Description
HMC V7 R3.1.0 Recovery Media images
The HMC V7 R3.1.0 Recovery Media images can be used to upgrade your HMC to
V7 R3.1.0, or to perform a clean installation of HMC V7 R3.1.0.
Updating to HMC V7 R3.1.0 requires an Upgrade by means of Recovery Media or
the Network. There are no updates to be used with the Install Corrective
Service task. For upgrade instruction, please refer to the Special Upgrade Instructions for V7 R3.1.0.
Package information
Package name |
Size (bytes) |
Checksum |
APAR # |
PTF# |
HMC_Recovery_V7R3.1.0_1.iso |
1133940736 |
16008 |
MB02021 |
MH00998 |
Splash panel information (lshmc -V command
output)
Version: 7
Release: 3.1.0
Service Pack: 0
HMC Build level 20070518.1
","base_version=V7R3.1.0
Enhancements and fixes for HMC V7 3.1.0
This package provides the following enhancements and fixes:
Server and Partition Management
The most significant and the most noticeable change in the HMC for V7 R3.1.0
is the move to a new Web-based User Interface both locally and remote. This
interface uses a tree style navigation model providing hierarchical views of
system resources and tasks using drill-down and launch-in-context techniques to
enable direct access to hardware resources and task management capabilities. It
provides views of system resources and provides tasks for system
administration.
HMC V7 R3.1.0 can manage both POWER5 (with SF240_299 firmware level and
above) and POWER6 servers.
On Power6 servers the following new features/enhancements have been added.
System Plan
defsysplanres
defines a
system plan resource
lssysplanres
lists
defined system plan resources
rmsysplanres
removes a
defined system plan resource
Licensed Internal Code (LIC) update
Save Upgrade Data/Backup
Added support for saving data to USB memory stick.
Network connectivity
Allow VPN selectable interface and route for ipsec
communication
Previously, VPN did not work if the interface for ipsec
traffic was different from the public default gateway interface. For instance,
if eth1 had been set up for the VPN connection, and eth2 was the
"public" network and had the default route, then even after adding
static routes for the VPN catchers for eth1, the ipsec
program used the default route for communication. This behavior has been
changed so that the defined routes will be used to establish the VPN.
The GUI path to view the RIO Topology is:
Hardware (Information) -> Adapters -> View
Under this path, "View RIO Topology" has been changed to
"View Hardware Topology"
Service Focal Point (SFP)
Added refcode links to Manage Serviceable Events.
DLPAR
Memory and Processors
You will notice that the DLPAR
operations have slightly changed in the V7 R3.1.0 HMC. An overall change is
that the Add and Remove operations for memory and processor resources have been
combined into one task. For example, when you want to change the amount of
memory that is assigned to the partition you simply launch the
"Add/Remove" memory task and enter in the amount of memory you would
like to have assigned to the lpar.
Physical I/O
For Physical I/O resources we have
combined the move and remove operation into one task so that now you can
optionally move the I/O resource that you are trying to remove to another
partition. The "Add" operation for I/O resources has basically stayed
the same.
RMC-less DLPAR for AIX/Linux
Partitions
POWER5 HMC supported DLPAR
operations between two AIX or Linux partitions that do not have RMC
connections. This function has been removed from the UI due to the fact that
these types of operations require multiple steps for the user in order to be
successful. You can still remove or add resources to a partition that doesn't
have an RMC connection, however you will not be able
to move resources between two AIX or Linux partitions that do not have active
RMC connections.
Another change that has been
implemented for DLPAR operations is that the task will display an indicator
within the dialog for AIX and Linux partitions the alerts you to the fact that
an RMC connection is missing. This is so that you know you are about to perform
and RMC-less DLPAR operation before you start entering data into the fields in
the dialog.
If you would still like to move
resources between two AIX or Linux partitions that do not have RMC connections
the command line "chhwres" command can
still be used to facilitate the move operation.
