You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/els-for-os/README.md
+71-43Lines changed: 71 additions & 43 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -145,11 +145,6 @@ License : GPLv2
145
145
Description : CentOS Server simulate els release files
146
146
```
147
147
148
-
### CloudLinux 6 ELS
149
-
150
-
:::tip
151
-
You do not need ELS for CentOS 6 subscription if you are already using CloudLinux OS 6. You can find more information [here](https://docs.cloudlinux.com/cln/billing/#cloudlinux-os-6-extended-lifecycle-support).
152
-
:::
153
148
154
149
### OracleLinux 6 ELS
155
150
@@ -590,54 +585,88 @@ Identifying the vulnerabilities that apply to your systems is an important task
590
585
591
586
OpenSCAP is an open source vulnerability scanner and compliance tool and it can be used to scan a system protected by TuxCare ELS. The following command show how to produce a vulnerability report for the system:
Following the example above scan results report will be saved to repot.html file in current directory. This file can then be downloaded for analysis or published directly with local web server, for example:
616
-
```
617
-
python3 -m http.server 8000
618
-
```
619
-
or for python2
620
-
```
621
-
python -m SimpleHTTPServer 8000
622
-
```
602
+
3. Reboot the system.
623
603
624
-
Assuming the above command is run from the directory with report.html file, the webpage with the report can then be accessed on `http://<server-ip-addess>:8000/report.html`cve through a web browser.
604
+
4.**RPM-based system only**: after reboot, remove older kernel versions:
The report includes a table with vulnerabilities and their status on examined system. Line as the following one reports that the system is vulnerable to the CVE-2023-2828:
611
+
4. Download OVAL stream. For example, Ubuntu 18.04:
The table also includes corresponding hyperlinks to advisory pages where the package and the version containing the fix can be found as well as the command to run on the target system in order to install the update.
Following the example above scan results report will be saved to report.html file in current directory. This file can then be downloaded for analysis or published directly with local web server, for example:
634
+
635
+
<CodeWithCopy>
636
+
637
+
```
638
+
python3 -m http.server 8000
639
+
```
640
+
641
+
</CodeWithCopy>
642
+
643
+
or for python2
644
+
645
+
<CodeWithCopy>
646
+
647
+
```
648
+
python -m SimpleHTTPServer 8000
649
+
```
650
+
651
+
</CodeWithCopy>
652
+
653
+
Assuming the above command is run from the directory with report.html file, the webpage with the report can then be accessed on `http://<server-ip-addess>:8000/report.html`cve through a web browser.
The report includes a table with vulnerabilities and their status on examined system. Line as the following one reports that the system is vulnerable to the CVE-2023-2828:
The table also includes corresponding hyperlinks to advisory pages where the package and the version containing the fix can be found as well as the command to run on the target system in order to install the update.
664
+
665
+
Lines like the one below designate that the fix for corresponding CVE is allready installed on the system, and no further action is needed:
0 commit comments