elsdoc-191, updated cve links across els pages#500
elsdoc-191, updated cve links across els pages#500sboldyreva merged 3 commits intocloudlinux:masterfrom
Conversation
| *  [CVE Tracker](https://tuxcare.com/cve-tracker/?product=Alpine+Linux+3.18+ELS) — Track vulnerability fixes and updates | ||
| *  [Machine-Readable Security Data](/els-for-os/machine-readable-security-data/) — Errata, OVAL, CSAF | ||
| *  [Supported packages list](https://cve.tuxcare.com/els/projects?os=26cfcb24-02da-4482-934d-d4cb1a02de3a&project=&version=&packages=&orderBy=project-asc) — Full list of packages covered by ELS | ||
| *  [Supported packages list](https://tuxcare.com/cve-tracker/?product=Alpine+Linux+3.18+ELS) — Full list of packages covered by ELS |
There was a problem hiding this comment.
should be different link then. cves for cve tracker and products for supported packages https://tuxcare.com/cve-tracker/products?product=Alpine+Linux+3.18+ELS
| | Ubuntu 16.04 ELS | [oval.xml](https://security.tuxcare.com/oval/els_os/ubuntu16.04els/oval.xml) | [csaf](https://security.tuxcare.com/csaf/v2/els_os/ubuntu16.04els/) | [rss](https://cve.tuxcare.com/rss_feed/els/releases/ubuntu16.04els) | | ||
| | Ubuntu 18.04 ELS | [oval.xml](https://security.tuxcare.com/oval/els_os/ubuntu18.04els/oval.xml) | [csaf](https://security.tuxcare.com/csaf/v2/els_os/ubuntu18.04els/) | [rss](https://cve.tuxcare.com/rss_feed/els/releases/ubuntu18.04els) | | ||
| | Ubuntu 20.04 ELS | [oval.xml](https://security.tuxcare.com/oval/els_os/ubuntu20.04els/oval.xml) | [csaf](https://security.tuxcare.com/csaf/v2/els_os/ubuntu20.04els/) | [rss](https://cve.tuxcare.com/rss_feed/els/releases/ubuntu20.04els) | | ||
| | Alpine Linux 3.18 ELS | [oval.xml](https://security.tuxcare.com/oval/els_os/alpinelinux3.18els/oval.xml) | [csaf](https://security.tuxcare.com/csaf/v2/els_os/alpinelinux3.18els/) | [rss](https://tuxcare.com/cve-tracker/?product=Alpine+Linux+3.18+ELS) | |
There was a problem hiding this comment.
there's a specific link for rss - https://tuxcare.com/cve-tracker/api/cves/export/rss?product=Alpine+Linux+3.18+ELS - for example. Set a filter and use RSS button to get a link
| TuxCare Endless Lifecycle Support provides qualified security and selected bug-fix errata advisories across all architectures. They can help users track which CVEs are resolved and which bugs have been addressed. | ||
|
|
||
| You can view the full list of released fixes on [cve.tuxcare.com](https://cve.tuxcare.com/els/releases). | ||
| You can view the full list of released fixes on [tuxcare.com/cve-tracker](https://tuxcare.com/cve-tracker/). |
There was a problem hiding this comment.
the correct link is https://tuxcare.com/cve-tracker/fixes
| For several platforms, TuxCare delivers security updates through staged rollout repositories. This process may take up to 14 additional days after a patch is published to stable repositories. | ||
|
|
||
| If you need to apply a fix immediately without waiting for the rollout to complete, you can use the bypass repository. The necessary instructions are always provided on the [release information page](https://cve.tuxcare.com/els/releases). | ||
| If you need to apply a fix immediately without waiting for the rollout to complete, you can use the bypass repository. The necessary instructions are always provided on the [release information page](https://tuxcare.com/cve-tracker/). |
There was a problem hiding this comment.
| * [Fixes](https://cve.tuxcare.com/els/releases) | ||
| You can track the status of vulnerabilities and their corresponding fixes via [tuxcare.com/cve-tracker](https://tuxcare.com/cve-tracker/): | ||
| * [Vulnerabilities](https://tuxcare.com/cve-tracker/) | ||
| * [Fixes](https://tuxcare.com/cve-tracker/) |
There was a problem hiding this comment.
| ## Supported packages | ||
|
|
||
| TuxCare's Endless Lifecycle Support provides updates for a comprehensive list of packages integral to server operations (100+ packages), providing maximum security for your operating system. You can view the full list of supported packages for each operating system, as well as get detailed information on the patched Common Vulnerabilities and Exposures (CVEs), [here](https://cve.tuxcare.com/els/projects). The list of supported packages may change as projects can be added or removed from the list. Support for additional packages can be provided on request. | ||
| TuxCare's Endless Lifecycle Support provides updates for a comprehensive list of packages integral to server operations (100+ packages), providing maximum security for your operating system. You can view the full list of supported packages for each operating system, as well as get detailed information on the patched Common Vulnerabilities and Exposures (CVEs), [here](https://tuxcare.com/cve-tracker/). The list of supported packages may change as projects can be added or removed from the list. Support for additional packages can be provided on request. |
There was a problem hiding this comment.
| | Debian 12 | [errata](https://security.tuxcare.com/errata/els_alt_php/debian12/) | [oval.xml](https://security.tuxcare.com/oval/els_alt_php/debian12/oval.xml) | [csaf](https://security.tuxcare.com/csaf/v2/els_alt_php/debian12/) | [rss](https://cve.tuxcare.com/rss_feed/els-alt-php/releases/debian12) | | ||
| | Debian 13 | [errata](https://security.tuxcare.com/errata/els_alt_php/debian13/) | [oval.xml](https://security.tuxcare.com/oval/els_alt_php/debian13/oval.xml) | [csaf](https://security.tuxcare.com/csaf/v2/els_alt_php/debian13/) | [rss](https://cve.tuxcare.com/rss_feed/els-alt-php/releases/debian13) | | ||
| | Alpine Linux 3.22 | — | — | [csaf](https://security.tuxcare.com/csaf/v2/els_alt_php/alpinelinux3.22/) | [rss](https://cve.tuxcare.com/rss_feed/els-alt-php/releases/alpinelinux3.22) | | ||
| | EL 7 | [errata](https://security.tuxcare.com/errata/els_alt_php/el7/) | [oval.xml](https://security.tuxcare.com/oval/els_alt_php/el7/oval.xml) | [csaf](https://security.tuxcare.com/csaf/v2/els_alt_php/el7/) | [rss](https://tuxcare.com/cve-tracker/?product=EL+7) | |
There was a problem hiding this comment.
for runtimes - the product is not a distro, it's a runtime
so for example https://tuxcare.com/cve-tracker/?product=PHP. Ideally, there would be a complex filter PHP+OS but for now just PHP
No description provided.