vom-Patch-8.0.2.300
Obsolete
The latest patch(es) : vom-Patch-8.0.2.320 

 Basic information
Release type: Patch
Release date: 2023-10-19
OS update support: None
Technote: None
Documentation: None
Popularity: 365 viewed    downloaded
Download size: 591.79 MB
Checksum: 382754898

 Applies to one or more of the following products:
Operations Manager 8.0.2.0 On AIX
Operations Manager 8.0.2.0 On Linux
Operations Manager 8.0.2.0 On Solaris 11 SPARC
Operations Manager 8.0.2.0 On Solaris 11 X64
Operations Manager 8.0.2.0 On Windows x64

 Obsolete patches, incompatibilities, superseded patches, or other requirements:

This patch is obsolete. It is superseded by: Release date
vom-Patch-8.0.2.320 2023-12-18
vom-Patch-8.0.2.310 (obsolete) 2023-11-03

This patch supersedes the following patches: Release date
vom-Patch-8.0.2.200 (obsolete) 2023-09-30
vom-Patch-8.0.2.110 (obsolete) 2023-08-31
vom-Patch-8.0.2.100 (obsolete) 2023-07-21

 Fixes the following incidents:
4125903, 4125920, 4125924, 4125928, 4126011, 4126016, 4131151, 4134499, 4134503, 4134521, 4134524, 4134530, 4136201

 Patch ID:
None.

Readme file
                          * * * READ ME * * *
              * * * Veritas Operations Manager 8.0.2 * * *
                         * * * Patch 300 * * *
                         Patch Date: 2023-10-19


This document provides the following information:

   * PATCH NAME
   * OPERATING SYSTEMS SUPPORTED BY THE PATCH
   * PACKAGES AFFECTED BY THE PATCH
   * BASE PRODUCT VERSIONS FOR THE PATCH
   * SUMMARY OF INCIDENTS FIXED BY THE PATCH
   * DETAILS OF INCIDENTS FIXED BY THE PATCH
   * INSTALLATION PRE-REQUISITES
   * INSTALLING THE PATCH
   * REMOVING THE PATCH


PATCH NAME
----------
Veritas Operations Manager 8.0.2 Patch 300


OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
AIX 7.1
AIX 7.2
RHEL7 x86-64
RHEL8 x86-64
RHEL9 x86-64
SLES12 x86-64
SLES15 x86-64
Solaris 11 SPARC
Solaris 11 X64
Windows 2016 X64
Windows 2019 X64



BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
   * Veritas Operations Manager 8.0.2.0


SUMMARY OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
Patch ID: vom-HF0802300
* 4136201 (4136200) Potential data corruption while configuring VVR with Veritas InfoScale Operations Manager 8.0.2.
Patch ID: vom-HF0802200
* 4134499 (4134498) Configure VVR with VCS configuration using VIOM.
* 4134503 (4134502) Product Enhancement - Protecting against brute force attack
* 4134521 (4134520) Product Enhancement - Create encrypted Volume on InfoScale Windows platform  using VIOM.
* 4134524 (4134523) Product Enhancement - Downloading the InfoScale configuration files
* 4134530 (4134529) Security Vulnerabilities fixes
Patch ID: vom-HF0802110
* 4131151 (4131150) Security Vulnerabilities fixes
Patch ID: vom-HF0802100
* 4125903 (4125897) In clustered configuration, VIOM does not show VVR link for Secondary RVG.
* 4125920 (4125916) Storage Migration plan does not get executed.
* 4125924 (4125922) Registered policy signature scan may not work properly.
* 4125928 (4125926) Some VIOM GUI related fixes.
* 4126011 (4126009) Security Vulnerabilities fixes
* 4126016 (4126015) AWS cloud attributes are not getting detected in VIOM for Amazon EC2 instance.


DETAILS OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
This patch fixes the following incidents:

Patch ID: vom-HF0802300

* 4136201 (Tracking ID: 4136200)

SYMPTOM:
Using VIOM Management Server versions mentioned below, you may see that Replication does not perform automatic synchronization and may cause data corruption on the VVR secondary.
Affected versions 8.0.2 GA, 8.0.2.100, 8.0.2.110, 8.0.2.200

DESCRIPTION:
While configuring VVR on already existing volumes and file systems which have application data, there is a possibility of data corruption on VVR secondary. Replication does not perform automatic synchronization and hence causes data corruption on VVR secondary.
This is observed on Veritas InfoScale Operations Manager version 8.0.2 and subsequent patches mentioned above.

RESOLUTION:
Apply minimum VIOM patch 8.0.2.300 level to resume VVR configuring using the VIOM Management Server console.

Patch ID: vom-HF0802200

* 4134499 (Tracking ID: 4134498)

SYMPTOM:
In version 8.0.2 GA to version 8.0.2.110, VVR with VCS configuration does not work.

DESCRIPTION:
Added VVR VCS configuration in version 8.0.2.200. User can select VCS configuration checkbox in VVR configuration wizard.

RESOLUTION:
Added VVR VCS configuration in version 8.0.2.200.

