cc/td/doc/product/rtrmgmt/cemf/3_2p4
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table Of Contents

Release Notes for Cisco Element Management Framework v3.2 Service Pack 4
Cisco Element Manager November 2002 Upgrade

Contents

Introduction

Element Managers tested with Cisco EMF v3.2 SP4

Enhancements in This Release

System Requirements

System Requirements and Solaris Release Choice

Known Limitations in the Release

Cisco EMF and Cisco 6500 Element Manager SNMP Attribute Issues

Invalid Characters in Device ID Makes CNS Server Unusable

Deinstalling the Service Pack

Cisco EMF v3.2 SP 4 Performance Testing

Installing Solaris Patch Clusters for Solaris 2.6 and Solaris 8

Installation

Locating Cisco EMF Patches

Solaris Patches

Important Notes

Cisco EMF EMS Interoperability

Caveats

Open Caveats

PreFilter Caveats

RME Caveats

Resolved Between Cisco EMF v3.2 and This Release

Troubleshooting

Documentation Updates

Errors

Related Documentation

Obtaining Documentation

World Wide Web

Documentation CD-ROM

Ordering Documentation

Documentation Feedback

Obtaining Technical Assistance

Cisco.com

Technical Assistance Center

Release Notes for Cisco Element Management Framework v3.2 Service Pack 4
Cisco Element Manager November 2002 Upgrade


Customer Order Number: DOC-7814804=

Contents

This document is divided into the following sections:

Introduction

Element Managers tested with Cisco EMF v3.2 SP4

Enhancements in This Release

System Requirements

Known Limitations in the Release

Cisco EMF and Cisco 6500 Element Manager SNMP Attribute Issues

Invalid Characters in Device ID Makes CNS Server Unusable

Deinstalling the Service Pack

Cisco EMF v3.2 SP 4 Performance Testing

Installing Solaris Patch Clusters for Solaris 2.6 and Solaris 8

Installing Solaris Patch Clusters for Solaris 2.6 and Solaris 8

Locating Cisco EMF Patches

Solaris Patches

Important Notes

Cisco EMF EMS Interoperability

Caveats

Troubleshooting

Documentation Updates

Related Documentation

Obtaining Documentation

Obtaining Technical Assistance

Introduction

This is the release note for the Cisco Element Manager November 2002 update release, which is delivered as Cisco Element Management Framework v3.2, Service Pack 4. This is a 'feature upgrade' release. This means that the features are add-ons, and binary compatible, with existing deployed and available Cisco EMSs (specifically those that are based upon Cisco EMS 3.2). This release can be installed on existing and new Cisco EMF 3.2-based EMSs. This release includes all bug fixes in patches 1 to 3 for Cisco EMF 3.2 (and in mini patches on this train).

RME will provide an enhanced set of operations and administration GUI applications to complement the provisioning capability that the CNS/IE 2100 integration will provide, both complementing the fault, flow through provisioning, troubleshooting and performance tools in currently shipping Cisco Element Managers.

Cisco Element Managers will provide 'health monitoring' of multiple IE2100s and multiple RME servers, and offer co-residency of Cisco EMS/RME. Multiple RME servers will be accessible from a single GUI in Cisco Element Managers - the Map Viewer application, and device inventory synchronization between the Cisco EMS database and RME will ensure that existing network elements managed by RME will be imported - and kept in sync - within the Cisco Element Manager.

This release will also includes an enhanced SNMP northbound interface for fault OSS integration, and the first generally available release of the 'Pre Filtering' NOC application.

Pre Filtering is a GUI application for allowing NOC personnel to proactively 'cut out' unwanted alarm conditions, thereby reducing the load on the EMS, improving overall EMS scale and end application response time. This application also enables the EMS to reduce overall fault OSS load by eliminating unwanted alarms from the northbound feed to the OSS.

This update release also includes a number of bug fixes, see Caveats.

Element Managers tested with Cisco EMF v3.2 SP4

Cisco EMF v3.2, Service Pack 4 has been tested with the following Element Managers:

Cisco 6500/7600 Manager v2.1

Cisco 8500 Manager v1.0

Cisco Cable Manager (CCM) v2.2

Cisco DSL Manager v3.4 (CDM)

Cisco DSL Manager v3.4.2 (CDM)

Cisco Media Gateway Controller Node Manager (CMNM) v2.1.2

Cisco Media Gateway Manager (CMGM) v2.0

Cisco Universal Gateway Manager (UGM) v2.0

Cisco12000 Manager v2.2

Cisco Multi Device Manager-Lite (MDM-Lite) This EM is used for testing.


Note All future Cisco Element Managers will be based on Cisco EMF v3.2 SP4.


Enhancements in This Release

This update release includes some important feature enhancements, as well as a number of bug fixes:

1. Integrations between Cisco Element Managers (Cisco EMS) and CNS/CNS 2100 Series appliances for configuration.

2. Bundling and integrated with Cisco Element Managers via this release is the Resource Management Essentials (RME) product from the CiscoWorks family. RME provides an enhanced set of network element operations and administration GUI applications to complement the provisioning capability that the CNS/IE 2100 integration provides, both complementing the fault, flow through provisioning, troubleshooting and performance tools in currently shipping (detailed later) Cisco Element Managers.

3. An enhanced SNMP northbound interface for fault OSS integration, including bi-directional capability allowing the fault OSS to clear/acknowledge alarms in the EMS.

4. A Pre Filtering NOC application. Pre Filtering is a GUI application for allowing NOC personnel to proactively cut out unwanted alarm conditions, thereby reducing the load on the EMS, improving overall EMS scale and end application response time. This application also enables the EMS to reduce overall fault OSS load by eliminating unwanted alarms from the northbound feed to the OSS.

5. An Event Translator module that, if configured, can support conversion of ASCII alarm streams, for example TL1, into Cisco EMF alarms


Note More details on these enhancements can be found in the documentation for this release, see Related Documentation.


System Requirements

Cisco EMF can be deployed in a number of different configurations, from a single hardware system to a multi-site management system, using Sun Solaris/SPARC hardware with Solaris, Release 2.6 or Solaris 8.

Cisco Element Managers supported by the November 2002 upgrade run on Sun Microsystems UltraSPARC servers with the Solaris 8 operating environment installed. For detailed server specifications, visit: http://www.cisco.com/warp/public/756/partnership/sun/products/Cisco_RefModel_Descriptions_CEM.pdf


Note If you are deploying your Cisco EMF EMS on Solaris 2.6, you cannot run on one of the newer Sun products which support Solaris 8 only. This includes the SunBlade and SunFire product ranges.



Note Solaris 2.6, as of April 2001, is still fully supported but no longer sold by Sun Microsystems.


A Sun Solaris 2.6 media pack is available for purchase from Cisco.com to enable you to run Cisco Element Management Framework element managers (Cisco EMF EMSs) in the event that you do not have access to Solaris 2.6.


Note If you already have access to Solaris 2.6 CD or machine, it is not necessary to order one as they can be reused.


Sun Microsystems have given Cisco permission to ship this to you, and your Sun license permits you to install this Solaris software on Sun workstations. Note that it can be installed on both Sun desktop and server products - specifically those that support Solaris 2.6.

System Requirements and Solaris Release Choice

Cisco EMF EMSs certified to run on Solaris 8 can be deployed on the following Sun hardware models which run Solaris 8 (and above) only.

Sun Desktops: SunBlade 100, and SunBlade 1000

Sun Servers: E280R and the SunFire range 3800, 4800, 4810, 6800


Note If deploying Cisco EMF EMSs on Solaris 2.6, you cannot choose one of the aforementioned Sun systems - please deploy on a Sun system which runs Solaris 2.6.


Known Limitations in the Release

Cisco EMF and Cisco 6500 Element Manager SNMP Attribute Issues

When deploying a Cisco 6500 Manager v2.1 chassis in Cisco EMF v3.2, Service Pack 4 it is essential that the chassis is deployed using the auto discovery mechanism in order for RME Association to be successful.

This is required because the Cisco 6500 Manager v2.1 EM deployment populates the SNMP community strings in its own databases but these are not accessible by Cisco EMF. By deploying the chassis using auto discovery the SNMP attributes that Cisco EMF requires are populated correctly.

You should ensure that the device SNMP Read community is set to Public and Write community to Private.


Note This issue will be resolved, and the workaround no longer applicable, when the Cisco Catalyst Switch Manager v3.0 (which supercedes the Cisco 6500/7600 EMS) is available early in 2003.


Field Notice No. 22313 provides information about this issue.

Invalid Characters in Device ID Makes CNS Server Unusable

If the user has invalid characters in the device ID when associating a network element with a CNS Config Engine, the CNS server will become unusable and LDAP errors will be reported for all actions from then on. Nothing can be added or removed from the CNS server.

The only valid characters are hyphen (-), underscore (_), period (.) and alphanumeric characters. No other characters can be used.


Note The CNS Server will only accept the valid characters through its own GUIs.


Field Notice No. 22293 provides information about this issue.

Deinstalling the Service Pack

The Service Pack must be deinstalled from the Server and all Clients on the network.

If you plan to deinstall Service Pack 4 and then install an earlier patch, you have two options after Service Pack 4 is deinstalled:

· You can reset Cisco EMF, enter ./cemf reset.