Fix |
Description |
CAN-2003-0989 |
tcpdump remote DOS |
CAN-2003-0190 |
OpenSSH: info leak issue |
CAN-2004-0078 |
mutt remote buffer overflow |
CAN-2004-0110 |
libxml2 URI Parsing Remote Buffer Overflow |
CAN-2004-0109 |
Kernel ISO9660/JFS local privilege escalation, info leak |
CAN-2004-0183 |
tcpdump ISAKMP remote DOS |
CA-2005-35 |
SSH Protocol 1 Weakness and Vulnerability |
CAN-2004-0427 |
Kernel privilege escalation, local DoS |
CAN-2004-0554 |
Kernel "__clear_fpu()"
Macro local DoS |
CAN-2004-0523 |
kerberos aname_to_localname
remote root compromise |
CVE-2004-0493 |
Input Header Memory Allocation Denial of Service |
CVE-2004-0488 |
Apache mod_ssl FakeBasicAuth Buffer overflow |
CVE-2004-0747 |
Apache 2 Multiple Denial of Service |
CVE-2004-0942 |
Apache MIME Header Memory Consumption |
CAN-2004-0460 |
dhcp-server: remote system
compromise |
CVE-2002-1363 |
libpng remote DoS |
CAN-2004-0590 |
Certificate chain authentication in Openswan
pluto |
CAN-2004-0649 |
L2tpd: remote execution of arbitrary files w/ privs of l2tpd user |
VU#388984 |
libpng: multiple vulnerabilities |
CAN-2004-0415 |
Kernel: local privilege escalation, race condition in file
offset pointer handling |
VU#550464 |
krb5: remote unauthenticated DoS |
CAN-2004-0817 |
imlib: local execution via heap
overflow |
CAN-2004-0687 |
xf86: multiple buffer overflows with malformed xpm images |
CAN-2004-0966 |
gettext: Insecure temporary file
handling |
CAN-2004-0804 |
tiff: Buffer overflows in image decoding |
CAN-2004-0884 |
Cyrus-sasl2: (ver2.1.7)Insecure handling of environment
variable |
CAN-2004-0971 |
krb5: krb5-workstation: Possible symlink
attack, priv escalation via temporary file
mishandling |
CAN-2004-0989 |
libxml: remote code execution,
buffer overflow |
CVE-2004-0079 |
Openssl vulnerability |
CAN-2004-0975 |
Openssl: possible symlink attack via temp file mishandling |
SUSE-SA:2004:041 |
xf86: SuSE security updates for libxpm |
CAN-2004-0782 |
imlib: xpm
security updates in imlib |
CAN-2004-1010 |
zip: buffer overflow in info-zip when using recursive
folder compression |
CAN-2004-1308 |
tiff: multiple buffer overflows |
CAN-2004-0986 |
iptables: variable init failure
can cause failure to load firewall rules |
CAN-2004-0883 |
Kernel update for multiple local and remote DoS vulnerabilities |
CAN-2004-0079 |
OpenSSL remote DOS |
CVE-2006-2937 |
OpenSSL vulnerability |
CAN-2005-0155 |
Perl: Security update to address two priv
escalation and a buffer overflow condition |
CAN-2005-0449 |
Updates for multiple issues on 2.4-2.6.11 kernels |
CAN-2005-1993 |
sudo: vulnerabilities allow
execution of arbitrary commands |
CAN-2005-1267 |
tcpdump: fix for several DOS
vulnerabilities |
CAN-2005-1151 |
tiff: buffer overflow allows execution of arbitrary code |
CAN-2005-0109 |
OpenSSL update |
CAN-2005-2969 |
OpenSSL fix for potential SSL
2.0 Rollback vulnerability |
CVE-2001-0572 |
SSHv1 Protocol Available |
CVE-2004-0175 |
OpenSSH SCP Client File
Corruption Vulnerability |
CVE-2006-0225 |
OpenSSH scp
remote attack vulnerability |
CVE-2006-4924 |
Open SSH vulnerability |
CVE-2006-5051 |
Open SSH vulnerability not applicable to HMC due to GSSAPI
being disabled |
