0% found this document useful (0 votes)
28 views10 pages

PSN004830

PSN004830

Uploaded by

daaruljannahbm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views10 pages

PSN004830

PSN004830

Uploaded by

daaruljannahbm
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Product Support Notice © 2017 Avaya Inc. All Rights Reserved.

PSN # PSN004830u Avaya Proprietary – Use pursuant to the terms of your signed agreement or company policy.
Original publication date: 01-Nov-16. This is Issue #03, published date: Severity/risk level Medium Urgency When convenient
11-Sep-17.
Name of problem Avaya Aura® Application Enablement (AE) Services 7.0.1 Linux Security Update
Products affected
Avaya Aura® Application Enablement (AE) Services 7.0.1 (VMware offer)
Problem description
Avaya Aura® Application Enablement (AE) Services 7.0.1 Linux Security Update 3 is available. Application Enablement Services
Linux Security Updates (LSUs) are cumulative meaning LSU 3 includes all of the content of previous 7.0.1 LSUs plus additional
security updates. LSU 1 and 2 content is retained in the Remarks section of this PSN.

LSU 3 updates the AE Services 7.0.1 Linux OS to Linux OS 6.8, including the installation of the following additional security updates
(in addition to the updates included in LSUs 1 and 2):
Common
Vulnerability and
Updated Package Red Hat Advisory Red Hat Errata Exposure (CVE) ID
bash RHSA-2017:0725-1 https://access.redhat.com/errata/RHSA-2017:0725 CVE-2016-0634
CVE-2016-7543
CVE-2016-9401
bind-libs RHSA-2017:1679-1 https://access.redhat.com/errata/RHSA-2017:1679l CVE-2017-3142
bind-utils CVE-2017-3143
RHSA-2017:1202-1 https://access.redhat.com/errata/RHSA-2017:1202 CVE-2017-3139
RHSA-2017:0063-1 https://access.redhat.com/errata/RHSA-2017:0063l CVE-2016-9147
coreutils RHSA-2017:0654-1 https://access.redhat.com/errata/RHSA-2017:0654 CVE-2017-2616
coreutils-libs
curl RHSA-2017:0847-1 https://access.redhat.com/errata/RHSA-2017:0847 CVE-2017-2628
libcurl
glibc RHSA-2017:1480-1 https://access.redhat.com/errata/RHSA-2017:1480 CVE-2017-1000366
glibc-common RHSA-2017:0680-1 https://access.redhat.com/errata/RHSA-2017:0680 CVE-2014-9761
CVE-2015-8776
CVE-2015-8778
CVE-2015-8779
gnutls RHSA-2017:0574-1 https://access.redhat.com/errata/RHSA-2017:0574 CVE-2016-8610
CVE-2017-5335
CVE-2017-5336
CVE-2017-5337
httpd RHSA-2017:1721-1 https://access.redhat.com/errata/RHSA-2017:1721 CVE-2016-8743