· You can restore a pre-Service Pack 4 backup.

If you do not take this action, Cisco EMF will not start.

Cisco EMF v3.2 SP 4 Performance Testing

Cisco EMF v3.2 SP 4 performance testing shows that there is no significant degradation on VCL provisioning performance between Patch 3 and Cisco EMF v3.2 SP 4.

When an IOS image upload/download is performed against a device that has VCLs being added to it (without RME as a load on the Cisco EMF server), there is a degradation of ~50 seconds in the connection action and ~40 sec in the disconnect.

With RME as a load to the system (in a co-resident configuration) there is a subsequent ~20 second degradation in the connection times (~6%) and ~10 seconds for disconnection (~4%).

Installing Solaris Patch Clusters for Solaris 2.6 and Solaris 8

Cisco EMF v3.2 SP4 has been tested on QA testing machines which are reimaged with the required Solaris jumpstart (for Solaris 2.6 or Solaris 8 as appropriate) to give a base Solaris Installation.

Once re-imaged, the Solaris Patch Cluster is the only patches installed and no other patch installation is performed against this machine. The machines remain this way until testing is complete.

To install a Solaris Patch Cluster proceed as follows:


Step 1 If needed, re-image your machine using the appropriate Solaris installation mechanism.

Step 2 Run unzip on the cluster file to unbundle the patch cluster.

Step 3 Run the script ./install_cluster to load in the cluster.

Step 4 During the patch installation error messages may be encountered, refer to http://www.sins.com.au/unix/solaris_patch_return_codes.html

Step 5 Reboot the machine.


Installation

The Cisco Element Management Framework Installation and Administration Guide Version v3.2 Service Pack 4, provides information to install, license, and configure the product and includes detailed administration tasks.

Locating Cisco EMF Patches

You must login to Cisco.com to access patches. All Cisco patches can be accessed from : http://www.cisco.com/kobayashi/sw-center/sw-netmgmt.shtml

From this location you can select the appropriate patch page depending on the version of Cisco EMF you need to patch or if you need patches for EMS Development.


Note If you try to navigate to Cisco EMF patches via the software centre on Cisco.com, you must first select the login option, otherwise Cisco EMF patches will not be visible.


Solaris Patches

Cisco EMF 3.2 SP4 was tested with the following Solaris patches, which were current when Cisco EMF 3.2 SP4 was being tested. These reports were generated by the Sun Microsystems, Inc. utility 'Patch Check', available from http://sunsolve.sun.com.

Recommended patches (marked as 'R' by Cisco in the following reports) are considered the most important and resolve the most critical system, user, or security related bugs that have been reported and fixed by Sun to date.


Note Mandatory patches (marked as M by Cisco in the following reports) are required by Cisco EMF to function correctly.


A patch not listed on the recommended list does not imply that it should not be used if needed. Some patches listed in this report may have certain platform specific or application specific dependencies and thus may not be applicable to your system. It is important to carefully review the README file of each patch to fully determine the applicability of any patch with your system.

The current patch cluster recommended by Sun can be downloaded from http://sunsolve.sun.com. Please note that higher revisions of the patches may introduce dependencies on other patches that are not reflected in the following reports. You should follow the patch dependencies as recommended by Sun Microsystems, Inc.

Table 1 lists Solaris 2.6 patches, Table 2 lists Solaris 8 patches.

Table 1 Solaris 2.6 Patches 

Patch ID

Recommended/Mandatory

Installed Revision

Latest Revision

Synopsis

105160

 

02

14

CDE 1.2: dtterm libDtTerm.so.1 patch

105181

R

31

CURRENT

SunOS 5.6: Kernel update patch

105189

 

02

03

OBSOLETED by 106040

105210

R

46

CURRENT

SunOS 5.6: libaio, libc & watchmalloc patch

105214

 

01

CURRENT

OBSOLETED by 105181

105216

R

04

CURRENT

SunOS 5.6: /usr/sbin/rpcbind patch

105222

 

03

CURRENT

OBSOLETED by 105181

105223

 

04

05

Obsoleted by: 105181-25 SunOS 5.6: pln/soc drivers & ssafirmware p

105284

R

49

CURRENT

Motif 1.2.7: Runtime library patch

105338

R

27

CURRENT

CDE 1.2: dtmail patch

105356

R

19

CURRENT

SunOS 5.6: /kernel/drv/ssd and /kernel/drv/sd patch

105361

 

11

CURRENT

VIS/XIL 2.6: Graphics Patch

105362

 

35

41

PGX 2.6: M64 Graphics Patch

105363

 

36

38

Elite3D 2.6: AFB Graphics Patch

105375

R

26

CURRENT

SunOS 5.6: sf & socal driver patch

105377

 

03

05

SunOS 5.6: BCP patch

105379

R

07

CURRENT

SunOS 5.6: /kernel/misc/nfssrv patch

105390

 

02

CURRENT

SunOS 5.6: SGML Manual Pages Patch

105393

 

02

07

OBSOLETED by 105621

105395

R

07

CURRENT

SunOS 5.6: /usr/lib/sendmail patch

105397

 

02

CURRENT

SunOS 5.6: /usr/sbin/passmgmt patch

105400

 

02

CURRENT

SunOS 5.6: Greek keyboard layout incorrect on Sparc

105401

R

37

CURRENT

SunOS 5.6: libnsl and NIS+ commands patch

105403

R

04

CURRENT

SunOS 5.6: ypbind/ypserv patch

105405

R

03

CURRENT

SunOS 5.6: libcurses.a & libcurses.so.1 patch

105407

R

01

CURRENT

SunOS 5.6: /usr/bin/volrmmount patch

105426

 

01

CURRENT

SunOS 5.6: /usr/lib/libtnfprobe.so.1 patch

105464

R

02

CURRENT

OpenWindows 3.6: Multiple xterm fixes

105472

R

08

CURRENT

SunOS 5.6: /usr/lib/autofs/automountd patch

105486

R

07

CURRENT

SunOS 5.6: /kernel/fs/hsfs patch

105490

 

04

07

OBSOLETED by 107733

105492

 

02

CURRENT

Obsoleted by: 105181-25 SunOS 5.6: cgsix driver patch

105497

 

01

CURRENT

OpenWindows 3.6: printtool patch

105516

 

01

06

SunOS 5.6: /usr/lib/fs/ufs/fsck and mountall patch

105518

 

01

CURRENT

OBSOLETED by 105395

105528

 

01

CURRENT

SunOS 5.6: /kernel/drv/be patch

105529

R

13

CURRENT

SunOS 5.6: /kernel/drv/tcp patch

105552

R

03

CURRENT

SunOS 5.6: /usr/sbin/rpc.nisd_resolv patch

105558

R

04

CURRENT

CDE 1.2: dtpad patch

105562

R

03

CURRENT

SunOS 5.6: chkey and keylogin patch

105564

 

02

04

SunOS 5.6: /kernel/misc/rpcsec patch

105566

R

12

CURRENT

CDE 1.2: calendar manager patch

105568

R

24

CURRENT

SunOS 5.6: /usr/lib/libthread.so.1 patch

105572

 

03

11

OBSOLETED by 106625

105580

R

19

CURRENT

SunOS 5.6: /kernel/drv/glm patch

105591

R

14

CURRENT

Shared library patch for C++

105600

R

05

19

Obsoleted by: 105181-25 SunOS 5.6: /kernel/drv/isp patch

105604

 

05

09

OBSOLETED by 105181

105615

R

09

CURRENT

SunOS 5.6: /usr/lib/nfs/mountd patch

105618

 

01

CURRENT

OpenWindows 3.6: Xcms patch

105621

R

02

25

Obsoleted by: 105181-25 SunOS 5.6: c2audit, libbsm and cron patch

105630

 

01

03

CDE 1.2: libDtWidget patch

105633

R

60

CURRENT

OpenWindows 3.6: Xsun patch

105637

 

01

CURRENT

SunOS 5.6: /usr/lib/power/powerd patch

105642

R

08

CURRENT

SunOS 5.6: prtdiag patch

105651

 

06

12

Obsoleted by: 105181-25 SunOS 5.6: ac/environ/fhc/sysctrl driver p

105654

 

03

CURRENT

SunOS 5.6: driver_aliases/driver_classes/name_to_major patch

105665

R

04

CURRENT

SunOS 5.6: /usr/bin/login patch

105667

R

03

CURRENT

SunOS 5.6: /usr/bin/rdist patch

105669

R

11

CURRENT

CDE 1.2: libDtSvc Patch

105686

 

02

CURRENT

OBSOLETED by 105621

105693

R

12

CURRENT

SunOS 5.6: cachefs patch

105703

R

27

CURRENT

CDE 1.2: dtlogin patch

105705

 

02

CURRENT

SunOS 5.6: /usr/kernel/drv/audiocs patch

105718

 

02

04

SunOS 5.6: /usr/bin/su patch

105720

R

20

CURRENT

SunOS 5.6: /kernel/fs/nfs patch

105722

R

07

CURRENT

SunOS 5.6: /usr/lib/fs/ufs/ufsdump and ufsrestore patch

105724

 

01

CURRENT

OBSOLETED by 105722

105736

 

01

CURRENT

OBSOLETED by 105395

105741

R

09

CURRENT

SunOS 5.6: /kernel/drv/ecpp patch

105742

 

