目录

usn-resource

A read-only (no put) Concourse resource for tracking Ubuntu Security Notices

Source Configuration

  • os - os distro to track
    • trusty or ubuntu-14.04-lts for Ubuntu Trusty
    • xenial or ubuntu-16.04-lts for Ubuntu Xenial
    • bionic or ubuntu-18.04-lts for Ubuntu Bionic
    • jammy or ubuntu-22.04-lts for Ubuntu Jammy
    • noble or ubuntu-24.04-lts for Ubuntu Noble
    • … (see filters on the USN website for more)
  • priorities - list of Ubuntu CVE priorities to trigger on, including:
    • low
    • medium
    • high
    • critical
    • unknown when CVE reference gives http error
  • severities - list of CVSS CVE severities to trigger on, including:
    • low
    • medium
    • high
    • critical

The resource will trigger if either the configured priorities or severities match a usn. For example, https://ubuntu.com/security/CVE-2025-9230 has a CVSS severity of high but a Ubuntu priority of medium.

The following configuration would NOT trigger for CVE-2025-9230:

- name: high-critical-priority
  type: usn
  source:
    os: ubuntu-22.04-lts
    priorities:
    - high
    - critical

whereas the following configuration WOULD:

- name: high-critical-priority
  type: usn
  source:
    os: ubuntu-22.04-lts
    priorities:
    - high
    - critical
    severities:
    - high

check

Check for new USNs.

Metadata:

  • guid - URL to USN page

in

Download USN contents.

  • .resource/usn.json - json file with the USN details

out

Not a thing for this read-only resource.

License

Apache License 2.0

Development

  • To run tests, use go run github.com/onsi/ginkgo/v2/ginkgo --keep-going --trace --race -vv -r from the root of the repository.
邀请码
    Gitlink(确实开源)
  • 加入我们
  • 官网邮箱:gitlink@ccf.org.cn
  • QQ群
  • QQ群
  • 公众号
  • 公众号

版权所有:中国计算机学会技术支持:开源发展技术委员会
京ICP备13000930号-9 京公网安备 11010802032778号