OpForce5.0MP1+p1318583

 Basic information
Release type: Hot Fix
Release date: 2008-07-04
OS update support: None
Technote: None
Documentation: None
Popularity: 526 viewed    1 downloaded
Download size: 110 KB
Checksum: 4260795862

 Applies to one or more of the following products:
Provisioning Manager 5.0 MP1 On RHEL4 x86-64
Provisioning Manager 5.0 MP1 On RHEL5 x86-64
Provisioning Manager 5.0 MP1 On SLES10 x86-64
Provisioning Manager 5.0 MP1 On SLES11 x86-64
Provisioning Manager 5.0 MP1 On SLES9 x86-64
Provisioning Manager 5.0 MP1 On Solaris 10 SPARC
Provisioning Manager 5.0 MP1 On Solaris 10 X86
Provisioning Manager 5.0 MP1 On Windows 32-bit
Provisioning Manager 5.0 MP1 On Windows 64-bit

 Obsolete patches, incompatibilities, superseded patches, or other requirements:
None.

 Fixes the following incidents:
1318583

 Patch ID:
None.

Readme file
Patch ID: OpForce5.0+p1318583
Release Date: 4 July 2008 
Synopsis: logging level info revealing passwords passed as CLI arguments in plain text while software deployment
Apply to Release: 5.0 (build 5.0.02-007)
Affected Architecture(s): All supported
Resolves Bug ID(s): 1318583
Conflicting Patches: None
Other Required Patches: None 
Keywords: Software Deployment

Important Notice: Please apply 5.0MP1 before applying this patch

Rollback Possible: Yes

Rollback Procedure:
1. rollbackpatch.sh for Linux and Solaris
2. rollbackpatch.bat for Windows


Description: 


Patch Installation Instructions:

To apply this patch on a Linux or Solaris OpForce server:

 If you have already applied this patch once already, backup the
  elemental.jar-Pre-OpForce5.0+p1318583 files already
  present on your system and use them to rollback the patch, if needed.
  
  Note: Multiple runs of patch without backing up the file elemental.jar-Pre-OpForce5.0+p1318583
  will result in overwriting of the originl pre-patch .jar file and hence render any further
  rollbacks ineffective.

  1. Create a patch directory, and extract:
       OpForce5.0+p1318583.tar
  2. Change directory to the patch directory.
  3. Run chmod +x installpatch.sh
  3. Run ./installpatch.sh
  
To apply this patch on a Windows OpForce server:
  1. Create a directory for patch extraction and extract:
	OpForce5.0+p1318583.tar
  2. Change directory to the patch directory.
  3. Run installpatch.bat
  Note: User may need to open and verify the batch file if, 
	it is ftp-ed accross Unix/Windows platforms.

Patch Rollback instructions
----------------------------
To remove this patch from the Provisioning Manager Server:

  elemental.jar-Pre-OpForce5.0+p1318583 files already
  present on your system and use them to rollback the patch, 

   For Linux and Solaris,
1. Run 
	chmod +x rollbackpatch.sh 
2. Run 
	./rollbackpatch.sh 

   For Windows,
1. Run 
	rollbackpatch.bat 
Read and accept Terms of Service