03

05

Obsoleted by: 105181-25 SunOS 5.6: /kernel/drv/le patch

105743

 

01

CURRENT

OBSOLETED by 107228

105746

 

01

03

SunOS 5.6: /usr/bin/cpio patch

105755

R

10

CURRENT

SunOS 5.6: libresolv, in.named, named-xfer, nslookup, nstest patch

105757

 

01

CURRENT

SunOS 5.6: /usr/bin/echo patch

105778

 

01

CURRENT

SunOS 5.6: /kernel/fs/specfs patch

105780

R

05

CURRENT

SunOS 5.6: /kernel/fs/fifofs patch

105786

R

14

CURRENT

SunOS 5.6: /kernel/drv/ip driver patch

105792

R

07

CURRENT

SunOS 5.6: /usr/sbin/tar patch

105795

 

03

08

Obsoleted by: 105181-25 SunOS 5.6: /kernel/drv/hme patch

105797

 

02

06

OBSOLETED by 105356

105798

 

03

04

SunOS 5.6: cprboot patch

105800

R

07

CURRENT

SunOS 5.6: /usr/bin/admintool, y2000 patch

105802

R

17

CURRENT

OpenWindows 3.6: ToolTalk patch

105836

 

02

03

Obsoleted by: 105181-25 SunOS 5.6: /kernel/drv/qe patch

105837

R

03

CURRENT

CDE 1.2: dtappgather Patch, including SDE 1.0 installations

105845

 

01

CURRENT

OBSOLETED by 105621

105847

R

13

CURRENT

SunOS 5.6: /kernel/drv/st.conf and /kernel/drv/st patch

105867

 

01

CURRENT

SunOS 5.6: /usr/sbin/tapes patch

105924

 

03

13

BADPATCH SunOS 5.6: kbd, se and zs drivers patch

105953

 

01

CURRENT

SunOS 5.6: /usr/bin/xargs patch

105988

 

01

CURRENT

SunOS 5.6: /usr/sbin/rwall patch

105990

R

05

CURRENT

SunOS 5.6: vi/ex/edit/view/vedit patch

106025

 

01

CURRENT

CDE 1.2: sdtfprop patch for group permissions

106027

R

10

CURRENT

CDE 1.2 / SDE 1.0: dtsession patch

106029

 

04

05

SunOS 5.6: /usr/ccs/bin/sccs and /usr/ccs/bin/make patch

106031

 

02

CURRENT

OBSOLETED by 105181

106033

 

01

CURRENT

OBSOLETED by 105621

106035

 

01

CURRENT

SunOS 5.6: /usr/bin/getopt patch

106040

R

18

CURRENT

SunOS 5.6: X Input & Output Method patch

106044

 

01

03

Obsoleted by: 105210-38 SunOS 5.6: /usr/lib/nss_nisplus.so.1 patch

106049

R

04

CURRENT

SunOS 5.6: /usr/sbin/in.telnetd patch

106064

 

01

CURRENT

OBSOLETED by 105621

106075

 

01

CURRENT

OBSOLETED by 105621

106084

 

01

04

OBSOLETED by 107013

106112

R

06

CURRENT

CDE 1.2: dtfile patch

106123

R

05

CURRENT

SunOS 5.6: sgml patch

106125

R

13

CURRENT

SunOS 5.6: Patch for patchadd and patchrm

106138

 

01

CURRENT

OpenWindows 3.6: mp fails to set correct A4 paper size information

106141

 

01

CURRENT

SunOS 5.6: /usr/bin/mkdir patch

106168

 

02

CURRENT

Obsoleted by: 105181-25 SunOS 5.6: dma driver patch

106169

 

02

CURRENT

Obsoleted by: 105181-25 SunOS 5.6: sbusmem driver patch

106170

 

02

03

Obsoleted by: 105181-25 SunOS 5.6: /kernel/drv/esp patch

106171

 

01

CURRENT

Obsoleted by: 105181-25 SunOS 5.6: /kernel/drv/lebuffer patch

106172

R

02

05

Obsoleted by: 105181-25 SunOS 5.6: /kernel/drv/fas patch

106173

 

02

03

Obsoleted by: 105181-25 SunOS 5.6: /kernel/misc/scsi patch

106183

 

03

05

SunOS 5.6: cfgadm utility & libraries

106193

R

06

CURRENT

SunOS 5.6: Patch for Taiwan timezone

106216

 

01

03

SunOS 5.6: /platform/sun4u/kernel/drv/envctrl patch

106219

 

01

03

SunOS 5.6: luxadm.1m Manual Page Patch

106222

R

01

CURRENT

OpenWindows 3.6: filemgr (ff.core) fixes

106226

R

02

CURRENT

SunOS 5.6: /usr/sbin/format patch

106235

R

10

CURRENT

SunOS 5.6: lp patch

106242

R

03

CURRENT

CDE 1.2: libDtHelp.so.1 fixes

106257

R

06

CURRENT

SunOS 5.6: /usr/bin/passwd and /usr/lib/libpam.so.1 patch

106260

 

01

CURRENT

SunOS 5.6: Manual Pages Patch for ffbconfig.1m

106261

 

01

CURRENT

SunOS 5.6: Manual Pages Patch cfgadm.1m config_admin.3x libcfgadm.

106262

 

01

CURRENT

SunOS 5.6: Manual Pages Patch for qfe.7d

106271

R

06

09

Obsoleted by: 106257-06 SunOS 5.6: /usr/lib/security/pam_unix.so.1

106285

R

03

CURRENT

SunOS 5.6: /kernel/sys/msgsys patch

106292

R

12

CURRENT

SunOS 5.6: pkgadd/pkginstall & related utilities

106301

R

04

CURRENT

SunOS 5.6: /usr/sbin/in.ftpd patch

106317

 

01

CURRENT

SunOS 5.6:

106323

 

01

CURRENT

SunOS 5.6: /etc/inet/services patch

106361

R

14

CURRENT

SunOS 5.6: csh/jsh/ksh/rksh/rsh/sh patch

106407

 

06

08

SunOS 5.6: Jumbo patch for ide and atapi fixes

106415

R

04

CURRENT

OpenWindows 3.6: xdm patch

106429

R

02

CURRENT

SunOS 5.6: /kernel/drv/mm patch

106437

R

03

CURRENT

CDE 1.2: Print Manager Patch

106439

R

09

CURRENT

SunOS 5.6: /usr/sbin/syslogd patch

106448

R

01

CURRENT

SunOS 5.6: /usr/sbin/ping patch

106471

 

02

CURRENT

SunOS 5.6: /kernel/fs/autofs patch

106495

R

01

CURRENT

SunOS 5.6: truss & truss support library patch

106522

R

04

CURRENT

SunOS 5.6: /usr/bin/ftp patch

106569

R

01

CURRENT

SunOS 5.6: libauth.a & libauth.so.1 patch

106592

R

05

CURRENT

SunOS 5.6: /usr/lib/nfs/statd patch

106625

R

13

CURRENT

SunOS 5.6: libsec.a, libsec.so.1 and /kernel/fs/ufs patch

106639

R

06

CURRENT

SunOS 5.6: /kernel/strmod/rpcmod patch

106648

R

01

CURRENT

OpenWindows 3.6: libce suid/sgid security fix

106649

R

01

CURRENT

OpenWindows 3.6: libdeskset patch

106650

R

04

CURRENT

OpenWindows 3.6: mailtool attachment security patch

106651

 

01

CURRENT

SunOS 5.6: /usr/lib/netsvc/rstat/rpc.rstatd patch

106655

 

04

CURRENT

SunOS 5.6: iostat/mpstat/vmstat patch

106735

 

04

18

OpenGL 1.1.2: OpenGL Patch for Solaris 2.5.1/2.6

106828

R

01

CURRENT

SunOS 5.6: /usr/bin/date patch

106834

R

02

CURRENT

SunOS 5.6: cp/ln/mv patch

106841

 

01

CURRENT

OpenWindows 3.6: Keytables patch

106842

 

09

CURRENT

SunOS 5.6: Feature patch for Euro currency support in Solaris 2.6

106882

R

02

CURRENT

SunOS 5.6: /usr/lib/nfs/nfsd patch

107326

R

02

CURRENT

SunOS 5.6: rlmod and telmod patch

107336

R

01

CURRENT

OpenWindows 3.6: KCMS configure tool has a security vulnerability

107434

R

01

CURRENT

CDE 1.2: Spell checking occasionally kills mail

107490

R

01

CURRENT

SunOS 5.6: savecore doesn't work if swap slice is over 2G

107497

 

01

CURRENT

SunOS 5.6: sun4u platform links patch

107565

R

03

CURRENT

SunOS 5.6: /usr/sbin/in.tftpd patch

107618

R

03

CURRENT

SunOS 5.6: vold patch

107733

R

10

CURRENT

SunOS 5.6: Linker patch

107758

R

03

CURRENT

SunOS 5.6: /usr/bin/pax patch

107774

R

01

CURRENT

SunOS 5.6: inetd denial-of-service attack

108091

 

03

CURRENT

SunOS 5.6: ssJDK1.2.1_03 fails with fatal error in ISO8859-01 Loca

108166

 

