Docker image with Ubuntu CVE Tracker, Security Tools, and UMT installed to assist in Ubuntu CVE analysis and triage. You can find the list of available Ubuntu CVE's that need triaged at https://people.canonical.com/~ubuntu-security/cve/universe.html
- Ubuntu CVE Tracker
- Ubuntu Security Tools
- Ubuntu QA Tools
- Use the dockerfile to build image locally
git clone https://github.com/zer0uid/docker-CVEanalysis.git
cd docker-CVEanalysis
sudo docker build -t zer0uid/docker-cveanalysis .
sudo docker run -it zer0uid/docker-cveanalysis bash
- Use CVE Tracker to find CVE's that "needs triaged" for the following versions:
**CVE Tracker URL https://people.canonical.com/~ubuntu-security/cve/universe.html
- What to look for? CVE's that impact versions: Xenial, Bionic, Focal, and Gorilla
- Disregard Precise and Trusty
- Skipy anything related to the kernel
-
Run the command to find the available versions in Ubuntu
$> umt search "packag_name_without_quotes"
-
Open the CVE file to triage
$> cd UCT
$> vim active/CVE-2020-11025 (example, changed as needed)
-
Update CVE File (Available Status: "needs-triage" "needed" "not-affected" "DNE")
- Change "needs-triage" to "needed" or "not-affected"
- If "not-affected", include patched version or "(code not present)" Example: "not-affected" (3.2.1-4)
- Save file
-
Traige 5-10 CVE's and then commit your changes for review
-
Commit changes via git
$> cd $UCT
$> git add .
$> git commit
- Text editor opens, add message (example: "CVE triage of Wordpress CVE's")
- Additional Git commands:
$> git add #stage new changes
$> git format-patch -1 #creates a patch file for your last 1 commit
$> git status #shows which files have been modified
$> git diff #shows your changes
$> git commit --amend --no-edit #edit last commit without changing message
$> git config --global user.email "[email protected]"
$> git config --gobal user.name "your name"