The latest patch(es) : vom-Patch-8.0.2.320
|
---|
Release type: | Patch |
Release date: | 2023-11-03 |
OS update support: | None |
Technote: | None |
Documentation: | None |
Popularity: | 308 viewed downloaded |
Download size: | 592.55 MB |
Checksum: | 3479465986 |
Operations Manager 8.0.2.0 On AIX
Operations Manager 8.0.2.0 On Linux Operations Manager 8.0.2.0 On Solaris 11 SPARC Operations Manager 8.0.2.0 On Solaris 11 X64 Operations Manager 8.0.2.0 On Windows x64 |
|
4125903, 4125920, 4125924, 4125928, 4126011, 4126016, 4131151, 4134499, 4134503, 4134521, 4134524, 4134530, 4136201, 4137424
|
None.
|
* * * READ ME * * * * * * Veritas Operations Manager 8.0.2 * * * * * * Patch 310 * * * Patch Date: 2023-11-03 This document provides the following information: * PATCH NAME * OPERATING SYSTEMS SUPPORTED BY THE PATCH * PACKAGES AFFECTED BY THE PATCH * BASE PRODUCT VERSIONS FOR THE PATCH * SUMMARY OF INCIDENTS FIXED BY THE PATCH * DETAILS OF INCIDENTS FIXED BY THE PATCH * INSTALLATION PRE-REQUISITES * INSTALLING THE PATCH * REMOVING THE PATCH PATCH NAME ---------- Veritas Operations Manager 8.0.2 Patch 310 OPERATING SYSTEMS SUPPORTED BY THE PATCH ---------------------------------------- AIX 7.1 AIX 7.2 RHEL7 x86-64 RHEL8 x86-64 RHEL9 x86-64 SLES12 x86-64 SLES15 x86-64 Solaris 11 SPARC Solaris 11 X64 Windows 2016 X64 Windows 2019 X64 BASE PRODUCT VERSIONS FOR THE PATCH ----------------------------------- * Veritas Operations Manager 8.0.2.0 SUMMARY OF INCIDENTS FIXED BY THE PATCH --------------------------------------- Patch ID: vom-HF0802310 * 4137424 (4137422) Security Vulnerabilities fixes Patch ID: vom-HF0802300 * 4136201 (4136200) Potential data corruption while configuring VVR with Veritas InfoScale Operations Manager 8.0.2. Patch ID: vom-HF0802200 * 4134499 (4134498) Configure VVR with VCS configuration using VIOM. * 4134503 (4134502) Product Enhancement - Protecting against brute force attack * 4134521 (4134520) Product Enhancement - Create encrypted Volume on InfoScale Windows platform using VIOM. * 4134524 (4134523) Product Enhancement - Downloading the InfoScale configuration files * 4134530 (4134529) Security Vulnerabilities fixes Patch ID: vom-HF0802110 * 4131151 (4131150) Security Vulnerabilities fixes Patch ID: vom-HF0802100 * 4125903 (4125897) In clustered configuration, VIOM does not show VVR link for Secondary RVG. * 4125920 (4125916) Storage Migration plan does not get executed. * 4125924 (4125922) Registered policy signature scan may not work properly. * 4125928 (4125926) Some VIOM GUI related fixes. * 4126011 (4126009) Security Vulnerabilities fixes * 4126016 (4126015) AWS cloud attributes are not getting detected in VIOM for Amazon EC2 instance. DETAILS OF INCIDENTS FIXED BY THE PATCH --------------------------------------- This patch fixes the following incidents: Patch ID: vom-HF0802310 * 4137424 (Tracking ID: 4137422) SYMPTOM: Third party component vulnerability reported. DESCRIPTION: Following third party component has been upgraded: -------------------------------------------------------------------------------------------------------------------------------------------------- Component Name Upgraded Version(8.0.2.310) CVE FIXED COMMENTS -------------------------------------------------------------------------------------------------------------------------------------------------- Apache tomcat 9.0.82 CVE-2023-45648 (BDSA-2023-2726), APPLICABLE FOR VIOM MANAGEMENT SERVER ONLY. CVE-2023-42794 (BDSA-2023-2728), CVE-2023-44487 (BDSA-2023-2732), CVE-2023-42795 (BDSA-2023-2736), CVE-2023-41080 (BDSA-2023-2250). Spring Security 5.8.7 BDSA-2023-2481. APPLICABLE FOR VIOM MANAGEMENT SERVER ONLY. Batik XML utility