01

CURRENT

SunOS 5.6: rmt needs to be made largefiles-aware

108199

R

01

CURRENT

CDE 1.2: dtspcd Patch

108201

R

01

CURRENT

CDE 1.2: dtaction Patch

108307

R

02

CURRENT

SunOS 5.6: keyserv fixes

108346

R

03

CURRENT

SunOS 5.6: patch usr/sbin/rpc.nispasswdd

108468

R

02

CURRENT

SunOS 5.6: ldterm streams module fixes

108492

R

01

CURRENT

SunOS 5.6: Snoop may be exploited to gain root access

108660

R

01

CURRENT

SunOS 5.6: Patch for sadmind

108796

R

02

CURRENT

SunOS 5.6: /kernel/sched/TS patch

108804

R

02

CURRENT

SunOS 5.6: /usr/bin/tip patch

108895

R

01

CURRENT

SunOS 5.6: patch /usr/sbin/rpc.bootparamd

109266

R

04

CURRENT

SunOS 5.6: /usr/bin/mail patch

109339

R

02

CURRENT

SunOS 5.6: nscd's size grows - TTL values not implemented

109719

R

01

CURRENT

SunOS 5.6: arp should lose set-gid bid

110990

R

01

CURRENT

SunOS 5.6: Patch for ttymon

111029

R

01

CURRENT

SunOS 5.6: /kernel/sys/semsys patch

111039

R

02

CURRENT

SunOS 5.6: /usr/bin/bdiff and /usr/bin/sdiff patch

111109

R

02

CURRENT

SunOS 5.6: Patch to /usr/bin/nawk

111236

R

01

CURRENT

SunOS 5.6: Patch for /usr/sbin/in.fingerd

111240

R

01

CURRENT

SunOS 5.6: Patch to /usr/bin/finger

111560

R

01

CURRENT

SunOS 5.6: dmesg security problem

111572

R

01

CURRENT

SunOS 5.6: ar_open failure can lead to stale queue & memory corrup

111664

R

01

CURRENT

SunOS 5.6: bzip patch

111859

R

01

CURRENT

SunOS 5.6: Buffer overflow in whodo via $TZ

112073

R

03

CURRENT

SunOS 5.6: /usr/bin/mailx patch

112542

R

01

CURRENT

SunOS 5.6: fgrep fails with "wordlist too large"

112814

R

01

CURRENT

SunOS 5.6: in.talkd has a "user format" security problem


Table 2 Solaris 8 Patches 

Patch ID

Recommended/Mandatory

Installed Revision

Latest Revision

Synopsis

108434

R

07

CURRENT

32-Bit Shared library patch for C++

108435

R

07

CURRENT

64-Bit Shared library patch for C++

108528

M

14

CURRENT

SunOS 5.8: kernel update patch

108569

 

04

06

X11 6.4.1: platform support for new hardware

108606

 

08

22

SunOS 5.8:M64 Graphics Patch

108652

R

51

CURRENT

X11 6.4.1: Xsun patch

108714

 

05

CURRENT

CDE 1.4: libDtWidget patch

108723

 

01

CURRENT

SunOS 5.8: /kernel/fs/lofs and /kernel/fs/sparcv9/lofs patch

108725

R

09

CURRENT

SunOS 5.8: st driver patch

108727

R

15

CURRENT

SunOS 5.8: /kernel/fs/nfs and /kernel/fs/sparcv9/nfs patch

108773

 

08

14

SunOS 5.8: IIIM and X Input & Output Method patch

108806

 

04

08

SunOS 5.8: Sun Quad FastEthernet qfe driver

108808

 

23

42

SunOS 5.8: Manual Page updates for Solaris 8

108813

 

05

09

SunOS 5.8: Sun Gigabit Ethernet 3.0

108820

 

01

CURRENT

SunOS 5.8: nss_compat.so.1 patch

108823

 

01

CURRENT

SunOS 5.8: compress/uncompress/zcat patch

108825

 

01

CURRENT

SunOS 5.8: /usr/lib/fs/cachefs/cfsadmin patch

108827

R

20

CURRENT

SunOS 5.8: /usr/lib/libthread.so.1 patch

108835

 

02

03

CDE 1.4: dtcm patch

108875

R

12

CURRENT

SunOS 5.8: c2audit patch

108897

 

01

CURRENT

X11 6.4.1 Xprint patch

108899

 

01

CURRENT

SunOS 5.8: /usr/bin/ftp patch

108901

R

04

CURRENT

SunOS 5.8: /kernel/sys/rpcmod and /kernel/strmod/rpcmod patch

108909

 

09

12

CDE 1.4: Smart Card Administration GUI patch

108919

R

14

CURRENT

CDE 1.4: dtlogin patch

108921

 

11

14

CDE 1.4: dtwm patch

108923

 

01

CURRENT

CDE 1.4: dtwm audio control patch

108940

 

16

41

Motif 1.2.7 and 2.1.1: Runtime library patch for Solaris 8

108947

 

01

CURRENT

Obsoleted by: 108528-13 SunOS 5.8: /platform/sun4u/cprboot patch

108949

R

07

CURRENT

CDE 1.4: libDtHelp/libDtSvc patch

108962

 

01

CURRENT

SunOS 5.8: XmlReader fails on an HTTP stream

108964

 

04

06

SunOS 5.8: /usr/sbin/in.tftpd and /usr/sbin/snoop patch

108968

R

05

CURRENT

SunOS 5.8: vol/vold/rmmount patch

108970

 

01

CURRENT

SunOS 5.8: /usr/lib/fs/pcfs/fsck and /usr/lib/fs/pcfs/mkfs patch

108972

 

04

CURRENT

SunOS 5.8: /sbin/fdisk patch

108974

R

19

CURRENT

SunOS 5.8: dada, uata, dad, sd and scsi drivers patch

108975

R

06

CURRENT

SunOS 5.8: /usr/bin/rmformat and /usr/sbin/format patch

108977

R

01

CURRENT

SunOS 5.8: libsmedia patch

108981

R

08

CURRENT

SunOS 5.8: /kernel/drv/hme and /kernel/drv/sparcv9/hme patch

108982

 

08

09

SunOS 5.8: fctl/fp/fcp/usoc driver patch

108983

 

08

CURRENT

SunOS 5.8: /kernel/drv/fcip driver patch

108984

 

07

08

SunOS 5.8: /kernel/drv/qlc driver patch

108985

R

03

CURRENT

SunOS 5.8: /usr/sbin/in.rshd patch

108987

R

09

CURRENT

SunOS 5.8: Patch for patchadd and patchrm

108989

R

02

CURRENT

SunOS 5.8: /usr/kernel/sys/acctctl and /usr/kernel/sys/exacctsys p

108991

R

10

18

Obsoleted by: 108827-15 SunOS 5.8: /usr/lib/libc.so.1 patch

108993

R

07

CURRENT

SunOS 5.8: nss and ldap patch

108995

 

01

03

SunOS 5.8: /usr/lib/libproc.so.1 patch

108997

R

03

CURRENT

SunOS 5.8: libexacct and libproject patch

108999

 

01

CURRENT

SunOS 5.8: PAM patch

109003

 

01

CURRENT

SunOS 5.8: /etc/init.d/acctadm and /usr/sbin/acctadm patch

109005

 

01

03

SunOS 5.8: /sbin/su.static and /usr/bin/su patch

109007

R

07

CURRENT

SunOS 5.8: at/atrm/batch/cron patch

109009

 

01

02

SunOS 5.8: /etc/magic and /usr/bin/file patch

109011

 

01

CURRENT

SunOS 5.8: /usr/bin/id and /usr/xpg4/bin/id patch

109013

 

02

CURRENT

SunOS 5.8: /usr/bin/lastcomm patch

109015

 

01

CURRENT

SunOS 5.8: /usr/bin/newtask patch

109017

 

01

CURRENT

SunOS 5.8: /usr/bin/pgrep and /usr/bin/pkill patch

109019

 

01

02

SunOS 5.8: /usr/bin/priocntl patch

109021

 

01

CURRENT

SunOS 5.8: /usr/bin/projects patch

109023

 

01

CURRENT

SunOS 5.8: /usr/bin/sparcv7/ps and /usr/bin/sparcv9/ps patch

109025

 

02

04

SunOS 5.8: /usr/bin/sparcv7/truss and /usr/bin/sparcv9/truss patch

109027

 

01

CURRENT

SunOS 5.8: /usr/bin/wracct patch

109029

 

01

02

SunOS 5.8: perl patch

109031

 

01

CURRENT

SunOS 5.8: projadd/projdel/projmod patch

109033

 

01

CURRENT

SunOS 5.8: /usr/bin/sparcv7/prstat and /usr/bin/sparcv9/prstat pat

109035

 

01

02

SunOS 5.8: useradd/userdel/usermod patch

109037

 

01

CURRENT

SunOS 5.8: /var/yp/Makefile and /var/yp/nicknames patch

109041

R

03

04

Obsoleted by: 108528-09 SunOS 5.8: sockfs patch

109043

 

02

CURRENT

SunOS 5.8: sonode adb macro patch

109045

 

02

03

SunOS 5.8: /usr/sbin/sparcv7/crash and /usr/sbin/sparcv9/crash pat

109091

R

05

CURRENT

SunOS 5.8: /usr/lib/fs/ufs/ufsrestore patch

109128

 

