+
"/els-for-os/#oval-patch-definitions": "/els-for-os/machine-readable-security-data/#oval-patch-definitions",
9695
"/els-for-os/#centos-6-els": "/els-for-os/centos-6-els/",
9796
"/els-for-os/#oraclelinux-6-els": "/els-for-os/oracle-linux-6-els/",
9897
"/els-for-os/#oraclelinux-7-els": "/els-for-os/oracle-linux-7-els/",
@@ -104,12 +103,12 @@
104103
"/els-for-os/#ubuntu-16-04-els": "/els-for-os/ubuntu-16-04-els/",
105104
"/els-for-os/#ubuntu-18-04-els": "/els-for-os/ubuntu-18-04-els/",
106105
"/els-for-os/#ubuntu-20-04-els": "/els-for-os/ubuntu-20-04-els/",
107-
"/els-for-os/#oval-data": "/els-for-os/security-updates/#oval-patch-definitions",
108-
"/els-for-os/#introduction": "/els-for-os/security-updates/#oval-patch-definitions",
109-
"/els-for-os/#tuxcare-els-oval-streams": "/els-for-os/security-updates/#tuxcare-els-oval-streams",
110-
"/els-for-os/#how-to-use-openscap-with-tuxcare-els": "/els-for-os/security-updates/#how-to-use-openscap-with-tuxcare-els",
111-
"/els-for-os/#how-integrate-the-oval-data-with-a-new-vulnerability-scanner": "/els-for-os/security-updates/#how-to-integrate-the-oval-data-with-a-new-vulnerability-scanner",
112-
"/els-for-os/#tuxcare-csaf-data": "/els-for-os/security-updates/#tuxcare-csaf-data",
113-
"/els-for-os/#common-security-advisory-framework": "/els-for-os/security-updates/#common-security-advisory-framework",
114-
"/els-for-os/#tuxcare-els-rss-releases-feeds": "/els-for-os/security-updates/#tuxcare-els-rss-releases-feeds"
106+
"/els-for-os/#oval-data": "/els-for-os/machine-readable-security-data/#oval-patch-definitions",
107+
"/els-for-os/#introduction": "/els-for-os/machine-readable-security-data/#oval-patch-definitions",
108+
"/els-for-os/#tuxcare-els-oval-streams": "/els-for-os/machine-readable-security-data/#tuxcare-els-oval-streams",
109+
"/els-for-os/#how-to-use-openscap-with-tuxcare-els": "/els-for-os/machine-readable-security-data/#how-to-use-openscap-with-tuxcare-els",
110+
"/els-for-os/#how-integrate-the-oval-data-with-a-new-vulnerability-scanner": "/els-for-os/machine-readable-security-data/#how-to-integrate-the-oval-data-with-a-new-vulnerability-scanner",
111+
"/els-for-os/#tuxcare-csaf-data": "/els-for-os/machine-readable-security-data/#tuxcare-csaf-data",
112+
"/els-for-os/#common-security-advisory-framework": "/els-for-os/machine-readable-security-data/#common-security-advisory-framework",
113+
"/els-for-os/#tuxcare-els-rss-releases-feeds": "/els-for-os/machine-readable-security-data/#tuxcare-els-rss-releases-feeds"
115114
}

docs/els-for-os/README.md

Lines changed: 44 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -25,8 +25,6 @@ TuxCare Endless Lifecycle Support, by default, provides security patches for Hig
2525

2626
Custom coverage options are available, including a 10-pack of customer-directed patches for clients who need CVEs patched outside of the ELS scope. Specific details regarding these coverage options and their pricing can be obtained by contacting our sales team.
2727

28-
More about [security updates](./security-updates/).
29-
3028
## Target response times
3129

3230
Aligning with many industry standards and regulatory requirements, TuxCare is committed to delivering timely security updates. For instance, the Payment Card Industry Data Security Standard (PCI DSS) mandates that all 'High' vulnerabilities (CVSS score of 7.0+) must be addressed within 30 days. Other regulations and standards, such as the Health Insurance Portability and Accountability Act (HIPAA) for healthcare or the Federal Information Security Management Act (FISMA) for government agencies, uphold similar requirements.
@@ -35,6 +33,50 @@ We aim to deliver security patches for critical and high-risk vulnerabilities (C
3533

