ccs-sol_sparc-5.1.2HF512001923275u

 Basic information
Release type: Hot Fix
Release date: 2010-03-25
OS update support: None
Technote: 348317
Documentation: None
Popularity: 537 viewed    downloaded
Download size: 2.58 MB
Checksum: 4047521066

 Applies to one or more of the following products:
CommandCentral 5.1.2 On Solaris SPARC

 Obsolete patches, incompatibilities, superseded patches, or other requirements:
None.

 Fixes the following incidents:
1946061

 Patch ID:
None.

Readme file
Date:2010-03-22

OS:Solaris 8, Solaris 9, Solaris 10, Windows 2000 Server, Windows 2003 Server, Windows 2008 Server

Etrack Incidents: 1946061 


Errors/Problems Fixed:[
	Security vulnerability in libssl32 (e1946061)
]


Install/Uninstall Instructions:
===========================================================================
Instructions to apply the hotfix
===========================================================================


A - Overview of the HotFix
---------------------------------------------------------------------------

Apply the HotFix (VRTSccsF512001923275) on the 5.1.2 Management
Server and managed hosts with array and switch explorers.

Supported operating systems include: 

  - Solaris 8, 9, and 10
  - Windows Server 2000, 2003, and 2008


B - Deploying the HotFix from a Windows Management Server
--------------------------------------------------------------------------

The examples in the following procedure assume that you installed 
CommandCentral on a 32-bit host in the default installation directory.

1. Copy ccs-win-5.1.2HF512001923275w.zip to a temporary location. For
   example, to C:Temp

2. After extracting the hotfix, the below two files will be available.
    - patches
    - patchesVRTSccs-F512001923275.tar.gz
    - README  (this file)

3. To apply the update, do the following:

   - Open an operating system console.
   - Change to the HAL bin directory:
       "C:Program FilesVERITASCommandCentral StorageHALin"

   - Type the following command:
       halsecurity login 
     You may have to provide the password for the 'admin' account
     which you use to log in to the Console. The default password for
     this account is 'password' (without single quotes).
   - Type the following command to deploy the update on the Management Server:
       <HAL bin dir>perl LocalUpgrade.pl C:TemppatchesVRTSccs-F512001923275.tar.gz

   - To get a list of all managed hosts in a text file, run the
     following command:
       perl CHMGetManagedHosts.pl -f C:Tempmhs.txt

      The newly-created text file mhs.txt includes the list of all
      managed hosts and the Management Server.
    - Edit mhs.txt to keep only the names of those hosts on which you
      want to update to 5.1.2 Array Agent HotFix.

    - To deploy the update to the hosts listed in C:	empmhs.txt, run
      the following command:
        perl PushUpgrade.pl -u C:TemppatchesVRTSccs-F512001923275.tar.gz -H 
C:Tempmhs.txt

4. To verify the installation, you can check the installation logs as follows:

   - To see the detailed logs, go to the "CommandCentral Storage Data"
     directory.
     The default location is:
       "C:Program FilesVERITASCommandCentral Storage DataDataHALmaint"

       cd "<HAL data dir>DataHALmaintVRTSccs-F512001923275<timestamp>output"
     For example:

       cd "C:Program FilesVERITASCommandCentral Storage DataDataHALmaint
VRTSccs-F512001923275<time stamp>output"

   - Check if there are any errors in the stderr.txt file.
   - Check the detailed logs of the hotfix application in the stdout.txt file.

5. Verify the updated version as follows:
   - Open cc_version.txt from the following directory:
     "C:Program FilesVERITASCommandCentral StorageVersioncc_version.txt"

   - Check the FIXID. It should appear as follows:

		FIXID=F512001923275
		DATE=Mon Mar 22 15:21:53 2010
		DESCRIPTION=HotFix for security vulnerability in OpenSSL libraries



C - Deploying the HotFix from a Solaris Management Server
---------------------------------------------------------

The examples in the following procedure assume that you installed
CommandCentral on a 32-bit host in the default installation directory.

1. Copy the file ccs-sol_sparc-5.1.2HF512001923275u.tar.gz to a
   temporary location. For example, to /tmp and unpack it.

2. After extracting the hotfix, you'll find the files shown below:
    - patches/
    - patches/VRTSccs-F512001923275.tar.gz
    - README  (this file)

3. To apply the update, do the following:

   - Open an operating system console.

   - Change to the HAL bin directory:
       /opt/VRTSccs/VRTShal/bin

   - Type the following command:
       ./halsecurity login 
     You may have to provide the password for the 'admin' account
     which you use to log in to the Console. The default password for
     this account is 'password' (without single quotes).
   - Type the following command to deploy the update:
       <HAL bin dir>perl LocalUpgrade.pl </tmp>/patches/VRTSccs-F512001923275.tar.gz

     For example:    
        ./perl LocalUpgrade.pl /tmp/patches/VRTSccs-F512001923275.tar.gz

    - To get a list of all managed hosts in a text file, run the
      following command:
        ./perl CHMGetManagedHosts.pl -f /tmp/mhs.txt

      The newly-created text file includes the list of all managed
      hosts and the Management Server.

    - Edit mhs.txt to keep only the names of those hosts on which you
      want to apply the 5.1.2 Array Agent HotFix.
    - To deploy the update to the hosts listed in /tmp/mhs.txt, run
      the following command:
        ./perl PushUpgrade.pl -u /tmp/patches/VRTSccs-F512001923275.tar.gz -H /tmp/mhs.txt

4. To verify the installation, you can check the installation logs as follows:

   - To see the detailed logs, go to the CommandCentral Storage Data
     directory.
     The default location is: 
        /var/VRTSccs/data/VRTShal/maint/VRTSccs-F512001923275/<time stamp>/output
        cd <HAL data dir>/data/VRTShal/maint/VRTSccs-F512001923275/<time stamp>/output
     For example:
       cd /var/VRTSccs/data/VRTShal/maint/VRTSccs-F512001923275/<time stamp>/output

   - Check if there are any errors in the stderr.txt file.
   - Check the detailed logs of the hotfix application in the stdout.txt file.

5. Verify the updated version as follows:

   - Open cc_version.txt from the following directory:
       /opt/VRTS/version/cc_version.txt
   - Check the FIXID. It should appear as follows:

		FIXID=F512001923275
		DATE=Mon Mar 22 15:21:53 2010
		DESCRIPTION=HotFix for security vulnerability in OpenSSL libraries


Additional Notes:
==================
Apply the HotFix (VRTSccs-F512001923275) on the 5.1.2
Management Server and managed hosts with array and switch explorers.