01

CURRENT

SunOS 5.8: Provide conversion between codepages 1256 and ISO8859-6

109134

 

16

26

SunOS 5.8: WBEM patch

109137

R

01

CURRENT

Obsoleted by: 110934-03 SunOS 5.8: /usr/sadm/install/bin/pkginstal

109142

 

06

CURRENT

CDE 1.4: dtterm libDtTerm patch

109145

 

01

CURRENT

SunOS 5.8: /usr/sbin/in.routed patch

109147

R

16

CURRENT

SunOS 5.8: Linker patch

109149

 

01

02

SunOS 5.8:: /usr/sbin/mkdevmaps and /usr/sbin/mkdevalloc patch

109152

 

01

CURRENT

SunOS 5.8: /usr/4lib/libc.so.1.9 and /usr/4lib/libc.so.2.9 patch

109159

 

01

CURRENT

SunOS 5.8: the mapping of zh_CN.euc%UTF-8 is consistent

109165

 

09

12

CDE 1.4: dtfile patch

109167

 

01

CURRENT

CDE 1.4: Desktop Help Updates Patch

109169

 

11

12

CDE 1.4: Window Manager Enhancements Patch

109181

R

03

04

Obsoleted by: 108528-13 SunOS 5.8: /kernel/fs/cachefs patch

109202

 

01

03

SunOS 5.8: /kernel/misc/gld and /kernel/misc/sparcv9/gld patch

109223

 

01

CURRENT

SunOS 5.8: libgss.so.1 and libkadm5clnt.so.1 patch

109234

 

02

08

SunOS 5.8: Apache and NCA patch

109238

R

02

CURRENT

SunOS 5.8: /usr/bin/sparcv7/ipcs and /usr/bin/sparcv9/ipcs patch

109244

 

02

   

109277

R

02

CURRENT

SunOS 5.8: /usr/bin/iostat patch

109279

R

10

18

Obsoleted by: 108528-13 SunOS 5.8: /kernel/drv/ip patch

109318

R

26

CURRENT

SunOS 5.8: suninstall patch

109320

R

05

CURRENT

SunOS 5.8: LP patch

109322

R

05

09

Obsoleted by: 108827-15 SunOS 5.8: libnsl patch

109324

R

04

CURRENT

SunOS 5.8: sh/jsh/rsh/pfsh patch

109326

R

07

CURRENT

SunOS 5.8: libresolv.so.2 and in.named patch

109328

 

01

02

SunOS 5.8: /usr/lib/netsvc/yp/ypserv and usr/lib/netsvc/yp/ypxfr p

109354

 

06

14

CDE 1.4: dtsession patch

109384

 

01

03

SunOS 5.8: libaio patch

109454

 

01

CURRENT

SunOS 5.8: /kernel/fs/fifofs and /kernel/fs/sparcv9/fifofs patch

109458

 

01

02

SunOS 5.8: /kernel/strmod/ldterm patch

109460

 

03

06

SunOS 5.8: socal and sf drivers patch

109461

 

03

CURRENT

Obsoleted by: 111177-02 SunOS 5.8: /usr/lib/lwp/libthread.so.1 pat

109470

R

02

CURRENT

CDE 1.4: Actions Patch

109472

 

05

07

Obsoleted by: 108528-13 SunOS 5.8: /kernel/drv/tcp patch

109524

 

04

11

SunOS 5.8: /kernel/drv/ssd patch

109529

 

03

06

SunOS 5.8: luxadm, liba5k and libg_fc patch

109568

 

03

CURRENT

OpenWindows 3.6.2: sys-suspend need to support low power mode

109576

 

01

CURRENT

SunOS 5.8: mountall and fsckall patch

109582

 

01

02

CDE 1.4: sdtaudio patch

109587

R

03

CURRENT

Obsoleted by: 109318-18 SunOS 5.8: libspmistore patch

109607

 

01

CURRENT

SunOS 5.8: /usr/include/iso/stdlib_iso.h patch

109613

 

02

03

CDE 1.4: dtmail patch

109618

 

01

CURRENT

SunOS 5.8: en_US.UTF-8 locale patch

109642

 

01

CURRENT

SunOS 5.8: /usr/include/sys/dkio.h patch

109657

R

07

CURRENT

SunOS 5.8: isp driver patch

109667

R

04

CURRENT

SunOS 5.8: /usr/lib/inet/xntpd and /usr/sbin/ntpdate patch

109679

 

01

CURRENT

SunOS 5.8: /usr/share/lib/smartcard/ibutton.jar patch

109680

 

01

CURRENT

Obsoleted by: 108991-12 SunOS 5.8: nss_nisplus.so.1 and libnss_nis

109695

 

02

03

SunOS 5.8: /etc/smartcard/opencard.properties patch

109704

 

02

CURRENT

SunOS 5.8: Japanese iconv patch

109727

 

01

CURRENT

SunOS 5.8: /usr/sadm/admin/printmgr/classes/pmclient.jar patch

109729

 

01

CURRENT

SunOS 5.8: /usr/bin/cat patch

109740

 

04

CURRENT

Obsoleted by: 108528-13 SunOS 5.8: /kernel/drv/udp patch

109742

R

03

04

Obsoleted by: 108528-13 SunOS 5.8: /kernel/drv/icmp patch

109748

 

01

03

CDE 1.4: sdtaudiocontrol patch

109764

 

02

04

SunOS 5.8: /kernel/fs/hsfs and /kernel/fs/sparcv9/hsfs patch

109766

 

02

CURRENT

SunOS 5.8: SUNWjxmft and SUNWjxcft patch for 8/10 dot font.

109783

R

01

CURRENT

SunOS 5.8: /usr/lib/nfs/nfsd patch

109785

 

01

CURRENT

SunOS 5.8: /etc/inittab patch

109793

 

07

09

SunOS 5.8: su driver patch

109803

 

01

CURRENT

SunOS 5.8: /usr/bin/du and /usr/xpg4/bin/du patch

109805

R

07

CURRENT

SunOS 5.8: /usr/lib/security/pam_krb5.so.1 patch

109807

 

01

CURRENT

SunOS 5.8: /usr/sbin/dumpadm patch

109809

 

01

CURRENT

SunOS 5.8: timezone data patch for Australasia

109813

 

01

CURRENT

SunOS 5.8: /usr/include/memory.h patch

109815

 

04

12

SunOS 5.8: se, acebus, pcf8574, pcf8591 and scsb patch

109862

 

01

CURRENT

X11 6.4.1 Font Server patch

109872

 

01

CURRENT

SunOS 5.8: vis driver patch

109873

 

06

11

SunOS 5.8: prtdiag and platform libprtdiag_psr.so.1 patch

109874

 

06

CURRENT

Obsoleted by: 109896-07 SunOS 5.8: audio patch

109876

 

02

CURRENT

SunOS 5.8: fd driver patch

109877

 

01

CURRENT

SunOS 5.8: /usr/include/sys/dma_i8237A.h patch

109879

 

02

CURRENT

SunOS 5.8: isadma driver patch

109881

 

02

CURRENT

SunOS 5.8: 1394 adb macros patch

109882

R

05

CURRENT

SunOS 5.8: eri header files patch

109883

 

02

CURRENT

SunOS 5.8: /usr/include/sys/ecppsys.h patch

109885

R

08

CURRENT

SunOS 5.8: glm patch

109887

 

02

13

SunOS 5.8: smartcard and usr/sbin/ocfserv patch

109888

R

15

CURRENT

SunOS 5.8: platform drivers patch

109889

 

01

CURRENT

SunOS 5.8: usr platform links and libc_psr patch

109890

 

01

CURRENT

SunOS 5.8: pmserver.jar patch

109892

 

03

CURRENT

SunOS 5.8: /kernel/drv/ecpp driver patch

109893

 

02

03

SunOS 5.8: stc driver patch

109894

 

01

CURRENT

SunOS 5.8: /kernel/drv/sparcv9/bpp driver patch

109896

 

04

08

SunOS 5.8: USB and Audio Framework patch

109898

R

05

CURRENT

SunOS 5.8: /kernel/drv/arp patch

109900

 

01

02

SunOS 5.8: /etc/init.d/network and /sbin/ifparse patch

109902

 

03

CURRENT

SunOS 5.8: /usr/lib/inet/in.ndpd patch

109904

R

04

05

Obsoleted by: 108528-13 SunOS 5.8: /etc/default/mpathd and /sbin/i

109906

R

05

06

Obsoleted by: 108528-13 SunOS 5.8: dhcpagent, dhcpinfo, ifconfig a

109920

 

05

06

SunOS 5.8: pcic driver patch

109922

 

02

CURRENT

SunOS 5.8: pcelx, pcser and cs driver patch

109924

 

02

03

SunOS 5.8: pcata driver patch

109926

 

02

CURRENT

SunOS 5.8: /kernel/drv/pem and /kernel/drv/sparcv9/pem patch

109928

 

04

CURRENT

SunOS 5.8: pcmem and pcmcia patch

109931

 

01

04

CDE 1.4: sdtimage Patch

109933

 

01

CURRENT

SunOS 5.8: mv, cp, ln patch

109936

 

01

CURRENT

SunOS 5.8: /usr/bin/diff patch

109954

 

