- Community Home
- >
- Servers and Operating Systems
- >
- Operating Systems
- >
- Operating System - HP-UX
- >
- Security Patches
Categories
Company
Local Language
Forums
Discussions
Forums
- Data Protection and Retention
- Entry Storage Systems
- Legacy
- Midrange and Enterprise Storage
- Storage Networking
- HPE Nimble Storage
Discussions
Forums
Discussions
Discussions
Discussions
Forums
Forums
Discussions
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
- BladeSystem Infrastructure and Application Solutions
- Appliance Servers
- Alpha Servers
- BackOffice Products
- Internet Products
- HPE 9000 and HPE e3000 Servers
- Networking
- Netservers
- Secure OS Software for Linux
- Server Management (Insight Manager 7)
- Windows Server 2003
- Operating System - Tru64 Unix
- ProLiant Deployment and Provisioning
- Linux-Based Community / Regional
- Microsoft System Center Integration
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Discussion Boards
Community
Resources
Forums
Blogs
- Subscribe to RSS Feed
- Mark Topic as New
- Mark Topic as Read
- Float this Topic for Current User
- Bookmark
- Subscribe
- Printer Friendly Page
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-21-2006 07:11 AM
тАО06-21-2006 07:11 AM
How can you identify a security patch from its name? Is that possible, like PHSS_*** are security or something like that.
I dont want to run, security_patch_check if I can get around it. I need to know if there is a way to identify a security patch from the name. I dont believe so.
Solved! Go to Solution.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-21-2006 07:22 AM
тАО06-21-2006 07:22 AM
Re: Security Patches
Jeff Traigle
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-21-2006 07:23 AM
тАО06-21-2006 07:23 AM
SolutionNo, the designation "PHSS" isn't a security patch. The "PH" stands for "PatcH". The "SS" is "SubSystem" -- patches for various subsystems.
PHCO are COmmand pathes.
PHNE are NEtwork patches.
PHKL are KerneL patches.
You can be virtually assured that PHNE and PHKL patches will require a reboot.
I don't know of any way from a patch's one-line description, either, to say with certainty that its a "security" patch.
Regards!
...JRF...
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-21-2006 09:25 AM
тАО06-21-2006 09:25 AM
Re: Security Patches
Security patches come in all shapes and sizes.
You identify them by installing and running security_patch_check.
Patch Link does make an effort to identify these patches and you can rely on their grouping. I would check up on their list once in a while.
SEP
Owner of ISN Corporation
http://isnamerica.com
http://hpuxconsulting.com
Sponsor: http://hpux.ws
Twitter: http://twitter.com/hpuxlinux
Founder http://newdatacloud.com
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
тАО06-21-2006 01:39 PM
тАО06-21-2006 01:39 PM
Re: Security Patches
- any patch with a problem (ie, recalled, not configured, etc)
- all missing security patches
- all manual checks and changes specified by security bulletins
There is no bundle of security patches (it would change daily). Instead, you download the spc program, run it to get an analysis and then address all of the issues. This is not a simple task since many issues do not have a patch but may require a configuration change depending on your system.
You can download the (plain text) security_catalog manually from: ftp://ftp.itrc.hp.com/export/patches/security_catalog2.gz
and use that as your guide for patches. And for details on the actual security issue, you'll need: http://www.itrc.hp.com/service/cki/secBullArchive.do to find special procedures and non-patch items.
spc will save you days to weeks of time analyzing your systems. You definitely want to use spc.
Bill Hassell, sysadmin