Skip to content

Commit b25fbaf

Browse files
authored
Merge pull request #193 from sboldyreva/os
Update ELS for OS
2 parents 4e6790a + c80c3e4 commit b25fbaf

File tree

2 files changed

+72
-43
lines changed

2 files changed

+72
-43
lines changed

docs/.vuepress/routes.json

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,7 @@
3030
"/els-for-languages/php/#download-tuxcare-php-windows": "/els-for-languages/php/#download-and-install-tuxcare-php-windows",
3131
"/els-for-languages/php/#configure-php": "/els-for-languages/php/#download-and-install-tuxcare-php-windows",
3232
"/els-for-languages/php/#add-php-to-the-system-path": "/els-for-languages/php/#download-and-install-tuxcare-php-windows",
33+
"/els-for-os/#cloudlinux-6-els": "/els-for-os/",
3334
"/els-for-languages/php/#additional-configurations-optional": "/els-for-languages/php/#Enabling_a_module",
3435
"/els-for-languages/php/#enabling-a-module-through-default-ini": "/els-for-languages/php/#Enabling_a_module",
3536
"/els-for-languages/php/#enabling-a-module-through-the-configuration-files": "/els-for-languages/php/#Enabling_a_module",

docs/els-for-os/README.md

Lines changed: 71 additions & 43 deletions
Original file line numberDiff line numberDiff line change
@@ -145,11 +145,6 @@ License : GPLv2
145145
Description : CentOS Server simulate els release files
146146
```
147147

148-
### CloudLinux 6 ELS
149-
150-
:::tip
151-
You do not need ELS for CentOS 6 subscription if you are already using CloudLinux OS 6. You can find more information [here](https://docs.cloudlinux.com/cln/billing/#cloudlinux-os-6-extended-lifecycle-support).
152-
:::
153148

154149
### OracleLinux 6 ELS
155150

@@ -590,54 +585,88 @@ Identifying the vulnerabilities that apply to your systems is an important task
590585

591586
OpenSCAP is an open source vulnerability scanner and compliance tool and it can be used to scan a system protected by TuxCare ELS. The following command show how to produce a vulnerability report for the system:
592587

593-
1. Install els-define and OpenSCAP
588+
1. Install els-define and OpenSCAP:
594589

595-
* for rpm systems:
596-
```
597-
yum install els-define openscap openscap-utils scap-security-guide -y
598-
```
599-
* for deb systems:
600-
```
601-
apt-get install els-define libopenscap8 -y
602-
```
603-
2. Download OVAL stream. For example, Ubuntu 18.04:
590+
<CodeTabs :tabs="[
591+
{ title: 'RPM', content: `yum install els-define openscap openscap-utils scap-security-guide -y` },
592+
{ title: 'DEB', content: `apt-get install els-define libopenscap8 -y` }
593+
]" />
604594

605-
```
606-
wget https://security.tuxcare.com/oval/els_os/ubuntu18.04els/oval.xml
607-
```
608-
3. Run scanning:
595+
2. Before running a scan, make sure the system is up to date and running the latest kernel:
609596

610-
```
611-
oscap oval eval --results results.xml --report report.html oval.xml
612-
```
613-
4. Examine scan results report
597+
<CodeTabs :tabs="[
598+
{ title: 'RPM', content: `yum update -y` },
599+
{ title: 'DEB', content: `apt-get update && apt-get upgrade -y` }
600+
]" />
614601

615-
Following the example above scan results report will be saved to repot.html file in current directory. This file can then be downloaded for analysis or published directly with local web server, for example:
616-
```
617-
python3 -m http.server 8000
618-
```
619-
or for python2
620-
```
621-
python -m SimpleHTTPServer 8000
622-
```
602+
3. Reboot the system.
623603

624-
Assuming the above command is run from the directory with report.html file, the webpage with the report can then be accessed on `http://<server-ip-addess>:8000/report.html`cve through a web browser.
604+
4. **RPM-based system only**: after reboot, remove older kernel versions:
625605

626-
![](/images/available-cve-fixes-and-their-status.png)
606+
<CodeTabs :tabs="[
607+
{ title: 'EL 6, EL 7', content: `package-cleanup --oldkernels --count=1 -y` },
608+
{ title: 'EL 8, EL 9', content: `dnf remove --oldinstallonly -y` }
609+
]" />