library 1.17 CVE-2022-44729 (BDSA-2023-2562), APPLICABLE FOR VIOM MANAGEMENT SERVER ONLY. CVE-2022-44730 (BDSA-2023-2563). PostgreSQL Database Server 14.7 CVE-2023-2455 (BDSA-2023-1117), APPLICABLE FOR VIOM MANAGEMENT SERVER ONLY. CVE-2023-39417 (BDSA-2023-2076), CVE-2023-2454 (BDSA-2023-1119). -------------------------------------------------------------------------------------------------------------------------------------------------- RESOLUTION: Fixed the affected endpoint. Patch ID: vom-HF0802300 * 4136201 (Tracking ID: 4136200) SYMPTOM: Using VIOM Management Server versions mentioned below, you may see that Replication does not perform automatic synchronization and may cause data corruption on the VVR secondary. Affected versions 8.0.2 GA, 8.0.2.100, 8.0.2.110, 8.0.2.200 DESCRIPTION: While configuring VVR on already existing volumes and file systems which have application data, there is a possibility of data corruption on VVR secondary. Replication does not perform automatic synchronization and hence causes data corruption on VVR secondary. This is observed on Veritas InfoScale Operations Manager version 8.0.2 and subsequent patches mentioned above. RESOLUTION: Apply minimum VIOM patch 8.0.2.300 level to resume VVR configuring using the VIOM Management Server console. Patch ID: vom-HF0802200 * 4134499 (Tracking ID: 4134498) SYMPTOM: In version 8.0.2 GA to version 8.0.2.110, VVR with VCS configuration does not work. DESCRIPTION: Added VVR VCS configuration in version 8.0.2.200. User can select VCS configuration checkbox in VVR configuration wizard. RESOLUTION: Added VVR VCS configuration in version 8.0.2.200. * 4134503 (Tracking ID: 4134502) SYMPTOM: N/A DESCRIPTION: To protect against brute force attack, after every three consecutive unsuccessful log on attempts the Management Server console disables further attempts for the next five minutes. During this period when you enter the user credentials, the following warning message is displayed. You have reached the maximum login attempts, please wait for some time. RESOLUTION: N/A * 4134521 (Tracking ID: 4134520) SYMPTOM: N/A DESCRIPTION: Using VIOM 8.0.2.200 and later versions, user can create encrypted Volume on InfoScale Windows platform. Make sure Windows Agents also have VIOM version 8.0.2.200 or later. While creating new Volume using VIOM, in volume create wizard, select checkbox 'Enable Encryption' to enable encryption while creating volume on Windows hosts. This option is enabled only if KMS is configured on the host. RESOLUTION: N/A * 4134524 (Tracking ID: 4134523) SYMPTOM: N/A DESCRIPTION: Before you upgrade or reinstall one or more InfoScale servers, you can take a backup of the configuration files using the Veritas InfoScale Operations Manager Management Server console. For more details, check technote https://www.veritas.com/support/en_US/doc/viom_technote_8.0.2.200 RESOLUTION: N/A * 4134530 (Tracking ID: 4134529) SYMPTOM: Third party component vulnerability reported. DESCRIPTION: Following third party component has been upgraded: -------------------------------------------------------------------------------------------------------------------------------------------------- Component Name Upgraded Version(8.0.2.200) CVE FIXED COMMENTS -------------------------------------------------------------------------------------------------------------------------------------------------- PostgreSQL 14.7 CVE-2023-2455 (BDSA-2023-1117), APPLICABLE FOR VIOM Database CVE-2022-41862 (BDSA-2023-0215), MANAGEMENT SERVER ONLY. Server CVE-2023-2454 (BDSA-2023-1119) Spring 5.3.29 CVE-2016-1000027, APPLICABLE FOR VIOM Framework CVE-2023-20863 (BDSA-2023-0847) MANAGEMENT SERVER