httpd-tools
RHSA-2016:1421-1 https://access.redhat.com/errata/RHSA-2016:1421 CVE-2016-5387
kernel RHSA-2017:1723-1 https://access.redhat.com/errata/RHSA-2017:1723 CVE-2017-7895
kernel-headers RHSA-2017:1486-1 https://access.redhat.com/errata/RHSA-2017:1486 CVE-2017-1000364
kernel-firmware CVE-2017-1000379
RHSA-2017:1372-1 https://access.redhat.com/errata/RHSA-2017:1372 CVE-2017-6214
RHSA-2017:0892-1 https://access.redhat.com/errata/RHSA-2017:0892 CVE-2016-7910
CVE-2017-2636
RHSA-2017:0817-1 https://access.redhat.com/errata/RHSA-2017:0817 CVE-2016-10088
CVE-2016-10142
CVE-2016-2069
CVE-2016-2384
CVE-2016-6480
CVE-2016-7042
Common
Vulnerability and
Updated Package Red Hat Advisory Red Hat Errata Exposure (CVE) ID
CVE-2016-7097
CVE-2016-8399
CVE-2016-9578
RHSA-2017:0307-1 https://access.redhat.com/errata/RHSA-2017:0307 CVE-2016-6136
CVE-2016-9555
RHSA-2017:0293-1 https://access.redhat.com/errata/RHSA-2017:0293 CVE-2017-6074
RHSA-2016:2006-1 https://access.redhat.com/errata/RHSA-2016:2006 CVE-2016-4470
CVE-2016-5829
RHSA-2016:1664-1 https://access.redhat.com/errata/RHSA-2016:1664 CVE-2016-5696
RHSA-2016:1406-1 https://access.redhat.com/errata/RHSA-2016:1406 CVE-2016-4565
RHSA-2016:0715-1 https://access.redhat.com/errata/RHSA-2016:0715 CVE-2015-5157
CVE-2015-8767
mysql-libs RHSA-2017:0184-1 https://access.redhat.com/errata/RHSA-2017:0184 CVE-2016-5616
CVE-2016-6662
CVE-2016-6663
nss RHSA-2017:1100-1 https://access.redhat.com/errata/RHSA-2017:1100 CVE-2017-5461
nss-util
nss-tools
nss-sysint
ntp RHSA-2017:0252-1 https://access.redhat.com/errata/RHSA-2017:0252 CVE-2016-7426
ntpdate CVE-2016-7429
CVE-2016-7433
CVE-2016-9310
CVE-2016-9311
RHSA-2016:0780-1 https://access.redhat.com/errata/RHSA-2016:0780 CVE-2015-5194
CVE-2015-5195
CVE-2015-5219
CVE-2015-7691
CVE-2015-7692
CVE-2015-7701
CVE-2015-7702
CVE-2015-7703
CVE-2015-7852
CVE-2015-7977
CVE-2015-7978
openssh RHSA-2017:0641-1 https://access.redhat.com/errata/RHSA-2017:0641 CVE-2015-8325
openssh-clients
openssh-server
openssl RHSA-2017:0286-1 https://access.redhat.com/errata/RHSA-2017:0286 CVE-2016-8610
CVE-2017-3731
RHSA-2016:1940-1 https://access.redhat.com/errata/RHSA-2016:1940 CVE-2016-2177
CVE-2016-2178
CVE-2016-2179
CVE-2016-2180
CVE-2016-2181
CVE-2016-2182
CVE-2016-6302
CVE-2016-6304
CVE-2016-6306
sudo RHSA-2017:1574-1 https://access.redhat.com/errata/RHSA-2017:1574 CVE-2017-1000368