01

CURRENT

Obsoleted by: 108528-13 SunOS 5.8: /kernel/sys/pset and /kernel/sy

109960

 

01

CURRENT

CDE 1.4: sdtperfmeter patch

109965

 

02

03

Obsoleted by: 109887-02 SunOS 5.8: pam_smartcard.so.1 patch

109990

 

01

CURRENT

SunOS 5.8: /usr/ccs/bin/dis patch

109994

 

01

CURRENT

SunOS 5.8: /usr/bin/sparcv7/adb and /usr/bin/sparcv9/adb patch

110068

 

01

02

CDE 1.4: PDASync patch

110075

R

01

CURRENT

SunOS 5.8: /kernel/drv/devinfo and /kernel/drv/sparcv9/devinfo pat

110088

 

02

CURRENT

CDE 1.4: DtPower patch

110127

 

02

04

SunOS 5.8: Generic Framebuffer configuration Graphics Patch

110165

 

01

03

SunOS 5.8: /usr/bin/sed patch

110269

 

01

CURRENT

SunOS 5.8: /usr/lib/libnisdb.so.2 patch

110283

R

05

CURRENT

SunOS 5.8: mkfs and newfs patch

110285

 

01

CURRENT

SunOS 5.8: consconfig_dacf patch

110286

R

07

CURRENT

OpenWindows 3.6.2: Tooltalk patch

110322

R

01

CURRENT

SunOS 5.8: /usr/lib/netsvc/yp/ypbind patch

110326

 

02

CURRENT

CDE 1.4: dtstyle patch

110335

 

02

CURRENT

CDE 1.4: dtprintinfo patch

110368

 

01

02

SunOS 5.8: pcf8574 driver patch for SUNW Sun-Fire-280R

110369

 

04

05

SunOS 5.8: sgcn patch

110370

 

02

03

SunOS 5.8: SUNW,Sun-Fire usr platform links patch

110371

 

02

03

SunOS 5.8: serengeti support, Update3, sgfru patch

110373

 

02

04

SunOS 5.8: /platform/SUNW,Sun-Fire/kernel/drv/sparcv9/sgsbbc patch

110374

 

06

08

SunOS 5.8: /platform/SUNW,Sun-Fire/kernel/drv/sparcv9/sgenv patch

110375

 

02

04

SunOS 5.8: /platform/SUNW,Sun-Fire/kernel/drv/sparcv9/ssm patch

110376

 

01

CURRENT

SunOS 5.8: littleneck support, usr_platform patch, S8 Update 3

110379

 

01

CURRENT

SunOS 5.8: littleneck support, gpio patch

110380

R

04

CURRENT

SunOS 5.8: ufssnapshots support, libadm patch

110381

 

01

CURRENT

SunOS 5.8: ufssnapshots support, clri patch

110382

 

01

CURRENT

SunOS 5.8: file systems should support snapshots for online bkups

110383

R

01

02

Obsoleted by: 108528-13 SunOS 5.8: libnvpair patch

110384

 

05

CURRENT

Obsoleted by: 108528-11 SunOS 5.8: RCM libraries & header patch

110385

 

03

CURRENT

SunOS 5.8: RCM modules patch

110386

 

01

02

SunOS 5.8: RBAC Feature Patch

110387

R

03

CURRENT

SunOS 5.8: ufssnapshots support, ufsdump patch

110388

 

01

CURRENT

SunOS 5.8: RBAC Feature for Solaris Update 3

110390

R

01

02

Obsoleted by: 108993-05 SunOS 5.8: ldapclient patch

110407

 

02

CURRENT

CDE 1.4 Sdttypes patch

110423

 

01

   

110453

R

03

CURRENT

SunOS 5.8: admintool patch

110457

 

01

05

SunOS 5.8: scmi2c driver patch

110458

R

02

CURRENT

SunOS 5.8: libcurses patch

110460

R

18

CURRENT

SunOS 5.8: fruid/PICL plug-ins patch

110461

 

01

CURRENT

SunOS 5.8: ttcompat patch

110499

 

03

CURRENT

Obsoleted by: 108652-29 X11 6.4.1: Xsun patch

110511

 

01

04

SunOS 5.8: rpc.nisd patch

110597

 

02

   

110600

 

02

   

110603

 

01

CURRENT

CDE 1.4: sdtname patch

110609

 

01

02

SunOS 5.8: cdio.h and command.h USB header patch

110615

R

04

CURRENT

SunOS 5.8: sendmail patch

110662

R

07

CURRENT

SunOS 5.8: ksh patch

110668

R

03

CURRENT

SunOS 5.8: /usr/sbin/in.telnetd patch

110700

R

01

CURRENT

SunOS 5.8: automount patch

110712

 

03

   

110716

 

02

CURRENT

SunOS 5.8: Solaris Product Registry 3.0 patch

110723

R

04

CURRENT

SunOS 5.8: /kernel/drv/sparcv9/eri patch

110724

 

01

CURRENT

SunOS 5.8: liblayout patch

110791

 

01

   

110811

 

01

CURRENT

SunOS 5.8: libnls patch

110813

 

01

CURRENT

SunOS 5.8: libxfn patch

110815

 

01

CURRENT

SunOS 5.8:

110817

 

01

CURRENT

SunOS 5.8: apptrace and interceptors patch

110820

 

02

08

SunOS 5.8: /platform/SUNW,Sun-Fire-15000/kernel/drv/sparcv9/dman p

110821

 

01

02

SunOS 5.8: iosram driver patch

110822

 

01

CURRENT

SunOS 5.8: mboxsc driver patch

110826

 

02

05

SunOS 5.8: SUNW,Sun-Fire-15000/kernel/drv/sparcv9/schpc patch

110827

 

01

02

SunOS 5.8: scosmb driver patch

110828

 

01

02

SunOS 5.8: sbbc driver patch

110829

 

01

CURRENT

SunOS 5.8: todstarcat driver patch

110833

 

01

CURRENT

SunOS 5.8: usr platform links

110834

 

02

03

Obsoleted by: 109873-11 SunOS 5.8: SUNW,Sun-Fire-15000 libprtdiag_

110838

R

05

CURRENT

SunOS 5.8: /platform/SUNW,Sun-Fire-15000/kernel/drv/sparcv9/axq pa

110839

 

01

03

SunOS 5.8: /usr/lib/rcm/modules/SUNW_ip_rcm.so patch

110840

 

01

02

SunOS 5.8: bbc patch

110841

 

01

CURRENT

SunOS 5.8: gptwo patch

110842

 

01

05

SunOS 5.8: hpc3130 driver patch for SUNW,Sun-Fire-880

110843

 

01

03

Obsoleted by: 110849-06 SunOS 5.8: libprtdiag_psr.so.1 patch for S

110844

 

01

02

SunOS 5.8: /platform/sun4u/kernel/drv/sparcv9/lm75 patch

110845

 

01

03

SunOS 5.8: /platform/sun4u/kernel/drv/sparcv9/ltc1427 patch

110846

 

01

02

SunOS 5.8: /platform/sun4u/kernel/drv/sparcv9/pcf8574 patch

110847

 

01

02

SunOS 5.8: /platform/sun4u/kernel/drv/sparcv9/pcf8591 patch

110850

 

01

CURRENT

Obsoleted by: 108528-11 SunOS 5.8: sbdp patch

110851

 

01

02

SunOS 5.8: /platform/sun4u/kernel/drv/sparcv9/ssc050 patch

110852

 

01

03

SunOS 5.8: /platform/sun4u/kernel/drv/sparcv9/ssc100 patch

110853

 

01

CURRENT

SunOS 5.8: SUNW,Sun-Fire-880 usr platform links patch

110854

 

01

02

SunOS 5.8: /platform/sun4u/kernel/drv/sparcv9/smbus_ara patch

110856

 

01

CURRENT

SunOS 5.8: /etc/inet/services patch

110896

 

01

CURRENT

SunOS 5.8: /usr/lib/fs/cachefs/mount patch

110898

R

04

CURRENT

SunOS 5.8: csh/pfcsh patch

110901

R

01

CURRENT

SunOS 5.8: /kernel/drv/sgen and /kernel/drv/sparcv9/sgen patch

110903

R

04

CURRENT

SunOS 5.8: edit, ex, vedit, vi and view patch

110905

 

01

02

SunOS 5.8: /usr/bin/find patch

110907

 

01

CURRENT

SunOS 5.8: /usr/include/arpa/inet.h patch

110910

 

01

CURRENT

SunOS 5.8: /usr/lib/fs/ufs/fsck patch

110912

 

01

03

SunOS 5.8: cfgadm patch

110914

 

01

CURRENT

SunOS 5.8: /usr/bin/tr patch

110916

R

03

CURRENT

SunOS 5.8: sort patch

110918

 

01

03

SunOS 5.8: /kernel/drv/openeepr patch

110927

 

01

CURRENT

SunOS 5.8: Need to backport fixes in SUNW_PKGLIST in s8u4

110934

R

07

CURRENT

SunOS 5.8: pkgtrans, pkgadd, pkgchk and libpkg.a patch

110943

R

01

CURRENT

SunOS 5.8: /usr/bin/tcsh patch

110945

R

05

CURRENT

SunOS 5.8: /usr/sbin/syslogd patch

110951

R

02

CURRENT

SunOS 5.8: /usr/sbin/tar and /usr/sbin/static/tar patch

110957

R

02

CURRENT

SunOS 5.8: /usr/bin/mailx patch

111069

R

01

CURRENT

SunOS 5.8: bsmunconv overwrites root cron tab if cu created /tmp/r

111073

 