ONLY. Spring 5.8.6 CVE-2023-20862 (BDSA-2023-0873), APPLICABLE FOR VIOM Security BDSA-2023-1821 (CVE-2023-34035), MANAGEMENT SERVER ONLY. BDSA-2023-1825 Java 11.20.9.1 APPLICABLE FOR VIOM MANAGEMENT SERVER ONLY. Apache Tomcat 9.0.78 APPLICABLE FOR VIOM MANAGEMENT SERVER ONLY. Jackson 2.15.2 CVE-2023-35116 (BDSA-2023-1491) APPLICABLE FOR VIOM Databind MANAGEMENT SERVER ONLY. OpenSSL 1.0.2.zg CVE-2022-2068 (BDSA-2022-1716), APPLICABLE FOR VIOM CVE-2022-1292 (BDSA-2022-1242), MANAGEMENT SERVER and VIOM Agents on Windows Platforms. CVE-2023-0215 (BDSA-2023-0232), CVE-2023-0464 (BDSA-2023-0610), CVE-2022-0778 (BDSA-2022-0709), CVE-2021-23840 (BDSA-2021-0391), CVE-2021-3712 (BDSA-2021-2579), CVE-2023-2650 (BDSA-2023-1337), CVE-2021-4160 (BDSA-2022-0284), CVE-2021-23841 (BDSA-2021-0390), CVE-2023-3817 (BDSA-2023-1972), CVE-2021-23839 (BDSA-2021-0399), CVE-2023-0286, CVE-2023-0466, BDSA-2023-1866, CVE-2023-0465, CVE-2022-4304, CVE-2020-1971 -------------------------------------------------------------------------------------------------------------------------------------------------- RESOLUTION: Fixed the affected endpoint. Patch ID: vom-HF0802110 * 4131151 (Tracking ID: 4131150) SYMPTOM: Third party component vulnerability reported. DESCRIPTION: Following third party component has been upgraded: -------------------------------------------------------------------------------------------------------------------------------------------------- Component Name Upgraded Version(8.0.2.110) CVE FIXED COMMENTS -------------------------------------------------------------------------------------------------------------------------------------------------- PostgreSQL 14.7 CVE-2023-2455 (BDSA-2023-1117), APPLICABLE FOR VIOM Database CVE-2022-41862 (BDSA-2023-0215), MANAGEMENT SERVER ONLY. Server CVE-2023-2454 (BDSA-2023-1119) Spring 5.3.29 CVE-2016-1000027, APPLICABLE FOR VIOM Framework CVE-2023-20863 (BDSA-2023-0847) MANAGEMENT SERVER ONLY. Spring 5.8.5 CVE-2023-20862 (BDSA-2023-0873), APPLICABLE FOR VIOM Security BDSA-2023-1821 (CVE-2023-34035), MANAGEMENT SERVER ONLY. BDSA-2023-1825 Java 11.20.8.1 APPLICABLE FOR VIOM MANAGEMENT SERVER ONLY. Apache Tomcat 9.0.76 APPLICABLE FOR VIOM MANAGEMENT SERVER ONLY. -------------------------------------------------------------------------------------------------------------------------------------------------- RESOLUTION: Fixed the affected endpoint. Patch ID: vom-HF0802100 * 4125903 (Tracking ID: 4125897) SYMPTOM: RVG "Links" tab does not show VVR link DESCRIPTION: In a VCS clustered configuration, VVR link may not be visible on Secondary RVG. RESOLUTION: Fixed the SQL query to show the VVR link * 4125920 (Tracking ID: 4125916) SYMPTOM: Storage Migration plan does not get executed. You may see some errors on push_file.log on targeted VIOM Agent. DESCRIPTION: Storage Migration plan may not be started to run. RESOLUTION: Fixed the execution task. * 4125924 (Tracking ID: 4125922) SYMPTOM: Registered policy signature scan may not work properly. DESCRIPTION: Registered policy signature fails to detect any violations as they do not get executed. You may see some errors in push_file.log on the VIOM Agent. RESOLUTION: Allow the policy signatures to run on agents. * 4125928 (Tracking ID: 4125926) SYMPTOM: You may experience some GUI related issues like page refresh, page data is not being loaded. DESCRIPTION: In this patch, we have fixed below GUI related issues. - Some minor GUI fixes under Availability Perspective - Some minor GUI fixes under Server Perspective - GUI fixes for SmartIO feature - In Recovery plan when click on move up/down button, it skips 2 rows and some other minor GUI fixes - Minor GUI fixes for SecureFS