<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Security Bulletin Patch Analysis in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-bulletin-patch-analysis/m-p/3231266#M172158</link>
    <description>Actually, &lt;BR /&gt;&lt;BR /&gt;  Some of the functionality (security patch analysis) you are requesting was added recently to the patch assessment tool (used to be called Custom Patch Manager) here:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www1.itrc.hp.com/service/patch/assessSystemsPage.do" target="_blank"&gt;http://www1.itrc.hp.com/service/patch/assessSystemsPage.do&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If this still doesn't meet your needs, then maybe you can clarify the "almost does this" part of your question a little more.&lt;BR /&gt;&lt;BR /&gt;Security Patch Check doesn't require you to upload your system information, does tell you which patches have dependencies, and is automatable.  It doesn't do the full dependency analysis (sorry).&lt;BR /&gt;&lt;BR /&gt;Don't forget to still read the bulletins in case of product updates and manual actions.&lt;BR /&gt;&lt;BR /&gt;I recently asked a survey question asking customers to compare the functionality of these two tools.  I'd be interested in your comments as well:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=426710" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=426710&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;-Keith</description>
    <pubDate>Fri, 26 Mar 2004 15:25:04 GMT</pubDate>
    <dc:creator>Keith Buck</dc:creator>
    <dc:date>2004-03-26T15:25:04Z</dc:date>
    <item>
      <title>Security Bulletin Patch Analysis</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-bulletin-patch-analysis/m-p/3231263#M172155</link>
      <description>Is it possible to generate a list of dependent patches based on a set of patches generated by analysis of the Security Bulletins (or any other source) AND the patches installed on a given system?&lt;BR /&gt;&lt;BR /&gt;Custom Patch Manager almost does this and so does security_patch_check, but neither gives us the list we develop from a manual analysis of the Bulletins. If we use this list to generate a patch list from the ITRC Patch Database, we get a large number of dependent patches, most of which are already installed.&lt;BR /&gt;&lt;BR /&gt;We then need to either check the dependent patches manually  or download all of them and let swanalyze do it.&lt;BR /&gt;&lt;BR /&gt;Is there a better way? &lt;BR /&gt;&lt;BR /&gt;Coleman Blake&lt;BR /&gt;Peace Corps</description>
      <pubDate>Fri, 26 Mar 2004 12:10:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-bulletin-patch-analysis/m-p/3231263#M172155</guid>
      <dc:creator>Coleman Blake_2</dc:creator>
      <dc:date>2004-03-26T12:10:24Z</dc:date>
    </item>
    <item>
      <title>Re: Security Bulletin Patch Analysis</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-bulletin-patch-analysis/m-p/3231264#M172156</link>
      <description>Coleman - there is no way to do this that I know of,   patch DB is the best place to drop in manual list of patches, but you still get patch dependencies that are possibly on your system.  &lt;BR /&gt;&lt;BR /&gt;If someone has a method I would love to see it.  &lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Jon</description>
      <pubDate>Fri, 26 Mar 2004 14:04:59 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-bulletin-patch-analysis/m-p/3231264#M172156</guid>
      <dc:creator>jherring</dc:creator>
      <dc:date>2004-03-26T14:04:59Z</dc:date>
    </item>
    <item>
      <title>Re: Security Bulletin Patch Analysis</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-bulletin-patch-analysis/m-p/3231265#M172157</link>
      <description>I wish I could do this in a cron script or something.&lt;BR /&gt;&lt;BR /&gt;So far the only way to deal with dependencies is to click into the database at itrc.hp.com&lt;BR /&gt;&lt;BR /&gt;At that point, if i'm feeling frisky, I cut and post the web page generated into a file. Then a script I have does the old swlist -l product | grep $PATCH and reports which ones are already installed so I might unclick those boxes.&lt;BR /&gt;&lt;BR /&gt;There is still no fully automated process and I thinks that is due to security concerns. I would not expose my systems to a process that can run swlist or swanalzyze. Not with information passing through the public Internet.&lt;BR /&gt;&lt;BR /&gt;SEP</description>
      <pubDate>Fri, 26 Mar 2004 14:13:48 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-bulletin-patch-analysis/m-p/3231265#M172157</guid>
      <dc:creator>Steven E. Protter</dc:creator>
      <dc:date>2004-03-26T14:13:48Z</dc:date>
    </item>
    <item>
