From 4bc011cf7db65c7a20ed688883d473d497a59a32 Mon Sep 17 00:00:00 2001 From: Peter Elsner Date: Mon, 11 Apr 2022 14:28:07 -0500 Subject: [PATCH] Update README --- README.md | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/README.md b/README.md index 6ef965b..5797b14 100644 --- a/README.md +++ b/README.md @@ -16,12 +16,11 @@ You can pass the following options: If nothing is returned when you run cvecheck, then your server should be patched and not vulnerable.. The steps performed are: + 1) Is the package installed? (boolean true or false). If false, continue with next package. - 2) If true, then check if it's a kernel or linux-header package (boolean true or false). - kernel/linux-header packages require a name change to the package name. + 2) If true, then check if it's a kernel or linux-header package (boolean true or false). kernel/linux-header packages require a name change to the package name. 3) Check if the CVE ID from the known exploit is listed in the packages changelog (boolean true or false). - 4) If so, move on to the next package. If not, check the version of the installed package and see if it - is greater than to the patched version. + 4) If so, move on to the next package. If not, check the version of the installed package and see if it is greater than to the patched version. 5) If so, then not vulnerable. If not, then list it as possibly being vulnerable.