3634
Requests for customer-directed security patches for CVEs that are outside of the ELS scope will be reviewed within 3 working days. If the request is accepted, we will provide the patch within the next 14 days.
3735

36+
## Rollout Process
37+
38+
For several platforms, TuxCare delivers security updates through a staged rollout repositories. This process may take up to 14 additional days after a patch is published to stable repositories.
39+
40+
During the rollout period, updates are applied in the usual way with standard package manager commands.
41+
42+
**For example, standard update for kernel**:
43+
44+
<CodeWithCopy>
45+
46+
```
47+
yum update kernel*
48+
```
49+
50+
</CodeWithCopy>
51+
52+
If you need to apply the fix immediately without waiting for the rollout to complete, you can use the bypass repository. The necessary instructions are always provided on the release information page.
53+
54+
**For example (packages in the 3rd rollout slot)**:
55+
56+
<CodeWithCopy>
57+
58+
```
59+
yum update kernel* --enablerepo=centos7els-rollout-3-bypass
60+
```
61+
62+
</CodeWithCopy>
63+
64+
You can track the status of vulnerabilities and their corresponding fixes via [cve.tuxcare.com](https://cve.tuxcare.com/):
65+
* [Vulnerabilities](https://cve.tuxcare.com/els/cve)
66+
* [Fixes](https://cve.tuxcare.com/els/releases)
67+
68+
## CVE status definition
69+
70+
- Needs Triage: Vulnerability information received and pending initial review
71+
- In Research: Investigating the details of the vulnerability
72+
- In Progress: Developing a fix for the identified vulnerability
73+
- In Testing: Testing the developed fix for the vulnerability
74+
- In Rollout: Releasing the fix in rollout repositories
75+
- Released: Fix has been fully released to all users
76+
- Ignored: This CVE is ignored for specific reasons (low score or another), detailed in the statement field
77+
- Not Vulnerable: The vulnerability does not affect our version
78+
- Already Fixed: The vulnerability has already been addressed by the vendor
79+
3880
## Supported packages
3981

4082
TuxCare's Endless Lifecycle Support provides updates for a comprehensive list of packages integral to server operations (100+ packages), providing maximum security for your operating system. You can view the full list of supported packages for each operating system, as well as get detailed information on the patched Common Vulnerabilities and Exposures (CVEs), [here](https://cve.tuxcare.com/els/projects). The list of supported packages may change as projects can be added or removed from the list. Support for additional packages can be provided on request.

docs/els-for-os/security-updates/README.md renamed to docs/els-for-os/machine-readable-security-data/README.md

Lines changed: 1 addition & 13 deletions
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Security Updates
1+
# Machine-Readable Security Data (Errata, OVAL, CSAF)
22

33
TuxCare provides the following security updates for ELS for OS:
44

@@ -14,18 +14,6 @@ TuxCare Endless Lifecycle Support provides qualified security and selected bug-f
1414

1515
You can view the full list of released fixes on [cve.tuxcare.com](https://cve.tuxcare.com/els/releases).
1616

17-
## CVE status definition
18-
19-
- Needs Triage: Vulnerability information received and pending initial review
20-
- In Research: Investigating the details of the vulnerability
21-
- In Progress: Developing a fix for the identified vulnerability
22-
- In Testing: Testing the developed fix for the vulnerability
23-
- In Rollout: Releasing the fix in rollout repositories
24-
- Released: Fix has been fully released to all users
25-
- Ignored: This CVE is ignored for specific reasons (low score or another), detailed in the statement field
26-
- Not Vulnerable: The vulnerability does not affect our version
27-
- Already Fixed: The vulnerability has already been addressed by the vendor
28-
2917
## OVAL patch definitions
3018

3119
Leveraging the Open Vulnerability and Assessment Language (OVAL) patch definitions with OVAL-compatible tools, e.g. OpenSCAP, users can accurately check their systems for the presence of vulnerabilities.

0 commit comments

Comments
 (0)