<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: security patch check question in Operating System - HP-UX</title>
    <link>https://community.hpe.com/t5/operating-system-hp-ux/security-patch-check-question/m-p/3514408#M218780</link>
    <description>Security Patch Check will warn about world-writeable directories in your search path because it may compromise the use of the tool.  These can be eliminated by fixing the permissions of those directories.&lt;BR /&gt;&lt;BR /&gt;Security Patch Check will also refer to bulletins with manual actions.  For this, use of the .spc_ignore file is required, since Security Patch Check cannot automatically detect the fix (especially when run remotely)&lt;BR /&gt;&lt;BR /&gt;-Keith</description>
    <pubDate>Wed, 26 Oct 2005 12:24:12 GMT</pubDate>
    <dc:creator>Keith Buck</dc:creator>
    <dc:date>2005-10-26T12:24:12Z</dc:date>
    <item>
      <title>security patch check question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-patch-check-question/m-p/3514405#M218777</link>
      <description>I have installed and run security patch check tool.  Some of the vulnerability required manual action like changing permission of file.  I just wondering after I fix the permission if I re-run security patch check script again the same vulnerability will appear.  Is there any way that I can notify security patch check tool this warning can be ignore or fixed.</description>
      <pubDate>Wed, 30 Mar 2005 10:03:54 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-patch-check-question/m-p/3514405#M218777</guid>
      <dc:creator>kholikt</dc:creator>
      <dc:date>2005-03-30T10:03:54Z</dc:date>
    </item>
    <item>
      <title>Re: security patch check question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-patch-check-question/m-p/3514406#M218778</link>
      <description>If you've fixed the permissions, the tool should not complain about it anymore.&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;Pete</description>
      <pubDate>Wed, 30 Mar 2005 10:18:21 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-patch-check-question/m-p/3514406#M218778</guid>
      <dc:creator>Pete Randall</dc:creator>
      <dc:date>2005-03-30T10:18:21Z</dc:date>
    </item>
    <item>
      <title>Re: security patch check question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-patch-check-question/m-p/3514407#M218779</link>
      <description>I have found that you need to make an entry in .spc_ignore for these types of warnings to be ignored in the future.&lt;BR /&gt;&lt;BR /&gt;Ted</description>
      <pubDate>Thu, 31 Mar 2005 08:53:24 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-patch-check-question/m-p/3514407#M218779</guid>
      <dc:creator>Theodore Pardike</dc:creator>
      <dc:date>2005-03-31T08:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: security patch check question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-patch-check-question/m-p/3514408#M218780</link>
      <description>Security Patch Check will warn about world-writeable directories in your search path because it may compromise the use of the tool.  These can be eliminated by fixing the permissions of those directories.&lt;BR /&gt;&lt;BR /&gt;Security Patch Check will also refer to bulletins with manual actions.  For this, use of the .spc_ignore file is required, since Security Patch Check cannot automatically detect the fix (especially when run remotely)&lt;BR /&gt;&lt;BR /&gt;-Keith</description>
      <pubDate>Wed, 26 Oct 2005 12:24:12 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-patch-check-question/m-p/3514408#M218780</guid>
      <dc:creator>Keith Buck</dc:creator>
      <dc:date>2005-10-26T12:24:12Z</dc:date>
    </item>
    <item>
      <title>Re: security patch check question</title>
      <link>https://community.hpe.com/t5/operating-system-hp-ux/security-patch-check-question/m-p/3514409#M218781</link>
      <description>AS mentioned, you need to create and edit a .spc_ignore file in your $HOME for root. Here is an example:&lt;BR /&gt; &lt;BR /&gt;111r2   # very old Ignite issue &lt;BR /&gt;188r1   # Java 1.4.2.04 Java Web Start (1.0.1.01 or higher for HP-UX 11.x)&lt;BR /&gt;205r1   # TCP sequence numbers (implemented in nddconf)&lt;BR /&gt;231     # Visualize Conference (Xwindows) not applicable&lt;BR /&gt;239r1   # swacl for swinstall (allow/deny remote access to patch info)          &lt;BR /&gt;150     # swacl -l host (removes remote probing of installed patches)&lt;BR /&gt;246r5   # sendmail.cf&lt;BR /&gt;253r8   # sendmail.cf&lt;BR /&gt;281r9   # sendmail.cf&lt;BR /&gt;304     # shar TMPDIR procedure + PHCO_30544&lt;BR /&gt;1047    # disable webadmin in /etc/rc.config.d&lt;BR /&gt;1099    # check downloads with MD5 checksums&lt;BR /&gt;280r1   # JSSE (not used)&lt;BR /&gt;235     # Remove old Java (n/a)&lt;BR /&gt;226     # Upgrade to latest (Java1.5)&lt;BR /&gt;1087    # Upgrade to latest (Java1.5)&lt;BR /&gt;267     # Remove old Java (n/a)&lt;BR /&gt;268     # Remove old Java (n/a)&lt;BR /&gt;295r2   # Remove old Java (n/a)&lt;BR /&gt;1044    # latest Java 1.5&lt;BR /&gt;187r1   # latest Java 1.5&lt;BR /&gt;1100    # Latest Java 1.5&lt;BR /&gt;1123    # Latest Apache suite (with Tomcat)&lt;BR /&gt;1137r1  # tcp/ip  Remote Denial of Service / ip_pmtu_strategy=0&lt;BR /&gt;1138    # Radia mgmt (not used)&lt;BR /&gt; &lt;BR /&gt;So the ID number is the first field and the rest are commants. Once I look at the manual actions required (and perform if necessary), I add the bulletin number to this file. From then on, the acknowledged warnings are then ignored and you can get a clean scan.</description>
      <pubDate>Wed, 26 Oct 2005 14:21:36 GMT</pubDate>
      <guid>https://community.hpe.com/t5/operating-system-hp-ux/security-patch-check-question/m-p/3514409#M218781</guid>
      <dc:creator>Bill Hassell</dc:creator>
      <dc:date>2005-10-26T14:21:36Z</dc:date>
    </item>
  </channel>
</rss>

