You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Released Fixes are available via [cve.tuxcare.com](https://cve.tuxcare.com/els/releases) and additionaly, can be found on [security.tuxcare.com](https://security.tuxcare.com).
9
+
Released Fixes are available via [cve.tuxcare.com](https://cve.tuxcare.com/els/releases) and can additionally be found on [security.tuxcare.com](https://security.tuxcare.com).
10
10
11
11
## Errata advisories
12
12
13
13
TuxCare Endless Lifecycle Support provides qualified security and selected bug-fix errata advisories across all architectures. They can help users track which CVEs are resolved and which bugs have been addressed.
14
14
15
15
You can view the full list of released fixes on [cve.tuxcare.com](https://cve.tuxcare.com/els/releases).
16
16
17
-
###CVE status definition
17
+
## CVE status definition
18
18
19
19
- Needs Triage: Vulnerability information received and pending initial review
20
20
- In Research: Investigating the details of the vulnerability
@@ -93,9 +93,9 @@ OpenSCAP is an open source vulnerability scanner and compliance tool and it can
93
93
94
94
</CodeWithCopy>
95
95
96
-
4. Examine scan results report.
96
+
4. Examine the scan results report.
97
97
98
-
Following the example above scan results report will be saved to report.html file in current directory. This file can then be downloaded for analysis or published directly with local web server, for example:
98
+
Following the example above scan results report will be saved to report.html file in current directory. This file can then be downloaded for analysis or published directly with a local web server, for example:
99
99
100
100
<CodeWithCopy>
101
101
@@ -115,31 +115,31 @@ OpenSCAP is an open source vulnerability scanner and compliance tool and it can
115
115
116
116
</CodeWithCopy>
117
117
118
-
Assuming the above command is run from the directory with report.html file, the webpage with the report can then be accessed on `http://<server-ip-addess>:8000/report.html`cve through a web browser.
118
+
Assuming the above command is run from the directory with the report.html file, the webpage with the report can then be accessed on `http://<server-ip-addess>:8000/report.html` through a web browser.
119
119
120
120
**Note: the OpenSCAP report below is provided as an example. The results will vary depending on the OS and version you are scanning.**
The report includes a table with vulnerabilities and their status on examined system. Line as the following one reports that the system is vulnerable to theCVE-2023-2828:
124
+
The report includes a table with vulnerabilities and their status on the examined system. Line, as the one below, reports that the system is vulnerable to CVE-2023-2828:
The table also includes corresponding hyperlinks to advisory pages where the package and the version containing the fix can be found as well as the command to run on the target system in order to install the update.
131
131
132
-
Lines like the one below designate that the fix for corresponding CVE is allready installed on the system, and no further action is needed:
132
+
Lines like the one below designate that the fix for the corresponding CVE is already installed on the system, and no further action is needed:
0 commit comments