1.
Installing this PTF using
the Enhanced+ interface may hang. Prior to installing this
PTF using the web browser graphical interface perform the
following:
2. After applying Service Pack 3 (PTF MH01583), discard any older
backups and take a new backup. When taking a backup, specify the
current fix level (lshmc -V output) in the backup description
field to help identify the fix level the backup was taken from.
Before restoring a backup, apply the same fix level (service pack
and iFix) that the backup was taken on. If this is not
followed the restore may produce unpredictable results.
- Fixed an issue that caused the following problems to occur
after installing PTF MH01678:
- Custom HMC users are unable to log in to the HMC GUI
and receive "Console Internal Error.
Details: HTTP status code: 500 The server
encountered an internal error that prevented it from
fulfilling this request." The user can log
in via ssh however attempting to run most commands fails
with "HSCL8016 An unknown error occurred while trying
to perform this command. Retry the
command. If the error persists, contact your
software support representative."
- All custom users lose their task role assignment and
any custom managed resource role assignment. Users
hscroot, root, and hscpe (if created) are not impacted.
- One or more custom task roles may be deleted.
Recovery Instructions if MH01678 is already applied.
These instructions apply
only if MH01678 was installed
prior to MH01688.
If an HMC backup management console data exists at a known fix
level of Service Pack 3 prior to iFix MH01678, then the backup
can be restored. Perform a clean install of the HMC, apply
Service Pack 3 with the same iFix PTF that the backup was taken
with, restore the backup, then apply MH01688.
Otherwise, to recover from the issue with MH01678 already
applied:
- Log in to the HMC as hscroot.
- (optional) Record the existing custom HMC users.
The command "lshmcusr --script | grep
"taskrole=Undefined"" can be used to record the
existing users and their settings in a format that can be
used on the create user command.
- Remove all custom users.
To delete all the custom users run the command: rmhmcusr
–t all
- Update the HMC to PTF MH01688.
- Recreate the custom task roles (if impacted)
If the roles exist on another HMC, HMC replication can be
used to recreate the roles.
- Recreate the custom users.
If the users exist on another HMC, HMC replication can be
used to recreate the users. Another option is to use
the output of the lshmcusr –script command from step
2. Edit and correct the taskrole and resourcerole
fields, optionally add a passwd field to avoid the password
prompt, then create the user.
Example: mkhmcusr -i
"name=cs2,taskrole=hmcsuperadmin,description=CS2 HMC
user,pwage=99999,resourcerole=ALL:,authentication_type=local,remote_webui_access=1,remote_ssh_access=1,min_pwage=0,session_timeout=0,verify_timeout=15,idle_timeout=0,inactivity_expiration=0,passwd=abc1234"
Note: If the users are deleted after apply of MH01688 an
additional reboot may be required.
Previously released fixes also included in this PTF:
MH01678
01/30/17
|
- Fixed Apache Tomcat vulnerabilities CVE-2016-6816,
CVE-2016-6817 and CVE-2016-0762
- Enabled TLSv1.2 on HMC port 12443 when HMC is in
Legacy mode.
- Removed support for all Triple DES ciphers from
the Web UI (HMC ports 443 and 12443) to address
vulnerability: CVE-2016-2183
- Fixed a problem causing a blank window to be
opened when the ASM interface for a server is
launched when the server is in Failed Authentication
state.
- Fixed an issue where HMC performance degrades over
time until the command server and/or web servers
hang requiring a reboot to resolve. Logs will
show a large number of blocked threads for the
unified JRE and may include an error of "too many
open files". The issue is typically seen on
HMCs where external scripts are running dozens or
hundreds of commands.
- Fixed a problem that caused the lpar_netboot
command to fail with the error "The system has no
more ptys. Ask your system administrator to create
more."
|
MH01667
11/21/16
|
- Fixed multiple OpenSSL vulnerabilities:
CVE-2016-2180, CVE-2016-2182, and CVE-2016-6306
- Added DST timezone changes for Turkey, leap second
to 31 Dec 2016.
- Fixed a problem that caused the WWPN and WWNN
information for Fibre Channel adapters to be missing
from system plans created on the HMC. This
problem only occurs for Quad port Fibre Channel
adapters.
- Changed the HMC install process to report the
error SRC E3558801 when the installation of a
service pack or iFix fails due to a rare RPM
installation failure. Prior to this fix, the
service pack or iFix installation appeared to finish
successfully.
|
Back to top