AUTO DETECTION MECHANISM OF VULNERABILITIES FOR SECURITY UPDATES
First Claim
1. A method of operating a computer system, comprising:
- determining one or more packages distributed in firmware of a baseboard management controller (BMC);
determining a respective update of each of the one or more packages;
determining a first set of security vulnerabilities of the each package that is addressed by the respective update;
determining a second set of security vulnerabilities of the each package after the respective update is applied; and
generating a first file indicating the first set of security vulnerabilities and the second set of security vulnerabilities.
2 Assignments
0 Petitions
Accused Products
Abstract
In an aspect of the disclosure, a method, a computer-readable medium, and a device are provided. The device the package determination component 430 determines one or more packages distributed in firmware of a BMC. The device determines a respective update of each of the one or more packages. The device determines a first set of security vulnerabilities of the each package that is addressed by the respective update. The device further determines a second set of security vulnerabilities of the each package after the respective update is applied. The device generates a first file indicating the first set of security vulnerabilities and the second set of security vulnerabilities.
12 Citations
20 Claims
-
1. A method of operating a computer system, comprising:
-
determining one or more packages distributed in firmware of a baseboard management controller (BMC); determining a respective update of each of the one or more packages; determining a first set of security vulnerabilities of the each package that is addressed by the respective update; determining a second set of security vulnerabilities of the each package after the respective update is applied; and generating a first file indicating the first set of security vulnerabilities and the second set of security vulnerabilities. - View Dependent Claims (2, 3, 4, 5, 6, 7)
-
-
8. An apparatus, comprising:
-
a memory; and at least one processor coupled to the memory and configured to; determine one or more packages distributed in firmware of a baseboard management controller (BMC); determine a respective update of each of the one or more packages; determine a first set of security vulnerabilities of the each package that is addressed by the respective update; determine a second set of security vulnerabilities of the each package after the respective update is applied; and generate a first file indicating the first set of security vulnerabilities and the second set of security vulnerabilities. - View Dependent Claims (9, 10, 11, 12, 13, 14)
-
-
15. A computer-readable medium storing computer executable code for operating a testing platform, comprising code to:
-
determine one or more packages distributed in firmware of a baseboard management controller (BMC); determine a respective update of each of the one or more packages; determine a first set of security vulnerabilities of the each package that is addressed by the respective update; determine a second set of security vulnerabilities of the each package after the respective update is applied; and generate a first file indicating the first set of security vulnerabilities and the second set of security vulnerabilities. - View Dependent Claims (16, 17, 18, 19, 20)
-
Specification