Skip to content

Commit 6f2183b

Browse files
committed
Updates
1 parent eafe2ff commit 6f2183b

File tree

8 files changed

+38
-16
lines changed

8 files changed

+38
-16
lines changed

docs/.vuepress/config-client/sidebar.ts

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -36,7 +36,7 @@ export default {
3636
"/els-for-os/centos-stream-8-els/",
3737
"/els-for-os/oracle-linux-6-els/",
3838
"/els-for-os/oracle-linux-7-els/",
39-
"/els-for-os/rhel-7-els/",
39+
"/els-for-os/red-hat-enterprise-linux-7-els/",
4040
"/els-for-os/ubuntu-16-04-els/",
4141
"/els-for-os/ubuntu-18-04-els/",
4242
"/els-for-os/ubuntu-20-04-els/",

docs/.vuepress/routes.json

Lines changed: 23 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,5 +90,27 @@
9090
"/els-for-languages/spring/#incident-reporting-and-response-timeframe": "/els-for-runtimes-and-libraries/#incident-reporting-and-response-timeframe",
9191
"/els-for-languages/spring/#enhanced-transparency-visibility": "/els-for-runtimes-and-libraries/#enhanced-transparency-visibility",
9292
"/els-for-languages/spring/#technical-support": "/els-for-runtimes-and-libraries/#technical-support",
93-
"/els-for-languages/python-libraries/": "/els-for-runtimes-and-libraries/python-libraries/"
93+
"/els-for-languages/python-libraries/": "/els-for-runtimes-and-libraries/python-libraries/",
94+
"/els-for-os/#cve-status-definition": "/els-for-os/security-updates/#cve-status-definition",
95+
"/els-for-os/#errata-advisories": "/els-for-os/security-updates/#errata-advisories",
96+
"/els-for-os/#oval-patch-definitions": "/els-for-os/security-updates/#oval-patch-definitions",
97+
"/els-for-os/#centos-6-els": "/els-for-os/centos-6-els/",
98+
"/els-for-os/#oraclelinux-6-els": "/els-for-os/oracle-linux-6-els/",
99+
"/els-for-os/#oraclelinux-7-els": "/els-for-os/oracle-linux-7-els/",
100+
"/els-for-os/#common-use-cases": "/els-for-os/oracle-linux-7-els/#common-use-cases",
101+
"/els-for-os/#centos-7-els": "/els-for-os/centos-7-els/",
102+
"/els-for-os/#red-hat-enterprise-linux-7-els": "red-hat-enterprise-linux-7-els",
103+
"/els-for-os/#centos-8-els": "/els-for-os/centos-8-els/",
104+
"/els-for-os/#centos-stream-8-els": "/els-for-os/centos-8-els/",
105+
"/els-for-os/#ubuntu-16-04-els": "/els-for-os/ubuntu-16-04-els/",
106+
"/els-for-os/#ubuntu-18-04-els": "/els-for-os/ubuntu-18-04-els/",
107+
"/els-for-os/#ubuntu-20-04-els": "/els-for-os/ubuntu-20-04-els/",
108+
"/els-for-os/#oval-data": "/els-for-os/security-updates/#oval-patch-definitions",
109+
"/els-for-os/#introduction": "/els-for-os/security-updates/#oval-patch-definitions",
110+
"/els-for-os/#tuxcare-els-oval-streams": "/els-for-os/security-updates/#tuxcare-els-oval-streams",
111+
"/els-for-os/#how-to-use-openscap-with-tuxcare-els": "/els-for-os/security-updates/#how-to-use-openscap-with-tuxcare-els",
112+
"/els-for-os/#how-integrate-the-oval-data-with-a-new-vulnerability-scanner": "/els-for-os/security-updates/#how-to-integrate-the-oval-data-with-a-new-vulnerability-scanner",
113+
"/els-for-os/#tuxcare-csaf-data": "/els-for-os/security-updates/#tuxcare-csaf-data",
114+
"/els-for-os/#common-security-advisory-framework": "/els-for-os/security-updates/#common-security-advisory-framework",
115+
"/els-for-os/#tuxcare-els-rss-releases-feeds": "/els-for-os/security-updates/#tuxcare-els-rss-releases-feeds"
94116
}

docs/els-for-os/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ Our ELS service is designed to provide solutions for organizations that are not
1212
* [CentOS Stream 8](./centos-stream-8-els)
1313
* [Oracle Linux 6](./oracle-linux-6-els)
1414
* [Oracle Linux 7](./oracle-linux-7-els)
15-
* [Red Hat Enterprise Linux 7](./rhel-7-els)
15+
* [Red Hat Enterprise Linux 7](./red-hat-enterprise-linux-7-els)
1616
* [Ubuntu 16.04](./ubuntu-16-04-els)
1717
* [Ubuntu 18.04](./ubuntu-18-04-els)
1818
* [Ubuntu 20.04](./ubuntu-20-04-els)

docs/els-for-os/rhel-7-els/README.md renamed to docs/els-for-os/red-hat-enterprise-linux-7-els/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Red Hat Enterprise Linux 7
1+
# Red Hat Enterprise Linux 7 ELS
22