* 4134503 (Tracking ID: 4134502)

SYMPTOM:
N/A

DESCRIPTION:
To protect against brute force attack, after every three consecutive unsuccessful
log on attempts the Management Server console disables further attempts for the
next five minutes. During this period when you enter the user credentials, the
following warning message is displayed.
You have reached the maximum login attempts, please wait for some time.

RESOLUTION:
N/A

* 4134521 (Tracking ID: 4134520)

SYMPTOM:
N/A

DESCRIPTION:
Using VIOM 8.0.2.200 and later versions, user can create encrypted Volume on InfoScale Windows platform. Make sure Windows Agents also have VIOM version 8.0.2.200 or later.
While creating new Volume using VIOM, in volume create wizard, select checkbox 'Enable Encryption' to enable encryption while creating volume on Windows hosts. This option is enabled only if KMS is configured on the host.

RESOLUTION:
N/A

* 4134524 (Tracking ID: 4134523)

SYMPTOM:
N/A

DESCRIPTION:
Before you upgrade or reinstall one or more InfoScale servers, you can take a backup of the configuration files using the Veritas InfoScale Operations Manager Management Server console.
For more details, check technote https://www.veritas.com/support/en_US/doc/viom_technote_8.0.2.200

RESOLUTION:
N/A

* 4134530 (Tracking ID: 4134529)

SYMPTOM:
Third party component vulnerability reported.

DESCRIPTION:
Following third party component has been upgraded:


--------------------------------------------------------------------------------------------------------------------------------------------------
Component Name	Upgraded Version(8.0.2.200)	  CVE FIXED                           COMMENTS
--------------------------------------------------------------------------------------------------------------------------------------------------


PostgreSQL      14.7                              CVE-2023-2455 (BDSA-2023-1117),     APPLICABLE FOR VIOM                               
Database                                          CVE-2022-41862 (BDSA-2023-0215),    MANAGEMENT SERVER ONLY.
Server                                            CVE-2023-2454 (BDSA-2023-1119)                                    

Spring          5.3.29                            CVE-2016-1000027,                   APPLICABLE FOR VIOM 
Framework                                         CVE-2023-20863 (BDSA-2023-0847)     MANAGEMENT SERVER ONLY.

Spring          5.8.6                             CVE-2023-20862 (BDSA-2023-0873),    APPLICABLE FOR VIOM 
Security                                          BDSA-2023-1821 (CVE-2023-34035),    MANAGEMENT SERVER ONLY.
                                                  BDSA-2023-1825

Java            11.20.9.1                                                             APPLICABLE FOR VIOM 
                                                                                      MANAGEMENT SERVER ONLY.


Apache Tomcat   9.0.78                                                                APPLICABLE FOR VIOM 
                                                                                      MANAGEMENT SERVER ONLY.

Jackson         2.15.2                            CVE-2023-35116 (BDSA-2023-1491)     APPLICABLE FOR VIOM                                                          
Databind                                                                              MANAGEMENT SERVER ONLY.


OpenSSL        1.0.2.zg                           CVE-2022-2068 (BDSA-2022-1716),     APPLICABLE FOR VIOM
                                                  CVE-2022-1292 (BDSA-2022-1242),     MANAGEMENT SERVER and VIOM Agents on Windows Platforms.
                                                  CVE-2023-0215 (BDSA-2023-0232),
                                                  CVE-2023-0464 (BDSA-2023-0610),
                                                  CVE-2022-0778 (BDSA-2022-0709),
                                                  CVE-2021-23840 (BDSA-2021-0391),
                                                  CVE-2021-3712 (BDSA-2021-2579),
                                                  CVE-2023-2650 (BDSA-2023-1337),
                                                  CVE-2021-4160 (BDSA-2022-0284),
                                                  CVE-2021-23841 (BDSA-2021-0390),
                                                  CVE-2023-3817 (BDSA-2023-1972),
                                                  CVE-2021-23839 (BDSA-2021-0399),
                                                  CVE-2023-0286,
                                                  CVE-2023-0466,
                                                  BDSA-2023-1866,
                                                  CVE-2023-0465,
                                                  CVE-2022-4304,
                                                  CVE-2020-1971
								 
--------------------------------------------------------------------------------------------------------------------------------------------------

RESOLUTION:
Fixed the affected endpoint.

Patch ID: vom-HF0802110

* 4131151 (Tracking ID: 4131150)

SYMPTOM:
Third party component vulnerability reported.

DESCRIPTION:
Following third party component has been upgraded:


--------------------------------------------------------------------------------------------------------------------------------------------------
Component Name	Upgraded Version(8.0.2.110)	  CVE FIXED                           COMMENTS
--------------------------------------------------------------------------------------------------------------------------------------------------


PostgreSQL      14.7                              CVE-2023-2455 (BDSA-2023-1117),     APPLICABLE FOR VIOM                               
Database                                          CVE-2022-41862 (BDSA-2023-0215),    MANAGEMENT SERVER ONLY.
Server                                            CVE-2023-2454 (BDSA-2023-1119)                                    

Spring          5.3.29                            CVE-2016-1000027,                   APPLICABLE FOR VIOM 
Framework                                         CVE-2023-20863 (BDSA-2023-0847)     MANAGEMENT SERVER ONLY.