The following RPMs are installed by LSU 3:

© 2017 Avaya Inc. All Rights Reserved. Page 2


bash-4.1.2-48.el6.AV1.i686.rpm mysql-libs-5.1.73-8.el6_8.i686.rpm
bind-libs-9.8.2-0.62.rc1.el6_9.4.i686.rpm nscd-2.12-1.209.el6_9.2.i686.rpm
bind-utils-9.8.2-0.62.rc1.el6_9.4.i686.rpm nspr-4.13.1-1.el6.i686.rpm
binutils-2.20.51.0.2-5.44.el6.i686.rpm nss-util-3.28.4-1.el6_9.i686.rpm
ca-certificates-2015.2.6-65.0.1.el6_7.noarch.rpm nss-3.28.4-3.el6_9.i686.rpm
chkconfig-1.3.49.5-1.el6.i686.rpm nss-pam-ldapd-0.7.5-32.el6.i686.rpm
coreutils-8.4-46.el6.i686.rpm nss-softokn-3.14.3-23.el6_7.i686.rpm
coreutils-libs-8.4-46.el6.i686.rpm nss-softokn-freebl-3.14.3-23.el6_7.i686.rpm
cpp-4.4.7-17.el6.i686.rpm nss-sysinit-3.28.4-3.el6_9.i686.rpm
crda-3.13_2015.10.22-3.el6.i686.rpm nss-tools-3.28.4-3.el6_9.i686.rpm
cronie-1.4.4-15.el6_7.1.i686.rpm ntp-4.2.6p5-10.el6_8.2.i686.rpm
cronie-anacron-1.4.4-15.el6_7.1.i686.rpm ntpdate-4.2.6p5-10.el6_8.2.i686.rpm
curl-7.19.7-53.el6_9.i686.rpm openldap-2.4.40-12.el6.i686.rpm
db4-4.7.25-20.el6_7.i686.rpm openldap-clients-2.4.40-12.el6.i686.rpm
db4-utils-4.7.25-20.el6_7.i686.rpm openldap-servers-2.4.40-12.el6.i686.rpm
device-mapper-1.02.117-7.el6.i686.rpm openssh-5.3p1-122.el6.i686.rpm
device-mapper-libs-1.02.117-7.el6.i686.rpm openssh-clients-5.3p1-122.el6.i686.rpm
dhclient-4.1.1-51.P1.el6.i686.rpm openssh-server-5.3p1-122.el6.i686.rpm
dhcp-common-4.1.1-51.P1.el6.i686.rpm openssl-1.0.1e-57.el6.i686.rpm
dmidecode-2.12-7.el6.i686.rpm pam-1.1.1-22.el6.i686.rpm
dracut-004-409.el6_8.2.noarch.rpm passwd-0.77-7.el6.i686.rpm
dracut-kernel-004-409.el6_8.2.noarch.rpm perl-5.10.1-141.el6_7.1.i686.rpm
e2fsprogs-devel-1.41.12-22.el6.i686.rpm perl-Compress-Raw-Zlib-2.021-141.el6_7.1.i686.rpm
elfutils-libelf-0.164-2.el6.i686.rpm perl-Compress-Zlib-2.021-141.el6_7.1.i686.rpm
elfutils-libs-0.164-2.el6.i686.rpm perl-IO-Compress-Base-2.021-141.el6_7.1.i686.rpm
expat-2.0.1-13.el6_8.i686.rpm perl-IO-Compress-Zlib-2.021-141.el6_7.1.i686.rpm
file-5.04-30.el6.i686.rpm perl-libs-5.10.1-141.el6_7.1.i686.rpm
file-libs-5.04-30.el6.i686.rpm perl-libwww-perl-5.833-3.el6.noarch.rpm
findutils-4.4.2-9.el6.i686.rpm perl-Module-Pluggable-3.90-141.el6_7.1.i686.rpm
gawk-3.1.7-10.el6_7.3.i686.rpm perl-Pod-Escapes-1.04-141.el6_7.1.i686.rpm
gdb-7.2-90.el6.i686.rpm perl-Pod-Simple-3.13-141.el6_7.1.i686.rpm
gdbm-1.8.0-39.el6.i686.rpm perl-Time-HiRes-1.9721-141.el6_7.1.i686.rpm
glib2-2.28.8-5.el6.i686.rpm perl-version-0.77-141.el6_7.1.i686.rpm
glibc-2.12-1.209.el6_9.2.i686.rpm policycoreutils-2.0.83-30.1.el6_8.i686.rpm
glibc-common-2.12-1.209.el6_9.2.i686.rpm portreserve-0.0.4-11.el6.i686.rpm
gmp-4.3.1-10.el6.i686.rpm postfix-2.6.6-6.el6_7.1.i686.rpm
gnutls-2.12.23-21.el6.i686.rpm postgresql-8.4.20-7.el6.i686.rpm
