<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Cortex XDR Vulnerability Assessment - Linux Backporting Security Fixes in Cortex XDR Discussions</title>
    <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/407545#M740</link>
    <description>&lt;P&gt;Dear community&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When using the Vulnerability Assessment with Linux hosts, the results may include a lot of false positives.&lt;/P&gt;&lt;P&gt;Distributions which are backporting security fixes (CentOS / Debian) do may not change the App Version when they got patched.&lt;/P&gt;&lt;P&gt;&lt;A href="https://access.redhat.com/security/updates/backporting" target="_blank"&gt;https://access.redhat.com/security/updates/backporting&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"Backporting has a number of advantages for customers, but it can create confusion when it is not understood. Customers need to be aware that just looking at the version number of a package will not tell them if they are vulnerable or not"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"We also supply&amp;nbsp;&lt;A href="https://access.redhat.com/articles/221883" target="_blank"&gt;OVAL definitions&lt;/A&gt;&amp;nbsp;(machine-readable versions of our advisories) that third-party vulnerability tools can use to determine the status of vulnerabilities, even when security fixes have been backported."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I didn't see much in the documentation, and I'm not sure if this is "working as expected" or if there is a way to improve the configuration for better detection.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cheers&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Fabian&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 18 May 2021 14:52:31 GMT</pubDate>
    <dc:creator>fb-pan</dc:creator>
    <dc:date>2021-05-18T14:52:31Z</dc:date>
    <item>
      <title>Cortex XDR Vulnerability Assessment - Linux Backporting Security Fixes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/407545#M740</link>
      <description>&lt;P&gt;Dear community&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When using the Vulnerability Assessment with Linux hosts, the results may include a lot of false positives.&lt;/P&gt;&lt;P&gt;Distributions which are backporting security fixes (CentOS / Debian) do may not change the App Version when they got patched.&lt;/P&gt;&lt;P&gt;&lt;A href="https://access.redhat.com/security/updates/backporting" target="_blank"&gt;https://access.redhat.com/security/updates/backporting&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"Backporting has a number of advantages for customers, but it can create confusion when it is not understood. Customers need to be aware that just looking at the version number of a package will not tell them if they are vulnerable or not"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"We also supply&amp;nbsp;&lt;A href="https://access.redhat.com/articles/221883" target="_blank"&gt;OVAL definitions&lt;/A&gt;&amp;nbsp;(machine-readable versions of our advisories) that third-party vulnerability tools can use to determine the status of vulnerabilities, even when security fixes have been backported."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I didn't see much in the documentation, and I'm not sure if this is "working as expected" or if there is a way to improve the configuration for better detection.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cheers&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Fabian&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 May 2021 14:52:31 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/407545#M740</guid>
      <dc:creator>fb-pan</dc:creator>
      <dc:date>2021-05-18T14:52:31Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Vulnerability Assessment - Linux Backporting Security Fixes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/420902#M879</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71529"&gt;@fb-pan&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Dear community&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;When using the Vulnerability Assessment with Linux hosts, the results may include a lot of false positives.&lt;/P&gt;&lt;P&gt;Distributions which are backporting security fixes (CentOS / Debian) do may not change the App Version when they got patched.&lt;/P&gt;&lt;P&gt;&lt;A href="https://access.redhat.com/security/updates/backporting" target="_blank" rel="noopener"&gt;https://access.redhat.com/security/updates/backporting&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"Backporting has a number of advantages for customers, but it can create confusion when it is not understood. Customers need to be aware that just looking at the version number of a package will not tell them if they are vulnerable or not"&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;"We also supply&amp;nbsp;&lt;A href="https://access.redhat.com/articles/221883" target="_blank" rel="noopener"&gt;OVAL definitions&lt;/A&gt;&amp;nbsp;(machine-readable versions of our advisories) that third-party vulnerability tools can use to determine the status of vulnerabilities, even when security fixes have been backported."&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;I didn't see much in the documentation, and I'm not sure if this is "working as expected" or if there is a way to improve the configuration for better detection.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Cheers&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;Fabian&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Hi&amp;nbsp;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71529"&gt;@fb-pan&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Hi Fabian,&lt;/P&gt;&lt;P&gt;Thank you for reporting on the backporting strategy implemented by RedHat and other potential Linux vendors. Are you finding that your endpoints encountering an increase in false positives in their vulnerability assessments as a result? I'm certain that Palo Alto Networks Engineers would be interested in hearing about your results and analyzing any data you could provide regarding the concern/issue.&lt;/P&gt;</description>
      <pubDate>Tue, 20 Jul 2021 22:52:20 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/420902#M879</guid>
      <dc:creator>gjenkins</dc:creator>
      <dc:date>2021-07-20T22:52:20Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Vulnerability Assessment - Linux Backporting Security Fixes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/420933#M882</link>
      <description>&lt;P&gt;Hi&amp;nbsp;&lt;SPAN&gt;gjenkins&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;Thanks for your answer. I was in contact with a PAN Cortex SE and he told me, that they know about this (by design)..&lt;/P&gt;&lt;P&gt;He did open an FR (not sure about the FR ID). If you want to vote for this FR, I can ask for the ID.&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jul 2021 06:22:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/420933#M882</guid>
      <dc:creator>fb-pan</dc:creator>
