This page lists publically-released patches for Veritas Enterprise Products.
For Product GA build, see Veritas Entitlement Management System(VEMS) by clicking the Veritas Support 'Licensing' option.
For information on private patches, contact Veritas Technical Support.
Veritas is making it easier to find all software installers and updates for Veritas products with a completely redesigned experience. NetBackup HotFixes and NetBackup Appliance patches are now also available at the new Veritas Download Center.
Patches for your product can have a variety of names. These names are based on product, component, or package names. For more information on patch naming conventions and the relationship between products, components, and packages, see the SORT online help.
OpForce5.0MP1+p1318583
Sign in if you want to rate this patch.

 Basic information
Release type: Hot Fix
Release date: 2008-07-04
OS update support: None
Technote: None
Documentation: None
Popularity: 510 viewed    1 downloaded
Download size: 110 KB
Checksum: 4260795862

 Applies to one or more of the following products:
Provisioning Manager 5.0 MP1 On RHEL4 x86-64
Provisioning Manager 5.0 MP1 On RHEL5 x86-64
Provisioning Manager 5.0 MP1 On SLES10 x86-64
Provisioning Manager 5.0 MP1 On SLES11 x86-64
Provisioning Manager 5.0 MP1 On SLES9 x86-64
Provisioning Manager 5.0 MP1 On Solaris 10 SPARC
Provisioning Manager 5.0 MP1 On Solaris 10 X86
Provisioning Manager 5.0 MP1 On Windows 32-bit
Provisioning Manager 5.0 MP1 On Windows 64-bit

 Obsolete patches, incompatibilities, superseded patches, or other requirements:
None.

 Fixes the following incidents:
1318583

 Patch ID:
None.

 Readme file  [Save As...]
Patch ID: OpForce5.0+p1318583
Release Date: 4 July 2008 
Synopsis: logging level info revealing passwords passed as CLI arguments in plain text while software deployment
Apply to Release: 5.0 (build 5.0.02-007)
Affected Architecture(s): All supported
Resolves Bug ID(s): 1318583
Conflicting Patches: None
Other Required Patches: None 
Keywords: Software Deployment

Important Notice: Please apply 5.0MP1 before applying this patch

Rollback Possible: Yes

Rollback Procedure:
1. rollbackpatch.sh for Linux and Solaris
2. rollbackpatch.bat for Windows


Description: 


Patch Installation Instructions:

To apply this patch on a Linux or Solaris OpForce server:

 If you have already applied this patch once already, backup the
  elemental.jar-Pre-OpForce5.0+p1318583 files already
  present on your system and use them to rollback the patch, if needed.
  
  Note: Multiple runs of patch without backing up the file elemental.jar-Pre-OpForce5.0+p1318583
  will result in overwriting of the originl pre-patch .jar file and hence render any further
  rollbacks ineffective.

  1. Create a patch directory, and extract:
       OpForce5.0+p1318583.tar
  2. Change directory to the patch directory.
  3. Run chmod +x installpatch.sh
  3. Run ./installpatch.sh
  
To apply this patch on a Windows OpForce server:
  1. Create a directory for patch extraction and extract:
	OpForce5.0+p1318583.tar
  2. Change directory to the patch directory.
  3. Run installpatch.bat
  Note: User may need to open and verify the batch file if, 
	it is ftp-ed accross Unix/Windows platforms.

Patch Rollback instructions
----------------------------
To remove this patch from the Provisioning Manager Server:

  elemental.jar-Pre-OpForce5.0+p1318583 files already
  present on your system and use them to rollback the patch, 

   For Linux and Solaris,
1. Run 
	chmod +x rollbackpatch.sh 
2. Run 
	./rollbackpatch.sh 

   For Windows,
1. Run 
	rollbackpatch.bat 



Read and accept Terms of Service