      <title>Re: Security Bulletin Patch Analysis</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-bulletin-patch-analysis/m-p/3231266#M172158</link>
      <description>Actually, &lt;BR /&gt;&lt;BR /&gt;  Some of the functionality (security patch analysis) you are requesting was added recently to the patch assessment tool (used to be called Custom Patch Manager) here:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://www1.itrc.hp.com/service/patch/assessSystemsPage.do" target="_blank"&gt;http://www1.itrc.hp.com/service/patch/assessSystemsPage.do&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;If this still doesn't meet your needs, then maybe you can clarify the "almost does this" part of your question a little more.&lt;BR /&gt;&lt;BR /&gt;Security Patch Check doesn't require you to upload your system information, does tell you which patches have dependencies, and is automatable.  It doesn't do the full dependency analysis (sorry).&lt;BR /&gt;&lt;BR /&gt;Don't forget to still read the bulletins in case of product updates and manual actions.&lt;BR /&gt;&lt;BR /&gt;I recently asked a survey question asking customers to compare the functionality of these two tools.  I'd be interested in your comments as well:&lt;BR /&gt;&lt;BR /&gt;&lt;A href="http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=426710" target="_blank"&gt;http://forums1.itrc.hp.com/service/forums/questionanswer.do?threadId=426710&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;-Keith</description>
      <pubDate>Fri, 26 Mar 2004 15:25:04 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-bulletin-patch-analysis/m-p/3231266#M172158</guid>
      <dc:creator>Keith Buck</dc:creator>
      <dc:date>2004-03-26T15:25:04Z</dc:date>
    </item>
    <item>
      <title>Re: Security Bulletin Patch Analysis</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-bulletin-patch-analysis/m-p/3231267#M172159</link>
      <description>Thanks to everyone who replied. &lt;BR /&gt;&lt;BR /&gt;The patch analysis tool "almost does what I want", in that it uses information about the patches currently on my system (and other information as well) to generate a list of recommended patches and their dependencies. If a recommended patch has a dependency and that dependent patch is already on my system, the patch is not added to the list of patches to be downloaded.&lt;BR /&gt;&lt;BR /&gt;I would like to have the ability to submit two files. One would be configuration file like the "*.fs" file generated by cpm_collect.sh. The second file would be a list of patches generated, for example, by manual analysis of the Security Bulletins. The result of this would be a list of the patches needed to install the patches in the submitted list.&lt;BR /&gt;&lt;BR /&gt;This list would be the same list of patches I would get from the patch database by entering the patches from the second file above, minus the patches already installed.&lt;BR /&gt;&lt;BR /&gt;I'll fill out the questionnaire. I remember getting it, but was too busy to fill it out at the time.&lt;BR /&gt;&lt;BR /&gt;Coleman</description>
      <pubDate>Mon, 29 Mar 2004 08:18:03 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-bulletin-patch-analysis/m-p/3231267#M172159</guid>
      <dc:creator>Coleman Blake_2</dc:creator>
      <dc:date>2004-03-29T08:18:03Z</dc:date>
    </item>
    <item>
      <title>Re: Security Bulletin Patch Analysis</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-bulletin-patch-analysis/m-p/3231268#M172160</link>
      <description>Coleman,&lt;BR /&gt;&lt;BR /&gt;   So, the second proposed list that you would send to the patch assessment tool would be&lt;BR /&gt;&lt;BR /&gt;A. a list of patches that are already installed.&lt;BR /&gt;B. a list of preliminary patches that are installed, but not in the itrc database that the patch assessment tool uses&lt;BR /&gt;C. A list of dependent patches that also need to be installed&lt;BR /&gt;D. A list of patches which you feel that you don't need because of other mitigations (service disabled, for example)&lt;BR /&gt;E. Something else?&lt;BR /&gt;&lt;BR /&gt;Patch assessment should already do A and C, while Security Patch Check should handle A and B (depending on how the preliminary patch and its successors were packaged).&lt;BR /&gt;&lt;BR /&gt;It can be argued from a defense-in-depth perspective, that you ought to eventually install the patches in D in case the service gets re-enabled, but of course that tradeoff depends on your environment and the potential for disruption.&lt;BR /&gt;&lt;BR /&gt;Thoughts?&lt;BR /&gt;&lt;BR /&gt;-Keith</description>
      <pubDate>Mon, 29 Mar 2004 12:35:15 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-bulletin-patch-analysis/m-p/3231268#M172160</guid>
      <dc:creator>Keith Buck</dc:creator>
      <dc:date>2004-03-29T12:35:15Z</dc:date>
    </item>
  </channel>
</rss>