01

CURRENT

SunOS 5.8: re_comp header patch

111085

R

02

CURRENT

SunOS 5.8: /usr/bin/login patch

111088

 

01

02

SunOS 5.8: mdb patch

111098

R

01

CURRENT

SunOS 5.8: ROC timezone should be avoided for political reasons

111111

R

03

CURRENT

SunOS 5.8: /usr/bin/nawk patch

111232

R

01

CURRENT

SunOS 5.8: patch in.fingerd

111234

R

01

CURRENT

SunOS 5.8: patch finger

111293

R

04

CURRENT

SunOS 5.8: /usr/lib/libdevinfo.so.1 patch

111310

R

01

CURRENT

SunOS 5.8: /usr/lib/libdhcpagent.so.1 patch

111325

R

01

CURRENT

SunOS 5.8: /usr/lib/saf/ttymon patch

111327

R

05

CURRENT

SunOS 5.8: libsocket patch

111504

R

01

CURRENT

SunOS 5.8: /usr/bin/tip patch

111548

R

01

CURRENT

SunOS 5.8: catman, man, whatis, apropos and makewhatis patch

111606

R

02

CURRENT

SunOS 5.8: /usr/sbin/in.ftpd patch

111626

R

01

CURRENT

OpenWindows 3.6.2: Xview Patch

111659

R

06

CURRENT

SunOS 5.8: passwd and pam_unix.so.1 patch

111826

R

01

CURRENT

SunOS 5.8: /usr/sbin/sparcv7/whodo & /usr/sbin/sparcv9/whodo patch

111874

R

05

CURRENT

SunOS 5.8: usr/bin/mail patch

111881

R

01

CURRENT

SunOS 5.8: /usr/kernel/strmod/telmod patch

112138

R

01

CURRENT

SunOS 5.8:: usr/bin/domainname patch

112218

R

01

CURRENT

SunOS 5.8:: pam_ldap.so.1 patch

112237

R

03

CURRENT

SunOS 5.8: mech_krb5.so.1 patch

112254

R

01

CURRENT

SunOS 5.8: /kernel/sched/TS patch

112325

R

01

CURRENT

SunOS 5.8: /kernel/fs/udfs and /kernel/fs/sparcv9/udfs patch

112396

R

02

CURRENT

SunOS 5.8: /usr/bin/fgrep patch

112425

R

01

CURRENT

SunOS 5.8: /usr/lib/fs/ufs/mount and /etc/fs/ufs/mount patch

112459

R

01

CURRENT

SunOS 5.8: /usr/lib/pt_chmod patch


Important Notes

Cisco EMF EMS Interoperability

Please consult your EMS documentation for certified EMS interoperability information, if you wish to run two or more EMSs on the one Cisco EMF installation.

Caveats


Note Cisco EMF v3.2 SP4 incorporates all resolved bugs and fixes incorporated in Cisco EMF v3.2, specifically up to and including Cisco EMF v3.2 patch 3.


Cisco EMF v3.2 SP4 is constantly improving, and caveats will be resolved and workarounds provided after the release date. For the most up-to-date information refer to the Release Note and Customer Note enclosures provided in DDTS on Cisco Connection Online.

This section includes the following information:

Open Caveats

PreFilter Caveats

RME Caveats

Resolved Between Cisco EMF v3.2 and This Release

Open Caveats

CSCuk39007

Java plug-in Security dlg not displayed properly in reflection-X

Symptom—The problem is that when an RME service is launched for the first time the user is presented by the Java plug-in Security warning. However, when this dialog is launched within a Reflection-X full desktop environment, the buttons disappear from the dialog and nothing can be selected.

Conditions—The java security warning is displayed but the buttons disappear and are not selectable.

WorkaroundA possible work-a-round to the problem is to change the configuration of Reflection-X so that it uses XDMP to access the CEMF server. If this method is used then the problem doesn't appear and the RME screens can be successfully opened.

CSCuk39008

LDAP association skipped after 2nd chassis association failure

Symptom—CNS Services fail to launch from a device after it is associated for a 2nd time with a CNS Config Engine that has incorrect LDAP parameters.

Conditions—Occurs when the LDAP Grouping Context Root parameter is configured incorrectly on the CNS Config Engine

WorkaroundAfter the 2nd association do the following:

a. Disassociate the device. Result is: Disassociation in cemf successful. LDAP deletion fails (as expected because device is not in the ldap). Rollback? Y/n

b. Answer N. The device is now no longer associated in CEMF and is not in the LDAP directory.

c. Update the CCE server and set the LDAP Grouping Context Root to be correct

d. Associate device to CCE server. Result is: Association in CCE successful.

LDAP creation successful.

The device is now correctly associated with the CCE and CNS services can now be launched.

CSCuk39035

eventTranslator sending alarms that are not received by CEMF

Symptom—When loading events into Cisco EMF via the eventTranslator utility, some of the last events are lost.

Conditions—This may only happen when the eventTranslator is used.

WorkaroundThe missing events can be parsed in in an additional run of the eventTranslator.

CSCdz09731

nbinterface core dump after removing all objs under physical

Symptom—The Cisco EMF nbinterface process may exit unexpectedly if you remove/delete all objects (including the origin) of a registered filter from Cisco EMF.

Conditions—Deleting all objects, including the origin of a registered filter from Cisco EMF.

WorkaroundTo delete, reparent, or rename managed objects:

a. Deregister the filter.

<CEMFBASE>/bin/nbadmin deregister filter-name

b. Make the changes in Cisco EMF.

c. Edit the filter file to update the origin if required.

d. Register the filter

<CEMFBASE>/bin/nbadmin register filter-file-name

PreFilter Caveats

CSCuk36296

Non-admin pre-filter users receive no error messages

Symptom—Despite intentional restrictions to the PreFilter application, users of non-administrator accounts do not receive notification of such restrictions through standard error messages.

Conditions—All users, those of administrator and non-administrator status, can access the Pre-filtering application via the Cisco EMF launchpad when the following access specs are assigned to their respective accounts: All_Standard_Features and NormalPreFilterAccessSpec. When a user of non-administrator status launches the PreFilter application, there is no display of the intended restrictions to the feature. Menu options are available to the user, however when actions are initiated there is no system response.

Workaround—Currently there is no workaround identified, however the EMS administrator may restrict access to the PreFilter application for non-administrator user accounts by disabling the access spec: NormalPreFilterAccessSpec.

Users of non-administrator accounts should be aware that the software intentionally restricts their access to the PreFilter application and despite the apparent availability of functions through active menu items, the system will not respond due to account privilege inadequacies. The PreFilter application should be regarded as view-only.

CSCuk36948

The pre-filtering access spec should be included in the All_Standard_Features access spec

Symptom—The PreFilter application is not included in the All_Standard_Features access spec.

Conditions—The PreFilter application is available on the Cisco EMF Launchpad, therefore its associated access spec should be available in the All_Standard_Features access spec.

Workaround—From the Edit Access Specification window, add the feature list for the PreFilter application to the All_Standard_Features access spec.

RME Caveats

CSCuk37081

Symptom—The Job Owner attribute is set to 'Admin', irrespective of the RME user that logged in when the menu options...

Resource Manager (RME) > Software Management > Distribution > Distribute Images

and

Resource Manager (RME) > Software Management > Library > Add Images'

... are chosen from a CEMF deployed managed object.

Conditions—This is a workaround to a specific CMF issue whereby the Job Owner attribute is not correctly populated when the above RME services are invoked from the CEMF-RME integration.

Workaround—Short-term

a. Advise CEMF administrator to use CEMF access specifications that permit only the CEMF 'Admin' to launch the above RME services.

b. Advise CEMF administrator to login to RME as 'Admin' user when performing Software Image Management using above RME services.

Long-term (targeting CEMF v3.2 Patch 5)

CMF shall provide a fix to initial problem of Job Owner attribute not being correctly populated.

Hardcoded population of Job Owner attribute by CEMF shall be removed.

Resolved Between Cisco EMF v3.2 and This Release

CSCdx84836—values in vectorServer.ini should be changed to improve perf.

CSCdx93187—NEI: add new vars to trap about MO

CSCdy06362—System hangs when no Module in Module Inventory

CSCdy08404—not exact error msg in nbinterface.log

CSCdy08600—Improve the error handling of command nbadmin

CSCdy08632—Error message is not informative when origin path is wrong

CSCdy11141—Update the help information for command nbadmin

CSCdy13282—Update nbinterface.ini file

CSCdy15489—Cannot receive traps when alarms are acknowledged/unacknowledged

CSCdy16064—forwarder does not forward all traps

CSCdy16108—forwarder doesnot forward traps on newly movedin objects

CSCdy17166—nbinterface core dumpw when key word is misspelled in filter file

CSCdy17629—Wrong trap oid value given by NEI before forwarding

CSCdy18359—traps generated by commissioning not all forwarded

CSCdy19269—Trap description not match in CEMF and Northbound system

CSCdy31800—nbinterface memory leaks

CSCdy33053—discoveryServer memory use grew during soak test.