CVE-2006-5794 |
Open SSH vulnerability |
CVE-2006-0058 |
Sendmail remote code execution |
CVE-2006-1721 |
Cyrus-sasl remote denial of
service |
CVE-2006-2024 |
Libtiff: various denial of
service attacks |
CVE-2005-3352 |
Apache2 cross site scripting in mod_imap
and mod_ssl |
CVE-2006-0455 |
Gpg remote execution by
signature checking |
CVE-2005-3353 |
Multiple vulnerabilities in php4 |
CVE-2005-2970 |
Apache2 worker memory leak |
CVE-2005-2974 |
Libungif denial of service
attack/buffer overflow |
CVE-2005-2959 |
Sudo environment cleaning
privilege escalation vulnerability |
CAN-2005-2491 |
PCRE: Integer overflow vulnerability |
CVE-2005-3119 |
Kernel potential denial of service and information
disclosure |
CAN-2005-2797 |
OpenSSH: fixes to prevent
escalation of privileges and bypass certain security restrictions |
CVE-2005-2876 |
Util-linux umount
"-r" Re-Mounting security issue |
CAN-2005-2495 |
Xf86: Fix remote command execution |
CAN-2005-2491 |
Apache2: Security fixes |
CAN-2005-1761 |
Kernel: Various Security Fixes |
CAN-2005-2452 |
Tiff: Vulnerability allows DOS attack due to divide by
zero error |
CAN-2005-2177 |
Net-snmp remote attack
vulnerability |
CAN-2005-0448 |
Perl vulnerabilities |
CAN-2005-0758 |
Bzip2 vulnerability |
CAN-2004-1189 |
Krb5 multiple security issues |
CAN-2005-1849 |
Zlib buffer overflow |
CAN-2005-2088 |
Apache2: fix for multiple vulnerabilities |
CVE-2005-2970 |
Apache2: memory leak |
CVE-2005-3357 |
Apache2 Cryptographic problem |
CVE-2006-3747 |
Apache2: Off-by-one error in the ldap
scheme handling in the Rewrite module |
CVE-2006-3918 |
Apache2 vulnerability |
CVE-2005-2728 |
|
CAN-2004-1453 |
Glibc: Infoleak
and symlink attack vulnerabilities |
CAN-2005-1111 |
Cpio directory traversal and
privilege escalation |
CAN-2005-0605 |
Xf86: libXPM integer overflow |
CAN-2004-0970 |
Gzip: temporary file mishandling |
CAN-2005-0160 |
telnet: ENV buffer overflow |
CAN-2005-1704 |
Binutils vulnerabilities |
CAN-2005-1993 |
Sudo: race condition |
CAN-2005-0373 |
Cyrus-sasl, cyrus-sasl2 remote
code execution |
CVE-2005-0916 |
Kernel Vulnerabilities |
Web browser requirements
Hardware Management Console web browser support requires HTML 2.0,
JavaScript 1.0, Java Virtual Machine (JVM), and cookie support in browsers that
will connect to it. Contact your support personnel to assist you in determining
if your browser is configured with a Java Virtual Machine. It is required that
the web browser uses the HTTP 1.1 protocol and if you are using a proxy server,
the HTTP 1.1 protocol is enabled for the proxy connections. Additionally,
pop-ups must be enabled for all Hardware Management Consoles addressed in the
browser if running with pop-ups disabled. The following browsers have been
tested:
Microsoft Internet Explorer 6.0 or
later
If this browser is configured to
use an Internet proxy, then local intranet addresses should be included in the
exception list, consult your network administrator for more information. If you
still need to use the proxy to get to the Hardware Management Console, enable Use
HTTP 1.1 through proxy connections under the Advanced
tab in your Internet Options window.
Firefox 1.5.0.6 or later.
