diff --git a/templates/security/docker-images.html b/templates/security/docker-images.html index 38703e3846..23138c5715 100644 --- a/templates/security/docker-images.html +++ b/templates/security/docker-images.html @@ -184,10 +184,9 @@
+
ESM Images are security-maintained for the full ten year period of their underlying Ubuntu LTS release. Some applications will have versions on multiple Ubuntu LTS versions. In each case, the image is maintained for the full life of the underlying Ubuntu LTS.
-+
+
Canonical's Security Team produces Ubuntu OVAL, a structured, machine-readable dataset for all supported Ubuntu releases. It can be used to evaluate and manage security risks related to any existing Ubuntu components. It is based on the Open Vulnerability and Assessment Language (OVAL).
-- Ubuntu OVAL uses the OVAL vulnerability and patch definitions to enable auditing for Common Vulnerabilities and Exposures (CVEs) and to determine whether a particular patch, via an Ubuntu Security Notice (USN), is appropriate for the local system. -
-- Ubuntu OVAL also allows for any third-party Security Content Automation Protocol (SCAP) compliant tools to accurately scan an Ubuntu system or an official Ubuntu cloud image for vulnerabilities. -
- See the Ubuntu Security Notices +- Download the compressed XML: -
+Download the compressed XML:
wget https://security-metadata.canonical.com/oval/com.ubuntu.$(lsb_release -cs).usn.oval.xml.bz2
- - Uncompress the data: -
+Uncompress the data:
bunzip2 com.ubuntu.$(lsb_release -cs).usn.oval.xml.bz2
- - Use OpenSCAP to evaluate the OVAL and generate an html report: -
+Use OpenSCAP to evaluate the OVAL and generate an html report:
oscap oval eval --report report.html com.ubuntu.$(lsb_release -cs).usn.oval.xml
+
- The output is generated in the file report.html, open it using your browser:
+ The output is generated in the file report.html
, open it using your browser:
xdg-open report.html
- - File naming convention: -
+File naming convention:
com.ubuntu.<example release name>.usn.oval.xml.bz2
-
- To scan an Ubuntu Official Cloud Image for known vulnerabilities, the manifest file and xml data can be used together. Unlike above where we were able to use the lsb_release
command, you will need to manually enter the URL for the OVAL data.
-
- Note: In the example below we are using focal/20.04, you would replace 'focal' with the version you are inspecting. -
-wget https://security-metadata.canonical.com/oval/oci.com.ubuntu.focal.usn.oval.xml.bz2
-bunzip2 oci.com.ubuntu.focal.usn.oval.xml.bz2
- - Download the manifest file for the image -
-wget -O manifest https://cloud-images.ubuntu.com/releases/focal/release/ubuntu-20.04-server-cloudimg-amd64-root.manifest
- - Use OpenSCAP to evaluate the OVAL and generate an html report -
-oscap oval eval --report report.html oci.com.ubuntu.focal.usn.oval.xml
-
- The output is generated in the file report.html
, open it using your browser
-
xdg-open report.html
- - File naming convention: -
-oci.com.ubuntu.<example release name>.usn.oval.xml.bz2
- - Parameter - | -- Description - | -
---|---|
- CVE_ID - | -- CVE number as reported by MITRE - | -
- USN - | -- Corresponding Ubuntu Security Notice - | -
- Description - | -- A short description of the security risk addressed - | -
- Severity - | -- CVE or USN severity as defined by the Ubuntu Security team - | -
- Affected Platform - | -- Affected Ubuntu release(s), incl ESM - | -
- Title - | -- CVE number, affected Ubuntu release(s), and Severity - | -
- Public date - | -- The date on which a CVE was publicly announced - | -
- Public date of USN - | -- The date on which a USN was published - | -
- Reference - | -- Links to more information about the issue - | -
- BugReport - | -- Link to bugreport about the issue - | -
- - Note: The above parameters are included in the OVAL xml file, but not all are shown in the resulting generated OpenSCAP report. - -
+
+ To scan an Ubuntu Official Cloud Image for known vulnerabilities, the manifest file and xml data can be used together. Unlike above where we were able to use the lsb_release
command, you will need to manually enter the URL for the OVAL data.
+
In the example below we are using focal/20.04, you would replace 'focal' with the version you are inspecting.
+wget https://security-metadata.canonical.com/oval/oci.com.ubuntu.focal.usn.oval.xml.bz2
bunzip2 oci.com.ubuntu.focal.usn.oval.xml.bz2
+ Download the manifest file for the image
+wget -O manifest https://cloud-images.ubuntu.com/releases/focal/release/ubuntu-20.04-server-cloudimg-amd64-root.manifest
+ Use OpenSCAP to evaluate the OVAL and generate an html report
+oscap oval eval --report report.html oci.com.ubuntu.focal.usn.oval.xml
+
+ The output is generated in the file report.html
, open it using your browser
+
xdg-open report.html
+ File naming convention:
+oci.com.ubuntu.<example release name>.usn.oval.xml.bz2
+ Parameter | +Description | +
---|---|
CVE_ID | +CVE number as reported by MITRE | +
USN | +Corresponding Ubuntu Security Notice | +
Description | +A short description of the security risk addressed | +
Severity | +CVE or USN severity as defined by the Ubuntu Security team | +
Affected Platform | +Affected Ubuntu release(s), incl ESM | +
Title | +CVE number, affected Ubuntu release(s), and Severity | +
Public date | +The date on which a CVE was publicly announced | +
Public date of USN | +The date on which a USN was published | +
Reference | +Links to more information about the issue | +
BugReport | +Link to bugreport about the issue | +
+ | + + Note: The above parameters are included in the OVAL xml file, but not all are shown in the resulting generated OpenSCAP report. + + | +
As software vulnerabilities are discovered, they are assigned CVE identifiers by MITRE and other organizations. Canonical triages these CVEs to determine whether the vulnerabilities affect software distributed within Ubuntu. The results of this triage are then used to generate the CVE OVAL. The CVE OVAL can be used to assess the local system for vulnerabilities.
@@ -268,19 +228,19 @@