Spring          5.8.5                             CVE-2023-20862 (BDSA-2023-0873),    APPLICABLE FOR VIOM 
Security                                          BDSA-2023-1821 (CVE-2023-34035),    MANAGEMENT SERVER ONLY.
                                                  BDSA-2023-1825

Java            11.20.8.1                                                             APPLICABLE FOR VIOM 
                                                                                      MANAGEMENT SERVER ONLY.


Apache Tomcat   9.0.76                                                                APPLICABLE FOR VIOM 
                                                                                      MANAGEMENT SERVER ONLY.


											 
--------------------------------------------------------------------------------------------------------------------------------------------------

RESOLUTION:
Fixed the affected endpoint.

Patch ID: vom-HF0802100

* 4125903 (Tracking ID: 4125897)

SYMPTOM:
RVG "Links" tab does not show VVR link

DESCRIPTION:
In a VCS clustered configuration, VVR link may not be visible on Secondary RVG.

RESOLUTION:
Fixed the SQL query to show the VVR link

* 4125920 (Tracking ID: 4125916)

SYMPTOM:
Storage Migration plan does not get executed. You may see some errors on push_file.log on targeted VIOM Agent.

DESCRIPTION:
Storage Migration plan may not be started to run.

RESOLUTION:
Fixed the execution task.

* 4125924 (Tracking ID: 4125922)

SYMPTOM:
Registered policy signature scan may not work properly.

DESCRIPTION:
Registered policy signature fails to detect any violations as they do not get executed. You may see some errors in push_file.log on the VIOM Agent.

RESOLUTION:
Allow the policy signatures to run on agents.

* 4125928 (Tracking ID: 4125926)

SYMPTOM:
You may experience some GUI related issues like page refresh, page data is not being loaded.

DESCRIPTION:
In this patch, we have fixed below GUI related issues.
- Some minor GUI fixes under Availability Perspective
- Some minor GUI fixes under Server Perspective
- GUI fixes for SmartIO feature
- In Recovery plan when click on move up/down button, it skips 2 rows and some other minor GUI fixes
- Minor GUI fixes for SecureFS functionality

RESOLUTION:
Fixed the GUI framework.

* 4126011 (Tracking ID: 4126009)

SYMPTOM:
Third party component vulnerability reported.

DESCRIPTION:
Following third party component has been upgraded:


--------------------------------------------------------------------------------------------------------------------------------------------------
Component Name	Upgraded Version(8.0.2.100)	  CVE FIXED                           COMMENTS
--------------------------------------------------------------------------------------------------------------------------------------------------


Apache Tomcat    9.0.76                           BDSA-2023-0357                      APPLICABLE FOR VIOM 
                                                  CVE-2023-28709 (BDSA-2023-1242)     MANAGEMENT SERVER ONLY.

Java            11.0.19.7.1                                                           APPLICABLE FOR VIOM 
                                                                                      MANAGEMENT SERVER ONLY.


JSON-java       20230618                          CVE-2022-45688 (BDSA-2022-4165)     APPLICABLE FOR VIOM 
                                                                                      MANAGEMENT SERVER ONLY.
											 
--------------------------------------------------------------------------------------------------------------------------------------------------

RESOLUTION:
Fixed the affected endpoint.

* 4126016 (Tracking ID: 4126015)

SYMPTOM:
Cloud name and other cloud attributes value may show empty for MHs in AWS under server perspective.

DESCRIPTION:
Cloud name and other cloud attributes value may show empty for MHs in AWS under server perspective.

RESOLUTION:
Fixed the AWS cloud detection for AWS EC2 instance.



INSTALLING THE PATCH
--------------------
IMPORTANT NOTE : Please take a backup of the database using the instructions given in the Admin guide before installing this patch.

This Patch is applicable for VIOM 8.0.2 Management Server and Managed Hosts both.

1. Download the file vom-8.0.2.300.sfa
2. Launch a browser and login to the VIOM management server.
3. Navigate to Settings ->                 Deployment Icon.
4. Upload the patch to the VIOM CMS using the Upload Solutions button.
The patch vom-8.0.2.300 should be visible in the Hot Fixes tree node.
5. Install this patch on Management Server using the following instructions:
- Go to Settings ->                 Deployment ->                 Hot Fixes ->                 Veritas Infoscale Operations Manager Managed Host.
- Click on Hot Fixes Tab. Click on Applicable Hosts Tab.
- Right click on Management Server Name and click on Install
6. After the patch is installed successfully on Management Server, you can follow the same steps to install patch on applicable Managed Hosts.


REMOVING THE PATCH
------------------
NONE


SPECIAL INSTRUCTIONS
--------------------
KNOWN ISSUES :

-Host Overview page may not get loaded properly if you use search filter to find the host and then double click to view the Host details. This issue may be observed when there are large numbers of hosts.


OTHERS
------
NONE