Patch ID: OpForce5.0+p1318583 Release Date: 4 July 2008 Synopsis: logging level info revealing passwords passed as CLI arguments in plain text while software deployment Apply to Release: 5.0 (build 5.0.02-007) Affected Architecture(s): All supported Resolves Bug ID(s): 1318583 Conflicting Patches: None Other Required Patches: None Keywords: Software Deployment Important Notice: Please apply 5.0MP1 before applying this patch Rollback Possible: Yes Rollback Procedure: 1. rollbackpatch.sh for Linux and Solaris 2. rollbackpatch.bat for Windows Description: Patch Installation Instructions: To apply this patch on a Linux or Solaris OpForce server: If you have already applied this patch once already, backup the elemental.jar-Pre-OpForce5.0+p1318583 files already present on your system and use them to rollback the patch, if needed. Note: Multiple runs of patch without backing up the file elemental.jar-Pre-OpForce5.0+p1318583 will result in overwriting of the originl pre-patch .jar file and hence render any further rollbacks ineffective. 1. Create a patch directory, and extract: OpForce5.0+p1318583.tar 2. Change directory to the patch directory. 3. Run chmod +x installpatch.sh 3. Run ./installpatch.sh To apply this patch on a Windows OpForce server: 1. Create a directory for patch extraction and extract: OpForce5.0+p1318583.tar 2. Change directory to the patch directory. 3. Run installpatch.bat Note: User may need to open and verify the batch file if, it is ftp-ed accross Unix/Windows platforms. Patch Rollback instructions ---------------------------- To remove this patch from the Provisioning Manager Server: elemental.jar-Pre-OpForce5.0+p1318583 files already present on your system and use them to rollback the patch, For Linux and Solaris, 1. Run chmod +x rollbackpatch.sh 2. Run ./rollbackpatch.sh For Windows, 1. Run rollbackpatch.bat