CSCdy33084—ObjectGroupServer memory use grew during soak test

CSCdy41504—Map Viewer GUI displays incorrectly under Physical view

CSCdy51910—Need to add flags to the trap contents of ack/unack alarms

CSCdy52166—nbinterface core dumps

CSCdy85225—Add mib var to trap to indicate type of faulty entity

CSCuk31984—Patch numbering in menu is confusing e.g. 170101-19??

CSCuk33712—AlarmMessage requires a space prior to a substitution

CSCuk33865—trapAlarmMapper core - not readily reproducible

CSCuk34266—Admin uLoginName partitioning attribute returns null

CSCuk34419—Map Viewer does not fully update on rmObjectsFromTree

CSCuk35316—AsyncSnmpDataRepos coredump when deleting COM Chassis component

CSCuk35716—Need enhancements to Launch3rdPartyAppService

CSCuk35986—Memory leak in ProfileMonitor

CSCuk36437—File missing from BOM? Query Editor showing &object_type etc.

CSCuk37998—ciscoPlatformMan memory leaks

Troubleshooting

Troubleshooting sections are provided in the Cisco EMF Installation and Administration Guide and the Cisco EMF User Guide.

The Cisco EMF Knowledge Base (formerly Atlantech Technologies Knowledge Base) and the Communications Software Group Knowledge Base are sources of additional technical information on Cisco EMF. Information is collated together as a result of responses to frequently asked questions and other common issues raised during the development of Cisco EMF-based Element Managers. The Knowledge Bases also feature guidelines and tips from INSMBU engineers and Engineering Services. New entries are added to the Knowledge Bases regularly.

The Cisco EMF Knowledge Base is available at http://www.cisco.com/pcgi-bin/Support/browse/psp_view.pl?p=Software:CEMF&s=Implementation_and_Configuration#Samples_and_Tips

Documentation Updates

Errors

This section of the Release Notes includes the following updates to the Cisco EMF documentation set:

Installing the RME Add-on on Solaris

Installing the RME Add-on on Windows

Installing the Cisco CNS/Cisco EMF Integration Patch on the CNS 2100 Series Intelligence Engine

Patch ID

Potential Issues With Transact.log File Using RAWFS

Installing the RME Add-on on Solaris

In Cisco Element Management Framework Installation and Administration Guide v3.2 Service Pack 4 Chapter 4, page 4-10, Installing the RME Add-on on Solaris, Step 4 should read as follows:

Step 4   Enter the path to the RME add-on, at the command line prompt, enter

              cd rme/solaris

              If you list the files at this point, you will see RMECemfm install

Installing the RME Add-on on Windows

In Cisco Element Management Framework Installation and Administration Guide v3.2 Service Pack 4 Chapter 4, page 4-10, Installing the RME Add-on on Windows should read as follows:

To install the add-on package on the PC where CiscoWorks and RME 3.4 are installed, insert the CD and run the rme/windows/setup.exe file.

Installing the Cisco CNS/Cisco EMF Integration Patch on the CNS 2100 Series Intelligence Engine

In Cisco Element Management Framework Installation and Administration Guide v3.2 Service Pack 4 Chapter 4, page 4-11, note that the CNS package is found in cns/linux.

Patch ID

The Patch ID of Cisco EMF v3.2 SP4 is 170004-28.

The Patch ID is shown in the Install Package menu and the Deinstall Package menu.

Potential Issues With Transact.log File Using RAWFS

When deploying a RAWFS file system, the Cisco Element Management Framework Installation and Administration Guide advises the user to place the transact.log on the RAWFS system. This scenario is not tested by the QA team. Therefore it cannot be guaranteed that there will be no problems, for example performance issues, arising from this action.

CSCuk38848 (Sev 3) is raised against the Cisco Element Management Framework Installation and Administration Guide.

Related Documentation

Cisco EMF Version 3.2 SP 4 (Cisco Element Manager November 2002 Upgrade) Quick Start Guide, 78-14987-02

Cisco Element Management Framework Installation and Administration Guide v3.2 Service Pack 4, 78-14805-01

Cisco Element Management Framework User Guide v3.2 Service Pack 4, 78-14806-01

Obtaining Documentation

These sections explain how to obtain documentation from Cisco Systems.

World Wide Web

You can access the most current Cisco documentation on the World Wide Web at this URL:

http://www.cisco.com

Translated documentation is available at this URL:

http://www.cisco.com/public/countries_languages.shtml

Documentation CD-ROM

Cisco documentation and additional literature are available in a Cisco Documentation CD-ROM package, which is shipped with your product. The Documentation CD-ROM is updated monthly and may be more current than printed documentation. The CD-ROM package is available as a single unit or through an annual subscription.

Ordering Documentation

You can order Cisco documentation in these ways:

Registered Cisco.com users (Cisco direct customers) can order Cisco product documentation from the Networking Products MarketPlace:

http://www.cisco.com/en/US/partner/ordering/index.shtml

Registered Cisco.com users can order the Documentation CD-ROM through the online Subscription Store:

http://www.cisco.com/go/subscription

Nonregistered Cisco.com users can order documentation through a local account representative by calling Cisco Systems Corporate Headquarters (California, U.S.A.) at 408 526-7208 or, elsewhere in North America, by calling 800 553-NETS (6387).

Documentation Feedback

You can submit comments electronically on Cisco.com. In the Cisco Documentation home page, click the Fax or Email option in the "Leave Feedback" section at the bottom of the page.

You can e-mail your comments to bug-doc@cisco.com.

You can submit your comments by mail by using the response card behind the front cover of your document or by writing to the following address:

Cisco Systems
Attn: Document Resource Connection
170 West Tasman Drive
San Jose, CA 95134-9883

We appreciate your comments.

Obtaining Technical Assistance

Cisco provides Cisco.com as a starting point for all technical assistance. Customers and partners can obtain online documentation, troubleshooting tips, and sample configurations from online tools by using the Cisco Technical Assistance Center (TAC) Web Site. Cisco.com registered users have complete access to the technical support resources on the Cisco TAC Web Site.

Cisco.com

Cisco.com is the foundation of a suite of interactive, networked services that provides immediate, open access to Cisco information, networking solutions, services, programs, and resources at any time, from anywhere in the world.

Cisco.com is a highly integrated Internet application and a powerful, easy-to-use tool that provides a broad range of features and services to help you with these tasks:

Streamline business processes and improve productivity

Resolve technical issues with online support

Download and test software packages

Order Cisco learning materials and merchandise

Register for online skill assessment, training, and certification programs

If you want to obtain customized information and service, you can self-register on Cisco.com. To access Cisco.com, go to this URL: http://www.cisco.com

Technical Assistance Center

The Cisco Technical Assistance Center (TAC) is available to all customers who need technical assistance with a Cisco product, technology, or solution. Two levels of support are available: the Cisco TAC Web Site and the Cisco TAC Escalation Center.

Cisco TAC inquiries are categorized according to the urgency of the issue:

Priority level 4 (P4)—You need information or assistance concerning Cisco product capabilities, product installation, or basic product configuration.

Priority level 3 (P3)—Your network performance is degraded. Network functionality is noticeably impaired, but most business operations continue.

Priority level 2 (P2)—Your production network is severely degraded, affecting significant aspects of business operations. No workaround is available.

Priority level 1 (P1)—Your production network is down, and a critical impact to business operations will occur if service is not restored quickly. No workaround is available.

The Cisco TAC resource that you choose is based on the priority of the problem and the conditions of service contracts, when applicable.

Cisco TAC Web Site

You can use the Cisco TAC Web Site to resolve P3 and P4 issues yourself, saving both cost and time. The site provides around-the-clock access to online tools, knowledge bases, and software. To access the Cisco TAC Web Site, go to this URL:

http://www.cisco.com/tac

All customers, partners, and resellers who have a valid Cisco service contract have complete access to the technical support resources on the Cisco TAC Web Site. The Cisco TAC Web Site requires a Cisco.com login ID and password. If you have a valid service contract but do not have a login ID or password, go to this URL to register:

http://www.cisco.com/register/

If you are a Cisco.com registered user, and you cannot resolve your technical issues by using the Cisco TAC Web Site, you can open a case online by using the TAC Case Open tool at this URL:

http://www.cisco.com/tac/caseopen

If you have Internet access, we recommend that you open P3 and P4 cases through the Cisco TAC Web Site.

Cisco TAC Escalation Center

The Cisco TAC Escalation Center addresses priority level 1 or priority level 2 issues. These classifications are assigned when severe network degradation significantly impacts business operations. When you contact the TAC Escalation Center with a P1 or P2 problem, a Cisco TAC engineer automatically opens a case.

To obtain a directory of toll-free Cisco TAC telephone numbers for your country, go to this URL:

http://www.cisco.com/warp/public/687/Directory/DirTAC.shtml

Before calling, please check with your network operations center to determine the level of Cisco support services to which your company is entitled: for example, SMARTnet, SMARTnet Onsite, or Network Supported Accounts (NSA). When you call the center, please have available your service agreement number and your product serial number.


hometocprevnextglossaryfeedbacksearchhelp

Posted: Wed Oct 6 17:42:50 PDT 2004
All contents are Copyright © 1992--2004 Cisco Systems, Inc. All rights reserved.
Important Notices and Privacy Statement.