grub-0.97-94.el6_7.1.i686.rpm postgresql-libs-8.4.20-7.el6.i686.rpm
httpd-2.2.15-60.el6_9.4.i686.rpm postgresql-server-8.4.20-7.el6.i686.rpm
httpd-tools-2.2.15-60.el6_9.4.i686.rpm procps-3.2.8-36.el6.i686.rpm
hwdata-0.233-16.1.el6.noarch.rpm python-2.6.6-66.el6_8.i686.rpm
initscripts-9.03.53-1.el6.i686.rpm python-libs-2.6.6-66.el6_8.i686.rpm
iproute-2.6.32-54.el6.i686.rpm python-magic-5.04-30.el6.i686.rpm
iputils-20071127-21.el6.i686.rpm python-pycurl-7.19.0-9.el6.i686.rpm
iscsi-initiator-utils-6.2.0.873-21.el6.i686.rpm python-urlgrabber-3.9.1-11.el6.noarch.rpm
iw-4.1-1.el6.i686.rpm ql2400-firmware-7.03.00-1.el6_5.noarch.rpm
json-c-0.11-12.el6.i686.rpm ql2500-firmware-7.03.00-1.el6_5.noarch.rpm
kernel-2.6.32-696.6.3.el6.i686.rpm redhat-release-server-6Server-6.8.0.5.el6.i686.rpm
kernel-firmware-2.6.32-696.6.3.el6.noarch.rpm redhat-support-lib-python-0.9.7-4.el6.noarch.rpm
kernel-headers-2.6.32-696.6.3.el6.i686.rpm redhat-support-tool-0.9.8-4.el6.noarch.rpm
kexec-tools-2.0.0-300.el6.i686.rpm rpm-4.8.0-55.el6.i686.rpm
kpartx-0.4.9-93.el6.i686.rpm rpm-libs-4.8.0-55.el6.i686.rpm
© 2017 Avaya Inc. All Rights Reserved. Page 3
krb5-libs-1.10.3-57.el6.i686.rpm rpm-python-4.8.0-55.el6.i686.rpm
krb5-workstation-1.10.3-57.el6.i686.rpm rsync-3.0.6-12.el6.i686.rpm
libblkid-2.17.2-12.24.el6.i686.rpm rsyslog7-7.4.10-5.el6.i686.rpm
libcom_err-devel-1.41.12-22.el6.i686.rpm selinux-policy-3.7.19-292.el6.noarch.rpm
libcurl-7.19.7-53.el6_9.i686.rpm selinux-policy-targeted-3.7.19-292.el6.noarch.rpm
libdrm-2.4.65-2.el6.i686.rpm shadow-utils-4.1.5.1-5.el6.i686.rpm
libgcc-4.4.7-17.el6.i686.rpm sqlite-3.6.20-1.el6_7.2.i686.rpm
libgcrypt-1.4.5-12.el6_8.i686.rpm sudo-1.8.6p3-29.el6_9.i686.rpm
libgomp-4.4.7-17.el6.i686.rpm sysstat-9.0.4-31.el6.i686.rpm
libpcap-1.4.0-4.20130826git2dbcaa1.el6.i686.rpm system-config-network-tui-1.6.0.el6.3-4.el6.noarch.rpm
libpciaccess-0.13.4-1.el6.i686.rpm sysvinit-tools-2.87-6.dsf.el6.i686.rpm
libselinux-2.0.94-7.el6.i686.rpm tar-1.23-14.el6.i686.rpm
libselinux-utils-2.0.94-7.el6.i686.rpm tcp_wrappers-libs-7.6-58.el6.i686.rpm
libssh2-1.4.2-2.el6_7.1.i686.rpm tmpwatch-2.9.16-6.el6.i686.rpm
libstdc++-4.4.7-17.el6.i686.rpm tzdata-2016f-1.el6.noarch.rpm
libudev-147-2.73.el6.i686.rpm udev-147-2.73.el6.i686.rpm
libuser-0.56.13-8.el6_7.i686.rpm unzip-6.0-4.el6.i686.rpm
libuuid-2.17.2-12.24.el6.i686.rpm upstart-0.6.5-16.el6.i686.rpm
libxml2-2.7.6-21.el6_8.1.i686.rpm util-linux-ng-2.17.2-12.24.el6.i686.rpm
libxml2-python-2.7.6-21.el6_8.1.i686.rpm vim-minimal-7.4.629-5.el6_8.1.i686.rpm
logrotate-3.7.8-26.el6_7.i686.rpm wget-1.12-8.el6.i686.rpm
make-3.81-23.el6.i686.rpm xorg-x11-drv-ati-firmware-7.6.1-2.el6.noarch.rpm
mdadm-3.3.4-1.el6.i686.rpm yum-3.2.29-73.el6.noarch.rpm
mod_ssl-2.2.15-60.el6_9.4.i686.rpm zip-3.0-1.el6_7.1.i686.rpm