627610

628-
The report includes a table with vulnerabilities and their status on examined system. Line as the following one reports that the system is vulnerable to the CVE-2023-2828:
611+
4. Download OVAL stream. For example, Ubuntu 18.04:
629612

630-
```
631-
update oval:com.tuxcare.clsa:def:1688677755 true patch [CLSA-2023:1688677755], [CVE-2023-2828] Fix CVE(s): CVE-2023-2828
632-
```
613+
<CodeWithCopy>
633614

634-
The table also includes corresponding hyperlinks to advisory pages where the package and the version containing the fix can be found as well as the command to run on the target system in order to install the update.
615+
```
616+
wget https://security.tuxcare.com/oval/els_os/ubuntu18.04els/oval.xml
617+
```
635618

636-
Lines like the one below designate that the fix for corresponding CVE is allready installed on the system, and no further action is needed:
619+
</CodeWithCopy>
637620

638-
```
639-
oval:com.tuxcare.clsa:def:1694538670 false patch [CLSA-2023:1694538670], [CVE-2022-40433] Fix CVE(s): CVE-2022-40433
640-
```
621+
5. Run the scan:
622+
623+
<CodeWithCopy>
624+
625+
```
626+
oscap oval eval --results results.xml --report report.html oval.xml
627+
```
628+
629+
</CodeWithCopy>
630+
631+
4. Examine scan results report.
632+
633+
Following the example above scan results report will be saved to report.html file in current directory. This file can then be downloaded for analysis or published directly with local web server, for example:
634+
635+
<CodeWithCopy>
636+
637+
```
638+
python3 -m http.server 8000
639+
```
640+
641+
</CodeWithCopy>
642+
643+
or for python2
644+
645+
<CodeWithCopy>
646+
647+
```
648+
python -m SimpleHTTPServer 8000
649+
```
650+
651+
</CodeWithCopy>
652+
653+
Assuming the above command is run from the directory with report.html file, the webpage with the report can then be accessed on `http://<server-ip-addess>:8000/report.html`cve through a web browser.
654+
655+
![](/images/available-cve-fixes-and-their-status.png)
656+
657+
The report includes a table with vulnerabilities and their status on examined system. Line as the following one reports that the system is vulnerable to the CVE-2023-2828:
658+
659+
```
660+
update oval:com.tuxcare.clsa:def:1688677755 true patch [CLSA-2023:1688677755], [CVE-2023-2828] Fix CVE(s): CVE-2023-2828
661+
```
662+
663+
The table also includes corresponding hyperlinks to advisory pages where the package and the version containing the fix can be found as well as the command to run on the target system in order to install the update.
664+
665+
Lines like the one below designate that the fix for corresponding CVE is allready installed on the system, and no further action is needed:
666+
667+
```
668+
oval:com.tuxcare.clsa:def:1694538670 false patch [CLSA-2023:1694538670], [CVE-2022-40433] Fix CVE(s): CVE-2022-40433
669+
```
641670

642671
### How integrate the OVAL data with a new vulnerability scanner
643672

@@ -683,7 +712,6 @@ Currently, we provide CSAF data for the following OS versions:
683712
* CentOS 8.4 ELS: [cve.tuxcare.com/rss_feed/releases/centos8.4els](https://cve.tuxcare.com/rss_feed/releases/centos8.4els)
684713
* CentOS 8.5 ELS: [cve.tuxcare.com/rss_feed/releases/centos8.5els](https://cve.tuxcare.com/rss_feed/releases/centos8.5els)
685714
* CentOS Stream 8 ELS: [cve.tuxcare.com/rss_feed/releases/centos8streamels](https://cve.tuxcare.com/rss_feed/releases/centos8streamels)
686-
* CloudLinux 6: [cve.tuxcare.com/rss_feed/releases/cloudlinux6els](https://cve.tuxcare.com/rss_feed/releases/cloudlinux6els)
687715
* Oracle Linux 6 ELS: [cve.tuxcare.com/rss_feed/releases/oraclelinux6els](https://cve.tuxcare.com/rss_feed/releases/oraclelinux6els)
688716
* Oracle Linux 7 ELS: [cve.tuxcare.com/rss_feed/releases/oraclelinux7els](https://cve.tuxcare.com/rss_feed/releases/oraclelinux7els)
689717
* Red Hat Enterprise Linux 7 ELS: [cve.tuxcare.com/rss_feed/releases/rhel7els](https://cve.tuxcare.com/rss_feed/releases/rhel7els)

0 commit comments

Comments
 (0)