      <dc:date>2021-07-21T06:22:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Vulnerability Assessment - Linux Backporting Security Fixes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/421102#M888</link>
      <description>&lt;P&gt;Ive also brought this up to out SE and sales when vulnerability assessment was added, I was told its working and the endpoint is vulnerable.&lt;/P&gt;&lt;P&gt;I provided examples of applications that are patched and never received an acceptable answer&lt;/P&gt;&lt;P&gt;Its unusable as a means to gauge a Linux devices vulnerability posture&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jul 2021 16:44:16 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/421102#M888</guid>
      <dc:creator>NathanBradley</dc:creator>
      <dc:date>2021-07-21T16:44:16Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Vulnerability Assessment - Linux Backporting Security Fixes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/421120#M891</link>
      <description>&lt;P&gt;Hi &lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/71529"&gt;@fb-pan&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;&lt;P&gt;It's quite understandable that a feature request had been logged as backporting had not been considered. In this case, monitoring for support in the next iteration of the Vulnerability Assessment would be the best next step. I look forward to seeing how this would be accomplished.&lt;/P&gt;</description>
      <pubDate>Wed, 21 Jul 2021 17:55:22 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/421120#M891</guid>
      <dc:creator>gjenkins</dc:creator>
      <dc:date>2021-07-21T17:55:22Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Vulnerability Assessment - Linux Backporting Security Fixes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/488902#M2020</link>
      <description>&lt;P&gt;Any updates on this?&lt;/P&gt;</description>
      <pubDate>Fri, 20 May 2022 13:39:00 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/488902#M2020</guid>
      <dc:creator>NathanBradley</dc:creator>
      <dc:date>2022-05-20T13:39:00Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Vulnerability Assessment - Linux Backporting Security Fixes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/488914#M2021</link>
      <description>&lt;P&gt;Here is a specific example.&amp;nbsp;&lt;/P&gt;&lt;P&gt;A Centos server is reporting a vulnerability(cve-2018-10906) in fuse&lt;/P&gt;&lt;P&gt;Fuse has been patched via a backported update, as the changelog shows proof&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Vuln_Linux.JPG" style="width: 400px;"&gt;&lt;img src="https://live.paloaltonetworks.com/t5/image/serverpage/image-id/41084iFF6A21D096EE2097/image-size/medium/is-moderation-mode/true?v=v2&amp;amp;px=400" role="button" title="Vuln_Linux.JPG" alt="Vuln_Linux.JPG" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Fri, 20 May 2022 13:56:14 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/488914#M2021</guid>
      <dc:creator>NathanBradley</dc:creator>
      <dc:date>2022-05-20T13:56:14Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Vulnerability Assessment - Linux Backporting Security Fixes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/496858#M2079</link>
      <description>&lt;P&gt;Just wondering, any support ticket filed for this? If not, any feature request to vote for... improve accuracy?&lt;/P&gt;</description>
      <pubDate>Wed, 01 Jun 2022 09:44:01 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/496858#M2079</guid>
      <dc:creator>Antony_Chan</dc:creator>
      <dc:date>2022-06-01T09:44:01Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Vulnerability Assessment - Linux Backporting Security Fixes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/501398#M2135</link>
      <description>&lt;P&gt;We worked with our SE and support previously, we never received an acceptable resolution\explanation.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 16:52:04 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/501398#M2135</guid>
      <dc:creator>NathanBradley</dc:creator>
      <dc:date>2022-06-07T16:52:04Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Vulnerability Assessment - Linux Backporting Security Fixes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/501420#M2136</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://live.paloaltonetworks.com/t5/user/viewprofilepage/user-id/202190"&gt;@Antony_Chan&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;Just wondering, any support ticket filed for this? If not, any feature request to vote for... improve accuracy?&lt;/P&gt;&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;Hi Myu06kkn,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please reach out to your Sales Engineer/Account Team to get added to this Feature Request and track progress.&lt;/P&gt;</description>
      <pubDate>Tue, 07 Jun 2022 17:22:42 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/501420#M2136</guid>
      <dc:creator>afurze</dc:creator>
      <dc:date>2022-06-07T17:22:42Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Vulnerability Assessment - Linux Backporting Security Fixes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/505479#M2249</link>
      <description>&lt;P&gt;I recently opened a ticket and worked with support again. They stated its currently working as designed, XDR looks at the NIST database for the version only&lt;/P&gt;&lt;P&gt;This time they opened an "internal ticket to explain the issue to the backend team" and gave me the ticket ID&lt;/P&gt;&lt;P&gt;Suggested i reach out to my sales rep to get improvement followups with the feature&lt;/P&gt;&lt;P&gt;I assume the more customers the better&lt;/P&gt;</description>
      <pubDate>Wed, 22 Jun 2022 19:44:11 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/505479#M2249</guid>
      <dc:creator>NathanBradley</dc:creator>
      <dc:date>2022-06-22T19:44:11Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Vulnerability Assessment - Linux Backporting Security Fixes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/528670#M3473</link>
      <description>&lt;P&gt;Hello Nathan, &lt;BR /&gt;Any Updates on the topic? we are in the same situation as you where.&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 05:20:34 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/528670#M3473</guid>
      <dc:creator>ADurban Martin</dc:creator>
      <dc:date>2023-01-26T05:20:34Z</dc:date>
    </item>
    <item>
      <title>Re: Cortex XDR Vulnerability Assessment - Linux Backporting Security Fixes</title>
      <link>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/528724#M3476</link>
      <description>&lt;P&gt;I am not aware of any updates.&lt;/P&gt;
&lt;P&gt;Maybe the more customers who contact support regarding the issue it will get more attention?&lt;/P&gt;</description>
      <pubDate>Thu, 26 Jan 2023 15:44:33 GMT</pubDate>
      <guid>https://live.paloaltonetworks.com/t5/cortex-xdr-discussions/cortex-xdr-vulnerability-assessment-linux-backporting-security/m-p/528724#M3476</guid>
      <dc:creator>NathanBradley</dc:creator>
      <dc:date>2023-01-26T15:44:33Z</dc:date>
    </item>
  </channel>
</rss>

