This hotfix resolves an issue in CA AppLogic® 3.5.19 and 3.7.14 where applications containing a swap volume cannot be migrated.
Applicability:
hf9042 is an optional hotfix for CA AppLogic® 3.5.19 and 3.7.14. This hotfix cannot be used with other versions of CA AppLogic®.
The hotfix modifies files on the grid controller. The hotfix takes effect immediately upon successful installation (no reboot is required).
Dependencies: For CA AppLogic® version 3.5.19, hotfix hf8368 must be installed prior to installing this hotfix; there is no such requirement when installing this hotfix on a 3.7.14 grid.
df8975 is a distribution hotfix for CA AppLogic® 3.5.19. df8975 resolves the following issues. Note that all bug fixes affect only Xen-based grids unless otherwise noted.
In addition, df8975 resolves the following grid stability issues:
The resolution to the above SCRs affects grid servers that use any of the following hardware:
This hotfix resolves the following Xen Security Advisories:
XSA-6 HVM e1000, buffer overflow.
XSA-7 64-bit PV guest privilege escalation vulnerability.
XSA-8 Guest denial of service on syscall/sysenter exception generation.
XSA-9 PV guest host Denial of Service.
XSA-11 HVM guest destroy p2m teardown host DoS vulnerability.
XSA-12 Hypercall set_debugreg vulnerability.
XSA-13 Hypercall physdev_get_free_pirq vulnerability.
XSA-14 XENMEM_populate_physmap DoS vulnerability.
XSA-16 PHYSDEVOP_map_pirq index vulnerability.
XSA-17 Qemu VT100 emulation vulnerability.
XSA-19 Guest administrator can access qemu monitor console.
XSA-20 Timer overflow DoS vulnerability.
XSA-21 pirq range check DoS vulnerability.
XSA-22 Memory mapping failure DoS vulnerability.
XSA-23 Unhooking empty PAE entries DoS vulnerability.
XSA-24 Grant table hypercall infinite loop DoS vulnerability.
XSA-25 Xen domain builder Out-of-memory due to malicious kernel/ramdisk.
XSA-26 Grant table version switch list corruption vulnerability.
XSA-27 several HVM operations do not validate the range of their inputs.
XSA-28 HVMOP_get_mem_access crash / HVMOP_set_mem_access information leak.
XSA-29 XENMEM_exchange may overwrite hypervisor memory.
XSA-30 Broken error handling in guest_physmap_mark_populate_on_demand().
XSA-31 Several memory hypercall operations allow invalid extent order values.
Note: df8975 obsoletes distro hotfix df7588. df8975 also includes hf8114, hf8017 and hf7791. If the distro hotfix df8975 is installed there is no need of installing hotfix hf7694.
Note: In contrast to a normal hotfix that is applied to a CA AppLogic® grid after it is created, a distribution hotfix is applied to the CA AppLogic® distribution image used to create grids. Because this is a distribution hotfix, the installation procedure is different than a standard hotfix. Therefore, this hotfix does not need to be re-applied unless the CA AppLogic® 3.5.19 distribution image is re-imported into the BFC.
This hotfix is only for <prodcutname> 3.5.19 distributions.
Installation
After using BFC to download the new hotfix df8975, login as root to the BFC server and do the following:
If you installed the BFC in the default install location (/opt/bfc), run the following command:
/opt/bfc/bin/apply-version-hotfix -v 3.5.19 -f <download directory>/3.5.19/applogic-3.5.19-df8975-part1.2.tar.bz2
If you installed the BFC in an alternate location, run the following command:
<non-standard BFC install location>/apply-version-hotfix -v 3.5.19 -f <download directory>/3.5.19/applogic-3.5.19-df8975-part1.2.tar.bz2
Note: <download directory> is the download directory that was specified during the BFC installation. It is also found in the BFC Administration GUI under the Versions tab.
CA AppLogic Distribution Updates
df8975 makes following updates to the CA AppLogic® distro (BFC imported CA AppLogic® distro directory)
For CA AppLogic® 3.5.19 the new vrm is vrm-1.9.37-4.el5.i386.rpm
This hotfix resolves an issue in CA AppLogic® 3.5.19 where servers with very large data volumes can fail on reboot or upgrade due to a filesystem check running the server out of memory (SCR 7596).
hf7596 is a mandatory hotfix for CA AppLogic® 3.5.19. This hotfix cannot be used with other versions of CA AppLogic®. This hotfix modifies files on the grid servers. The hotfix takes effect immediately upon successful installation (no reboot is required).
This hotfix should be re-applied to a 3.5 grid before upgrading to a newer release, in order to ensure that the fsck problem does not happen during the upgrade process.
Hotfix hf8096 is a mandatory hotfix for CA AppLogic® version 3.5.19. hf8096 resolves following SCR:
hf8096 also resolves following Xen security vulnerabilities:
This hotfix resolves the following Xen Security Advisories:
XSA-6 HVM e1000, buffer overflow.
XSA-7 64-bit PV guest privilege escalation vulnerability.
XSA-8 Guest denial of service on syscall/sysenter exception generation.
XSA-9 PV guest host Denial of Service.
XSA-11 HVM guest destroy p2m teardown host DoS vulnerability.
XSA-12 Hypercall set_debugreg vulnerability.
XSA-13 Hypercall physdev_get_free_pirq vulnerability.
XSA-14 XENMEM_populate_physmap DoS vulnerability.
XSA-16 PHYSDEVOP_map_pirq index vulnerability.
XSA-17 Qemu VT100 emulation vulnerability.
XSA-19 Guest administrator can access qemu monitor console.
XSA-20 Timer overflow DoS vulnerability.
XSA-21 pirq range check DoS vulnerability.
XSA-22 Memory mapping failure DoS vulnerability.
XSA-23 Unhooking empty PAE entries DoS vulnerability.
XSA-24 Grant table hypercall infinite loop DoS vulnerability.
XSA-25 Xen domain builder Out-of-memory due to malicious kernel/ramdisk.
XSA-26 Grant table version switch list corruption vulnerability.
XSA-27 several HVM operations do not validate the range of their inputs.
XSA-28 HVMOP_get_mem_access crash / HVMOP_set_mem_access information leak.
XSA-29 XENMEM_exchange may overwrite hypervisor memory.
XSA-30 Broken error handling in guest_physmap_mark_populate_on_demand().
XSA-31 Several memory hypercall operations allow invalid extent order values.
Note: hf8096 obsoletes hf8017, hf7759 and hf7611. hf8096 is only for Xen-based grids and does not affect ESX-based grids. This hotfix is only for CA AppLogic® 3.5.19 Xen-based grids (and may not be used with any other CA AppLogic® version). This hotfix replaces files on the servers of the grid. Therefore, a grid reboot is required after applying this hotfix. If this hotfix is installed using BFC, on a grid and afterwards a new server is added to the grid, this hotfix is automatically installed on the newly added server; however the newly added server must be rebooted for the hotfix to take effect. If hf8096 is installed during the grid creation process, the grid needs to be rebooted after the grid creation has completed in order for the hotfix to take effect.
|
Copyright © 2012 CA.
All rights reserved.
|
|