Resolution
Install Linux Security Update 2.
Workaround or alternative remediation
n/a
Remarks
LSUs 1 and 2 included the following updates, which are also included in LSU 3 since LSUs are cumulative:
Common
Vulnerability and
Updated Package Red Hat Advisory Red Hat Errata Exposure (CVE) ID
bind RHSA-2016:2871-1 https://rhn.redhat.com/errata/RHSA-2016-2871.html CVE-2016-8864
LSU 2 content
RHSA-2016:2141-1 https://rhn.redhat.com/errata/RHSA-2016-2141.html CVE-2016-8864
RHSA-2016:1944-1 https://rhn.redhat.com/errata/RHSA-2016-1944.html CVE-2016-2776
RHSA-2016:2093-1 https://rhn.redhat.com/errata/RHSA-2016-2093.html CVE-2016-2848
RHSA-2016:2099-1 https://rhn.redhat.com/errata/RHSA-2016-2099.html CVE-2016-2776
CVE-2016-2848
curl RHSA-2015-1254 https://rhn.redhat.com/errata/RHSA-2015-1254.html CVE-2014-3613
CVE-2014-3707
CVE-2014-8150
CVE-2015-3143
CVE-2015-3148
expat RHSA-2016:2824-1 https://rhn.redhat.com/errata/RHSA-2016-2824.html CVE-2016-0718
LSU 2 content
file RHSA-2016:0760-1 https://rhn.redhat.com/errata/RHSA-2016-0760.html CVE-2014-3538
file-libs CVE-2014-3587
CVE-2014-3710
© 2017 Avaya Inc. All Rights Reserved. Page 4
CVE-2014-8116
CVE-2014-8117
CVE-2014-9620
CVE-2014-9653
glibc RHSA-2016:0175-1 https://rhn.redhat.com/errata/RHSA-2016-0175.html CVE-2015-7547
glibc-common
httpd RHSA-2016:1421-1 https://access.redhat.com/errata/RHSA-2016:1421 CVE-2016-5387
LSU 2 content
kernel RHSA-2016:0855-1 https://rhn.redhat.com/errata/RHSA-2016-0855.html CVE-2010-5313
kernel-headers CVE-2013-4312
kernel-firmware CVE-2014-7842
CVE-2014-8134
CVE-2015-5156
CVE-2015-7509
CVE-2015-8215
CVE-2015-8324
CVE-2015-8543
CVE-2016-3841
RHSA-2016:2006-1 https://rhn.redhat.com/errata/RHSA-2016-2006.html CVE-2016-4470
CVE-2016-5829
RHSA-2016:0715-1 https://rhn.redhat.com/errata/RHSA-2016-0715.html CVE-2015-5157
CVE-2015-8767
RHSA-2016:1406 https://access.redhat.com/errata/RHSA-2016:1406 CVE-2016-4565

