This topic describes how to view and manage Linux software vulnerabilities in Security Center.
Procedure
- Log on to the Security Center console.
- Choose
On the Linux Software Vulnerabilities page, you can view security bulletins about the Linux vulnerabilities detected by Security Center. Each security bulletin has a title that starts with USN, RHSA, or CVE.
You can click a security bulletin to view details of the corresponding vulnerabilities.
.
- On the Linux Software Vulnerabilities page, you can perform the following operations: view security bulletins about the
vulnerabilities detected by Security Center, view vulnerability details, fix vulnerabilities,
verify whether a vulnerability has been fixed, search vulnerabilities by severity
level and status, add vulnerabilities to the whitelist, and ignore vulnerabilities.
- View vulnerability details
Click a vulnerability name to view details. On the vulnerability details page, you can view a description of this vulnerability, its severity level, assets affected by this vulnerability, and the vulnerability status. You can also choose to fix this vulnerability, verify whether it has been fixed, or ignore it.
The vulnerability details page also displays information about correlated vulnerabilities and assets that are affected by these vulnerabilities. You can easily analyze and handle these vulnerabilities on this page.
On the vulnerability details page, click an affected asset to view all vulnerabilities that are correlated with the asset. You can also choose to open this page.
- Vulnerability priorities (urgency levels)
Vulnerability priorities are color coded for easy identification.
- Red indicates high priority.
- Orange indicates medium priority.
- Gray indicates low priority.
Note We recommend that you immediately fix high priority vulnerabilities. - Alibaba Cloud vulnerability library
On the vulnerability details page, select a vulnerability and click its Vulnerability Number to go to the Alibaba Cloud vulnerability library.On the Alibaba Cloud vulnerability library page, you can view more details about this vulnerability, including the detailed description, severity level, time of discovery, and mitigations.
- Vulnerability severity levels (emergency degrees)
Severity levels are color coded for easy identification. Red indicates important (high severity). Orange indicates moderate (medium severity). Gray indicates low (low severity).
- Verify vulnerabilities
On the vulnerability details page, you can select one or multiple vulnerabilities and click Verify to verify whether the selected vulnerabilities have been fixed.
After you click Verify, the vulnerability status is changed to Verifying. It takes several seconds to verify vulnerabilities.
- Fix vulnerabilities
On the vulnerability details page, you can select one or multiple vulnerabilities and click Fix to fix the selected vulnerabilities.
- Search vulnerabilities
On the Linux Software Vulnerabilities page, you can search vulnerabilities by vulnerability name, severity level (high, medium, and low), or vulnerability status (handled, unhandled).
Note You can also fuzzy search vulnerabilities by name. - Add vulnerabilities to the whitelist
On the Linux Software Vulnerabilities page, you can select one or multiple vulnerabilities and click Add to Whitelist to add the selected vulnerabilities to the whitelist. After a vulnerability is added to the whitelist, Security Center does not send alarms when this vulnerability is detected.
Whitelisted vulnerabilities are removed from the vulnerability list on the Linux Software Vulnerabilities page. You can click Settings in the upper-right corner and view these vulnerabilities in the Whitelisted Vulnerabilities table.
If you want Security Center to detect and send alarms on whitelisted vulnerabilities again, select a vulnerability and click Remove to remove this vulnerability from the whitelist on the Settings page.
- Ignore vulnerabilities
On the Linux Software Vulnerabilities page, you can select one or more vulnerabilities and click Ignore to ignore the selected vulnerabilities.
Note After you ignore a vulnerability, the vulnerability status is changed to Handled. If you want Security Center to notify you of this vulnerability again, select this vulnerability in the Handled vulnerability list and click Unignore. - Export vulnerabilities
On the Linux Software Vulnerabilities page, you can click the Export icon to export records of all vulnerabilities to your local computer. The exported file is in Excel format.Note It may take a few minutes to export the records of vulnerabilities depending on the data size.
- On the vulnerability details page, you can click
to save multiple vulnerabilities to a group. This allows you to track vulnerabilities by group.
- View vulnerability details
Vulnerability details
Item | Description |
---|---|
Vulnerability number | The Common Vulnerabilities and Exposures (CVE) ID of the vulnerability. The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. You can use CVE IDs, such as CVE-2018-1123, to quickly search for information about vulnerability fixes in any CVE-compatible databases to resolve security issues. |
Severity score (CVSS score) | The CVSS score follows the widely accepted industry standard, Common Vulnerability
Scoring System, and is calculated based on multiple attributes of the vulnerability.
This score is used to quantify the severity of vulnerabilities.
In the CVSS v3.0 rating system, the severity level indicated by each score is as follows:
|
Vulnerability name | The name of the vulnerability, which typically starts with CVE. For example, CVE-2018-1123 on Ubuntu 14.04 LTS (trustly). |
Affected assets | The server assets that are exposed to this vulnerability, including the servers' public and internal IP addresses. |
Priority (Urgency level) | The priority of the vulnerability, including
For more information about fixing vulnerabilities, see Vulnerability fix prioritization. |
Details | You can select a vulnerability and click Details under the Actions column to view details of this vulnerability.
|