Operating System - HP-UX
1833768 Members
2163 Online
110063 Solutions
New Discussion

Re: Security Patch Check B.02.00 released

 
SOLVED
Go to solution
Keith Buck
Respected Contributor

Security Patch Check B.02.00 released

This release analyzes all HP issued security bulletins, including those with product upgrades and manual actions, giving you a much smaller subset to analyze manually (pruning by OS version and fileset names in most cases, and even fileset revisions when that is specified in the security bulletin).

Bulletin numbers (w/ revision number) can be placed into $HOME/.spc_ignore to check off those that have been analyzed manually to not apply to your system. hash (#) comments are allowed to document reasons why the patch did not apply.

NOTE: if you download the security_catalog manually, you should start downloading security_catalog2.gz instead, as it has all the information on manual actions and product upgrades.

You can get it here:
http://software.hp.com/portal/swdepot/displayProductInfo.do?productNumber=B6834AA

As before, you'll still need Perl.
http://www.software.hp.com/cgi-bin/swdepot_parser.cgi/cgi/displayProductInfo.pl?productNumber=PERL

This version is also pre-enabled for automated https download of the security catalog, if you have Perl D.5.8.0.C and an upcoming release of openssl installed.

Enjoy! Feedback welcome.

-Keith
11 REPLIES 11
Tom Ward_1
Honored Contributor
Solution

Re: Security Patch Check B.02.00 released

I've tried the new security patch check tool and it seems to do a better job of checking the entire system. The output has a lot more recommended actions than the older version.

I'm having trouble finding the security bulletins that security patch check refers to. Can you tell me where I would find them? The first one on my list is bulletin 16, but I don't even find that listed in the the security_catalog file.
Keith Buck
Respected Contributor

Re: Security Patch Check B.02.00 released

The archive is here:

http://itrc.hp.com/cki/bin/doc.pl/screen=ckiSecurityBulletin

Unfortunately, the bulletins are ordered by document id instead of date or bulletin number, so it can be confusing at first.

If you go to that page and search in page for "016", it should pop right up. This particular bulletin talks about how to check md5sums of patches.

In the security catalog, you can find the record by searching for "SecBul:16"

Hope that helps.

-Keith
Tom Ward_1
Honored Contributor

Re: Security Patch Check B.02.00 released

Keith,

That is exactly what I needed. I'd tired both the URL and security_catalog yesterday, but you provided the keys to find them in both.

Thank you very much,
Tom
Patrick John Mifsud
New Member

Re: Security Patch Check B.02.00 released

Hi,

is there a way to manually download the security_catalog file. I cannot access ftp directly from my server due to company restrictions.

Thanks

Patrick
Don't leave for tomorrow what you can do today!
Tyler Easterling_1
Occasional Advisor
Keith Buck
Respected Contributor

Re: Security Patch Check B.02.00 released

Patrick,

Tyler gave the locations to download from. Then you just need to find a way to copy the catalog to your server (ssh, tape/floppy/usb?) and you can use the -c option to point at the catalog.

Hope that helps.

-Keith
H.Merijn Brand (procura
Honored Contributor

Re: Security Patch Check B.02.00 released

Does it require the HP versions of perl and openssl?

I already have 6 homebrewn versions of perl (amongst which are 5.8.5 and 5.9.2 both in 32 and 64bit), and the most recent versions of openssl/openssh from the porting center and all SSL modules that connect the two

How could I test that?

Enjoy, Have FUN! H.Merijn
Enjoy, Have FUN! H.Merijn
Keith Buck
Respected Contributor

Re: Security Patch Check B.02.00 released

Procura,

We have only tested it with the HP versions of Perl and openssl, and therefore only support it that way. If you decide to go ahead and hack something together using your own Perl and openssl, be aware:

1. You'll need the LWP modules, along with a combination of working SSLeay parts and shared libraries. There are a few different ways to get this to work depending on which parts and pieces you have...

2. The official HP OpenSSL ships verisign certificates so that certificate validation can be done properly out-of-the-box. You'll need to import those into your trust store, then use the OPENSSLDIR setting in /etc/opt/sec_mgmt/spc/spc_config to point to your openssl binaries, including c_rehash.

3. For just base functionality (no https), you'll still need a reasonably recent version of Perl (sounds like this is the least of your worries) and the SD dependencies at install-time will enforce this based on HP's version of Perl.

4. Any vulnerabilities in your versions of Perl/openssl or their interactions with Security Patch Check will not be announced by HP and therefore would not be covered by Security Patch Check. SPC relies heavily on SD's installed-product database to determine if you are affected by something.

Back to your question of "will it work"...probably, but it's not for the faint-of-heart, so proceed with caution.

Hope that helps.

-Keith
H.Merijn Brand (procura
Honored Contributor

Re: Security Patch Check B.02.00 released

I am absolutely not faint-of-heart :)

I've downloaded the depot, but the depot name clearly states 11.22, indicating Itanium. I didn't see that in your announcement post.

Will/should this also work on 11.00 and 11.11?

Enjoy, Have FUN! H.Merijn
Enjoy, Have FUN! H.Merijn
John Payne_2
Honored Contributor

Re: Security Patch Check B.02.00 released

Keith,

Thanks for letting us know.

John
Spoon!!!!
Keith Buck
Respected Contributor

Re: Security Patch Check B.02.00 released

Procura,

I didn't suspect you were faint-of-heart, just wanted to make sure you and anyone else who tried to follow in your footsteps had fair warning :)

The depot name contains the architecture string, which is

HP-UX_B.11.22_32/64

By convention, that means that it works on 32 and 64 bit systems (PA), and the minimum itanium OS it runs on is 11.22 (supports 11.23 but not 11.20). From a technical standpoint, this field is completely ignored by SD.

Instead, you should look at the os_release field, which is "B.11.*". You can find this field by doing

swlist -l fileset -a os_release

A runtime check on 11.20 would tell you that it's not supported.

Hope that helps.

By the way, I'm planning to use these questions to feed into the FAQ, so thanks to all for asking!

-Keith