33
## Connection to ELS repository
44

docs/els-for-os/security-updates/README.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -6,15 +6,15 @@ TuxCare provides the following security updates for ELS for OS:
66
* [Open Vulnerability and Assessment Language (OVAL)](#oval-patch-definitions)
77
* [Common Security Advisory Framework (CSAF)](#common-security-advisory-framework)
88

9-
Released Fixes are available via [cve.tuxcare.com](https://cve.tuxcare.com/els/releases) and additionaly, can be found on [security.tuxcare.com](https://security.tuxcare.com).
9+
Released Fixes are available via [cve.tuxcare.com](https://cve.tuxcare.com/els/releases) and can additionally be found on [security.tuxcare.com](https://security.tuxcare.com).
1010

1111
## Errata advisories
1212

1313
TuxCare Endless Lifecycle Support provides qualified security and selected bug-fix errata advisories across all architectures. They can help users track which CVEs are resolved and which bugs have been addressed.
1414

1515
You can view the full list of released fixes on [cve.tuxcare.com](https://cve.tuxcare.com/els/releases).
1616

17-
### CVE status definition
17+
## CVE status definition
1818

1919
- Needs Triage: Vulnerability information received and pending initial review
2020
- In Research: Investigating the details of the vulnerability
@@ -93,9 +93,9 @@ OpenSCAP is an open source vulnerability scanner and compliance tool and it can
9393

9494
</CodeWithCopy>
9595

96-
4. Examine scan results report.
96+
4. Examine the scan results report.
9797

98-
Following the example above scan results report will be saved to report.html file in current directory. This file can then be downloaded for analysis or published directly with local web server, for example:
98+
Following the example above scan results report will be saved to report.html file in current directory. This file can then be downloaded for analysis or published directly with a local web server, for example:
9999

100100
<CodeWithCopy>
101101

@@ -115,31 +115,31 @@ OpenSCAP is an open source vulnerability scanner and compliance tool and it can
115115

116116
</CodeWithCopy>
117117

118-
Assuming the above command is run from the directory with report.html file, the webpage with the report can then be accessed on `http://<server-ip-addess>:8000/report.html`cve through a web browser.
118+
Assuming the above command is run from the directory with the report.html file, the webpage with the report can then be accessed on `http://<server-ip-addess>:8000/report.html` through a web browser.
119119

120120
**Note: the OpenSCAP report below is provided as an example. The results will vary depending on the OS and version you are scanning.**
121121

122122
![](/images/available-cve-fixes-and-their-status.png)
123123

124-
The report includes a table with vulnerabilities and their status on examined system. Line as the following one reports that the system is vulnerable to the CVE-2023-2828:
124+
The report includes a table with vulnerabilities and their status on the examined system. Line, as the one below, reports that the system is vulnerable to CVE-2023-2828:
125125

126126
```
127127
update oval:com.tuxcare.clsa:def:1688677755 true patch [CLSA-2023:1688677755], [CVE-2023-2828] Fix CVE(s): CVE-2023-2828
128128
```
129129

130130
The table also includes corresponding hyperlinks to advisory pages where the package and the version containing the fix can be found as well as the command to run on the target system in order to install the update.
131131

132-
Lines like the one below designate that the fix for corresponding CVE is allready installed on the system, and no further action is needed:
132+
Lines like the one below designate that the fix for the corresponding CVE is already installed on the system, and no further action is needed:
133133

134134
```
135135
oval:com.tuxcare.clsa:def:1694538670 false patch [CLSA-2023:1694538670], [CVE-2022-40433] Fix CVE(s): CVE-2022-40433
136136
```
137137

138-
### How integrate the OVAL data with a new vulnerability scanner
138+
### How to integrate the OVAL data with a new vulnerability scanner
139139

140140
Identifying the vulnerabilities that apply to your systems is an important task for IT and InfoSec teams, and at TuxCare we make it easy.
141141

142-
To detect whether a system has TuxCare ELS installed, check for following file being present: `/etc/els-release`.
142+
To detect whether a system has TuxCare ELS installed, check for the following file being present: `/etc/els-release`.
143143

144144
Once that is validated, you can use the corresponding to the operating system OVAL files from above to scan for vulnerabilities.
145145

docs/els-for-os/ubuntu-16-04-els/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Ubuntu 16.04
1+
# Ubuntu 16.04 ELS
22

33
## Connection to ELS repository
44

docs/els-for-os/ubuntu-18-04-els/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Ubuntu 18.04
1+
# Ubuntu 18.04 ELS
22

33
## Connection to ELS repository
44

docs/els-for-os/ubuntu-20-04-els/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,4 +1,4 @@
1-
# Ubuntu 20.04
1+
# Ubuntu 20.04 ELS
22

33
## Connection to ELS repository
44

0 commit comments

Comments
 (0)