For Firefox
2.0 make sure the JavaScript options to raise or lower
windows and move or resize existing windows are enabled. To enable these
options, go to the Content tab in the browser's Options dialog.
Click the Advanced button adjacent to the Enable JavaScript
checkbox, and then select Raise or lower windows option and Move or resize
existing windows option. These features allow you to switch easily between HMC
tasks.
Other Web Browser Considerations
Session cookies need to be enabled in order for ASMI to work when connected
to HMC remotely. The asm proxy code saves session
information and uses it.
Using Internet Explorer
Using Firefox
Other Issues
Several major components comprise this user interface:
Banner
Across the top of the workplace
window, the Banner identifies the product and logo. It is optionally displayed
and is set by using the Change User Interface Settings task.
Task bar
Located below the Banner, the Task
bar displays the name(s) of any tasks that are running, the user ID under which
you are logged in and online help information. It also provides the ability to
log off or disconnect from the console.
Navigation pane
Located in the left portion of the
window, the Navigation pane contains the primary navigation links for managing
your system resources and the Hardware Management Console. The items are
referred to as nodes.
Work pane
Located in the right portion of the
window, the Work pane displays information based on the current selection from
the Navigation pane. For example, when Welcome is selected in the
Navigation pane, the Welcome window content is displayed in the Work pane.
Status bar
Located in the bottom left portion
of the window, the Status bar provides visual indicators of current overall
system status. It also contains a status overview icon which may be selected to
display more detailed status information in the Work pane.
The System p Operations Guide for the Hardware Management Console and
Managed Systems can be accessed online on the HMC. Select Welcome in
the Navigation pane. The Welcome window content is displayed in the Work pane.
Select HMC Operations Guide to view it.
Additional education, support, tutorial and technical information can also
be accessed online on the HMC. Select Welcome in the Navigation pane.
The Welcome window content is displayed in the Work pane. Select Online
Information to view it.
To log on to the HMC from a remote browser, the HMC must first be configured
for web browser access. See Appendix B of the System p Operations Guide for
the Hardware Management Console and Managed Systems for instructions on how
to configure the HMC for remote web browser access. After the HMC has been
properly configured, from your web browser enter the URL of the HMC using the
format https://xxx.xxx.xxx.xxx. Also in Appendix B, it is important to
read the "Logging on the HMC from a LAN connected Web browser"
section. Security warnings may be presented to your Web browser and the issues
related to certificate management should be understood prior to using this
function so you can perform the appropriate actions.
Upgrade hints
Certificates and key ring files generated by the System Manager Security
application (on HMC Version 6) will not be migrated to HMC Version 7.
Applications such as remote 5250, which import the public key ring file to
establish a secure connection with HMC, will need to import a new public key
ring file. The new file, SM.pubkr, will be
generated and stored on HMC V7 under the /opt/ccfw/data
directory. You can copy this file by using the scp or sendfile
command.
For further information on how to set up remote 5250 by using SSL, see the
support document located on the
The IBM System p Information Delivery Design
With the introduction of IBM System p with POWER6 technology, IBM is
changing many aspects of its product information delivery. IBM has produced a
full-color document that identifies these changes and explains the improvements
to user experience. This document is called Introducing Improved Information
Delivery for IBM System p Hardware, and includes these topics:
Introducing Improved Information Delivery for IBM System p Hardware
is available from this Support for IBM System p web site.
With HMC V7 External web sites, including the "
Repair and verify information is launched automatically on the HMC during
the repair of a serviceable event. Repair and verify information, on-line help,
reference codes, the "Operations Guide for the Hardware Management
Console," and the "
V6 R1.X to V7 R3.1.0 Task Mappings
This information is used to aid POWER5 HMC users in locating the equivalent WebSM HMC task in the new Web-based HMC UI. The information
is divided into the following sections:
Refer to the System p Operations Guide for the Hardware Management Console and Managed Systems for a complete list of the Task Mappings.