RHSA-2016:0494-1 https://rhn.redhat.com/errata/RHSA-2016-0494.html CVE-2016-0774

RHSA-2016:2766-1 https://rhn.redhat.com/errata/RHSA-2016-2766.html CVE-2016-1583


New LSU 2 content CVE-2016-2143
RHSA-2016:2105-1 https://rhn.redhat.com/errata/RHSA-2016-2105.html CVE-2016-5195
New LSU 2 content
RHSA-2016:2006-1 https://rhn.redhat.com/errata/RHSA-2016-2006.html CVE-2016-4470
New LSU 2 content CVE-2016-5829
RHSA-2016:1664-1 https://rhn.redhat.com/errata/RHSA-2016-1664.html CVE-2016-5696
New LSU 2 content
RHSA-2016:1406-1 https://access.redhat.com/errata/RHSA-2016:1406 CVE-2016-4565
New LSU 2 content
libgcrypt RHSA-2016:2674-1 https://rhn.redhat.com/errata/RHSA-2016-2674.html CVE-2016-6313
LSU 2 content
libssh2 RHSA-2016:0428-1 https://rhn.redhat.com/errata/RHSA-2016-0428.html CVE-2016-0787
libxml2 RHSA-2016:1292 https://access.redhat.com/errata/RHSA-2016:1292.html CVE-2016-1762
CVE-2016-1833
CVE-2016-1834
CVE-2016-1835
CVE-2016-1836
CVE-2016-1837
CVE-2016-1838
CVE-2016-1839
CVE-2016-1840
CVE-2016-3627
CVE-2016-3705
CVE-2016-4447
CVE-2016-4448
CVE-2016-4449
nss RHSA-2016:0591-1 https://rhn.redhat.com/errata/RHSA-2016-0591.html CVE-2016-1978
nss-util CVE-2016-1979
nspr
RHSA-2016:0370-1 https://rhn.redhat.com/errata/RHSA-2016-0370.html CVE-2016-1950
© 2017 Avaya Inc. All Rights Reserved. Page 5
RHSA-2016:2779-1 https://rhn.redhat.com/errata/RHSA-2016-2779.html CVE-2016-2834
New LSU 2 content CVE-2016-5285
CVE-2016-8635
ntp RHSA-2016:1141-1 https://access.redhat.com/errata/RHSA-2016:1141.html CVE-2015-7979
ntpdata CVE-2016-1547
CVE-2016-1548
CVE-2016-1550
CVE-2016-2518
RHSA-2016:0780-1 https://rhn.redhat.com/errata/RHSA-2016-0780.html CVE-2015-5194
CVE-2015-5195
CVE-2015-5219
CVE-2015-7691
CVE-2015-7692
CVE-2015-7701
CVE-2015-7702
CVE-2015-7703
CVE-2015-7852
CVE-2015-7977
CVE-2015-7978
openssh RHSA-2016:0741-1 https://rhn.redhat.com/errata/RHSA-2016-0741.html CVE-2015-5352
openssh-server CVE-2015-6563
openssh-clients CVE-2015-6564
CVE-2016-1908
RHSA-2016:0466-1 https://rhn.redhat.com/errata/RHSA-2016-0466.html CVE-2015-5600
CVE-2016-3115
openssl RHSA-2016:0996-1 https://rhn.redhat.com/errata/RHSA-2016-0996.html CVE-2016-0799
CVE-2016-2105
CVE-2016-2106
CVE-2016-2107
CVE-2016-2108
CVE-2016-2109
CVE-2016-2842
RHSA-2016:0301-1 https://rhn.redhat.com/errata/RHSA-2016-0301.html CVE-2015-3197
CVE-2016-0702
CVE-2016-0705
CVE-2016-0797
CVE-2016-0800

