User Guide
  • Fundamentals
    • Quick Start Guide
      • Signing Up
      • Package Discovery
        • Connecting to GitHub
        • Connecting to GitLab
        • Connecting to Azure DevOps
        • Connecting to the CI Pipeline
        • Connecting to the Artifact Server
      • Package Sealing
        • Integrating the CLI in the CI
        • Editing Dependencies
    • Deployments
      • Choosing Your Deployment
      • Automatic Remediation
      • Remote Configuration
      • Local Configuration
      • Artifact Server
    • CLI
      • Download and Installation
      • Scanning
      • Fixing All Dependencies
      • Fixing Specific Dependencies
      • Fixing OS Vulnerabilities
      • Integrating with the CI
      • Uploading Scan Results
      • Commands
      • SCA Integrations
      • JFrog Integration
      • Usage Examples
        • Sealing Application Dependencies
        • Sealing Linux Environments
    • Artifact Server
      • Generating a Token
      • Artifact Server Ordering
      • Configuring the Package Manager
        • Configuring apk
        • Configuring Composer
        • Configuring Go
        • Configuring Gradle
        • Configuring Maven
        • Configuring npm
        • Configuring pip
        • Configuring Poetry
        • Configuring yarn
        • Configuring yum
      • Clearing the Cache
      • Editing Your Dependencies
    • Web Interface
      • Rules Screen
  • APIs
    • List Vulnerable Packages
  • FAQ
  • Vulnerability Disclosure
Powered by GitBook
On this page
  1. Fundamentals
  2. CLI

Fixing OS Vulnerabilities

PreviousFixing Specific DependenciesNextIntegrating with the CI

Last updated 4 months ago

The CLI enables you to to easily fix OS vulnerabilities in supported Linux distributions.

To fix the vulnerabilities in your OS, the CLI replaces the vulnerable packages with their sealed versions. To download the sealed versions you will need an to the Seal artifact.

  1. Set the access token and project name. There are two ways to do this:

    • Set the access token in the SEAL_TOKEN environment variable, and the project name in SEAL_PROJECT.

    export SEAL_TOKEN=<token> # the access token for the server
    export SEAL_PROJECT=<project-id> # the ID of the current project
    • Set the access token and project name in a .seal-config.yml configuration file from the directory you will run the seal fix command.

    token: <token> # the access token for the server
    project: <project-id> # the ID of the current project

The project ID may include only ASCII letters, digits, underscore, hyphen or period, and mustn't be over 255 characters long.

You should use the ID of the project as shown in the Projects tab. If you use a different ID, the platform will record the pulled libraries under a different project.

  1. Run seal fix --os --mode all. The vulnerable packages that have a patched version will be replaced with their sealed version.

access token