functionality RESOLUTION: Fixed the GUI framework. * 4126011 (Tracking ID: 4126009) SYMPTOM: Third party component vulnerability reported. DESCRIPTION: Following third party component has been upgraded: -------------------------------------------------------------------------------------------------------------------------------------------------- Component Name Upgraded Version(8.0.2.100) CVE FIXED COMMENTS -------------------------------------------------------------------------------------------------------------------------------------------------- Apache Tomcat 9.0.76 BDSA-2023-0357 APPLICABLE FOR VIOM CVE-2023-28709 (BDSA-2023-1242) MANAGEMENT SERVER ONLY. Java 11.0.19.7.1 APPLICABLE FOR VIOM MANAGEMENT SERVER ONLY. JSON-java 20230618 CVE-2022-45688 (BDSA-2022-4165) APPLICABLE FOR VIOM MANAGEMENT SERVER ONLY. -------------------------------------------------------------------------------------------------------------------------------------------------- RESOLUTION: Fixed the affected endpoint. * 4126016 (Tracking ID: 4126015) SYMPTOM: Cloud name and other cloud attributes value may show empty for MHs in AWS under server perspective. DESCRIPTION: Cloud name and other cloud attributes value may show empty for MHs in AWS under server perspective. RESOLUTION: Fixed the AWS cloud detection for AWS EC2 instance. INSTALLING THE PATCH -------------------- IMPORTANT NOTE : Please take a backup of the database using the instructions given in the Admin guide before installing this patch. This Patch is applicable for VIOM 8.0.2 Management Server and Managed Hosts both. 1. Download the file vom-8.0.2.310.sfa 2. Launch a browser and login to the VIOM management server. 3. Navigate to Settings -> Deployment Icon. 4. Upload the patch to the VIOM CMS using the Upload Solutions button. The patch vom-8.0.2.310 should be visible in the Hot Fixes tree node. 5. Install this patch on Management Server using the following instructions: - Go to Settings -> Deployment -> Hot Fixes -> Veritas Infoscale Operations Manager Managed Host. - Click on Hot Fixes Tab. Click on Applicable Hosts Tab. - Right click on Management Server Name and click on Install 6. After the patch is installed successfully on Management Server, you can follow the same steps to install patch on applicable Managed Hosts. REMOVING THE PATCH ------------------ NONE SPECIAL INSTRUCTIONS -------------------- KNOWN ISSUES : -Host Overview page may not get loaded properly if you use search filter to find the host and then double click to view the Host details. This issue may be observed when there are large numbers of hosts. OTHERS ------ NONE |
Why Register?
Get notifications about ASLs/APMs, HCLs, patches, and high availability agents
As a registered user, you can create notifications to receive updates about NetBackup Future Platform and Feature Plans, NetBackup hot fixes/EEBs in released versions, Array Support Libraries (ASLs)/Array Policy Modules (APMs), hardware compatibility lists (HCLs), patches and high availability agents. In addition, you can create system-specific notifications customized to your environment.
Compare configurations
The Compare Configurations feature lets you compare different system scans by the data collector. When you sign in, you can choose a target system, compare reports run at different times, and easily see how the system's configuration has changed.
Save configurations
After logging in, you can retrieve past reports, share reports with colleagues, review notifications you received, and retain custom settings. Anonymous users cannot access these features.
Bulk uploader
As a registered user,you can upload multiple reports, using the Bulk Uploader.