RHSA-2016:1940-1 https://rhn.redhat.com/errata/RHSA-2016-1940.html CVE-2016-2177


CVE-2016-2178
CVE-2016-2179
CVE-2016-2180
CVE-2016-2181
CVE-2016-2182
CVE-2016-6302
CVE-2016-6304
CVE-2016-6306
RHSA-2016:2802-1 https://rhn.redhat.com/errata/RHSA-2016-2802.html CVE-2016-6304
New LSU 2 content
pdksh n/a pdksh rpm removed (replaced with mksh) n/a
LSU 2 change
policycoreutils RHSA-2016:2702-1 https://rhn.redhat.com/errata/RHSA-2016-2702.html CVE-2016-7545
LSU 2 content
postgresql RHSA-2016:0347-1 https://rhn.redhat.com/errata/RHSA-2016-0347.html CVE-2016-0773
postgresql-libs RHSA-2015-1194 https://rhn.redhat.com/errata/RHSA-2015-1194.html CVE-2015-3165
© 2017 Avaya Inc. All Rights Reserved. Page 6
postgresql-server CVE-2015-3166
CVE-2015-3167
python RHSA-2016:1626-1 https://rhn.redhat.com/errata/RHSA-2016-1626.html CVE-2016-0772
LSU 2 content CVE-2016-1000110
CVE-2016-5699
sudo RHSA-2016:2872-1 https://rhn.redhat.com/errata/RHSA-2016-2872.html CVE-2016-7032
LSU 2 content CVE-2016-7076
sysvinit-tools n/a sysvinit-tools updated: sysvinit-tools-2.87- n/a
LSU 2 content 6.dsf.el6.i686
vim RHSA-2016:2972-1 https://rhn.redhat.com/errata/RHSA-2016-2972.html CVE-2016-1248
LSU 2 content

Patch Notes
The information in this section concerns the patch, if any, recommended in the Resolution above.
Backup before applying the patch
Backup AE Services server data before applying the LSU:
1. Log into the AE Services Management Console using a browser.
2. From the main menu, select Maintenance > Server Data > Backup.
AE Services backs up the database, and displays The backup file can be downloaded from Here on the
Database Backup screen,
3. Click the "Here" link.
A file download dialog box is displayed, from where you can open or save the backup file
serverName_SoftwareVersion_aesvcsdbddmmyyyy.tar.gz. Where, ddmmyyyy is the date stamp).
4. Click Save, and download the backup file to a location from where you can gain access after the system upgrade.
For example, save the file to your local computer or another computer used for storing backups.

Download
To download the AE Services patch:
A. Download from the Ayava support site:
1. Go to Avaya Support (http://support.avaya.com/downloads).
2. Click Support by Products >Downloads:
i. In Enter Product Name type “Avaya Aura Application Enablement Services”
ii. In Choose Release select “7.0.x” from the drop-down menu.
iii. In the list of Downloads locate and select the following entry:
Avaya Aura® Application Enablement Services 7.0.1 Linux Security Updates, 7.0.x
(paging might be necessary to find the entry).
B. Download from PLDS
1. Go to the link- https://plds.avaya.com.
2. Select View Downloads.
3. Use the search engine to locate the available downloads for Application Enablement Services using version 7.0 to
narrow the search.
4. Locate the entry, Avaya Aura® Application Enablement Services 7.0.1 Linux Security Update Patch 3 (paging
might be necessary to find the entry). Alternatively, you can search for the Download ID, which is AES00000597.

Note: All AE Services Software Downloads are available in PLDS, while the Release Note documents are available on the Support
Site. Cross references between the corresponding download entries for patches are provided.
LSU 3:
PLDS ID AES00000597
File Name 701_LSUPatch3.bin
File Size 155.25 MB (158,981 KB)
MD5 Sum b7cdaf532992a873787220e24c76e770

© 2017 Avaya Inc. All Rights Reserved. Page 7


LSU 2 (Historical Information):
PLDS ID AES00000544
File Name 701_LSUPatch2.bin
File Size 153.22 MB (156,893 KB)
MD5 Sum 63b81c7743b7346e9843c38a4b948342

LSU 1 (Historical Information):


PLDS ID AES00000542
File Name 701_LSUPatch1.bin
File Size 147.33 MB (154,489,224 Bytes)
MD5 Sum 0466307bd5a7a2343e0194e8d1b2582d

Before you start with the installation of the patch, check the md5 checksum of the file.
To get the checksum, run the following command from the command line:
md5sum 701_LSUPatch3.bin
Note: If the MD5 checksum does not match the stated value, do not proceed with installation. Download the patch again and verify
the MD5 checksum matches.

Patch install instructions Service-interrupting?


Notes: Yes
1. The AE Services server is rebooted after installation completes.
2. This LSU is only compatible with AE Services 7.0.1 VMware offer type.

I. Check the detailed AE Services version.

Pre-requisite: For the VMware offer, use the AE Services Linux console (and hence see whether the
patch has been applied already):
1. Start a Linux console session on the AE Services server (locally, via service port, or remotely
using e.g. putty or SSH)
2. Execute the following command:
swversion
3. If the patch, LSU-7.0.1-3, is not listed, then continue with the procedure How to install the
Patch to the AE Services server.

II. Installing the Patch on the AE Services server

1. Login to the AE Services server using one of the following


a) Local Linux console
b) The service port
c) SSH
2. Secure the copy of 701_LSUPatch3.bin to the /tmp directory on the AE Services server.
3. As the root user, execute the following commands in the command line:
cd /tmp
chmod 750 701_LSUPatch3.bin
./701_LSUPatch3.bin
4. Follow the on-screen instructions, until installation completes.
Note: The system reboots AE Services server after the patch installation.

Verification
1. Locally, through service port, or remotely, by using putty, start a Linux console session on the AE Services server ()
2. Log in with the credentials.
3. Run the following command to verify the installation of the LSU:
© 2017 Avaya Inc. All Rights Reserved. Page 8
swversion

The swversion command displays a message similar to the following if Linux Security Update Patch 2 is installed:

************* Patch Numbers Installed in this system are *************


====
LSU-7.0.1-3
====

4. Log into the AE Services Management Console using a web browser.


5. From the main menu, click Status.
6. On the Status page, verify that all previously licensed services are running.
7. Validate the server configuration data, as follows:
 On the main menu click Networking
 Under AE Service IP (Local IP), verify that the settings are correct.
 Under Network Configure, verify that the displayed settings are correct.
 Under Ports, verify that the settings displayed are correct.
8. Check all of the remaining Management Console pages listed under AE Services and Communication Manager
Interface. Verify that the information is complete and correct.
This completes the installation of the Patch.

AE Services server configurations for data changes


Note: Follow this procedure, only if the AE Services server configuration data has changed.
Follow this procedure to restore the AE Services server data:
1. From the main menu of the AE Services Management Console, select Maintenance > Server Data > Restore.
The Management Console displays the Restore Database Configuration screen. The initial state of the Restore Database
page provides you with two basic functions:
 Text box with the Browse button, which provides the means to select a backup file to use for the Restore process.
Alternatively, you can type a fully qualified name (FQDN) of the backup file in the text box.
 Restore button that starts the Restore process.
2. Click Browse and locate the AE Services database backup file that you intend to use
(For example: serverName_7-0-1-15-0_aesvcsdb01012016.tar.gz).
3. Click Restore.
The Management Console redisplays the Restore Database Configuration page, with the following message.
"A database restore is pending. You must restart the Database Service and the AE
Server for the restore to take effect. To restart these services now, click the
Restart Services button below."
Click Restart Services.
AE Services restarts the Database Service and the AE Services, thereby completing the Restore process.

Failure
Contact Technical Support.

Patch uninstall instructions


LSUs cannot be uninstalled.

Security Notes
The information in this section concerns the security risk, if any, represented by the topic of this PSN.
Security risks
Failure to apply the LSU has the potential to result in a security breach.
Avaya Security Vulnerability Classification
Not Susceptible
Mitigation
n/a
© 2017 Avaya Inc. All Rights Reserved. Page 9
If you require further information or assistance please contact your Authorized Service Provider, or visit
support.avaya.com. There you can access more product information, chat with an Agent, or open an online
Service Request. Support is provided per your warranty or service contract terms unless otherwise specified in the
Avaya support Terms of Use.

Disclaimer: ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED “AS IS”.
AVAYA INC., ON BEHALF OF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO
AS “AVAYA”), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS
OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS’
SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION
WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, CONSEQUENTIAL
DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES.
THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS.
SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA.
All trademarks identified by ® or TM are registered trademarks or trademarks, respectively, of Avaya Inc.
All other trademarks are the property of their respective owners.

© 2017 Avaya Inc. All Rights Reserved. Page 10

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy