PSN004830
PSN004830
PSN # PSN004830u Avaya Proprietary – Use pursuant to the terms of your signed agreement or company policy.
Original publication date: 01-Nov-16. This is Issue #03, published date: Severity/risk level Medium Urgency When convenient
11-Sep-17.
Name of problem Avaya Aura® Application Enablement (AE) Services 7.0.1 Linux Security Update
Products affected
Avaya Aura® Application Enablement (AE) Services 7.0.1 (VMware offer)
Problem description
Avaya Aura® Application Enablement (AE) Services 7.0.1 Linux Security Update 3 is available. Application Enablement Services
Linux Security Updates (LSUs) are cumulative meaning LSU 3 includes all of the content of previous 7.0.1 LSUs plus additional
security updates. LSU 1 and 2 content is retained in the Remarks section of this PSN.
LSU 3 updates the AE Services 7.0.1 Linux OS to Linux OS 6.8, including the installation of the following additional security updates
(in addition to the updates included in LSUs 1 and 2):
Common
Vulnerability and
Updated Package Red Hat Advisory Red Hat Errata Exposure (CVE) ID
bash RHSA-2017:0725-1 https://access.redhat.com/errata/RHSA-2017:0725 CVE-2016-0634
CVE-2016-7543
CVE-2016-9401
bind-libs RHSA-2017:1679-1 https://access.redhat.com/errata/RHSA-2017:1679l CVE-2017-3142
bind-utils CVE-2017-3143
RHSA-2017:1202-1 https://access.redhat.com/errata/RHSA-2017:1202 CVE-2017-3139
RHSA-2017:0063-1 https://access.redhat.com/errata/RHSA-2017:0063l CVE-2016-9147
coreutils RHSA-2017:0654-1 https://access.redhat.com/errata/RHSA-2017:0654 CVE-2017-2616
coreutils-libs
curl RHSA-2017:0847-1 https://access.redhat.com/errata/RHSA-2017:0847 CVE-2017-2628
libcurl
glibc RHSA-2017:1480-1 https://access.redhat.com/errata/RHSA-2017:1480 CVE-2017-1000366
glibc-common RHSA-2017:0680-1 https://access.redhat.com/errata/RHSA-2017:0680 CVE-2014-9761
CVE-2015-8776
CVE-2015-8778
CVE-2015-8779
gnutls RHSA-2017:0574-1 https://access.redhat.com/errata/RHSA-2017:0574 CVE-2016-8610
CVE-2017-5335
CVE-2017-5336
CVE-2017-5337
httpd RHSA-2017:1721-1 https://access.redhat.com/errata/RHSA-2017:1721 CVE-2016-8743
httpd-tools
RHSA-2016:1421-1 https://access.redhat.com/errata/RHSA-2016:1421 CVE-2016-5387
kernel RHSA-2017:1723-1 https://access.redhat.com/errata/RHSA-2017:1723 CVE-2017-7895
kernel-headers RHSA-2017:1486-1 https://access.redhat.com/errata/RHSA-2017:1486 CVE-2017-1000364
kernel-firmware CVE-2017-1000379
RHSA-2017:1372-1 https://access.redhat.com/errata/RHSA-2017:1372 CVE-2017-6214
RHSA-2017:0892-1 https://access.redhat.com/errata/RHSA-2017:0892 CVE-2016-7910
CVE-2017-2636
RHSA-2017:0817-1 https://access.redhat.com/errata/RHSA-2017:0817 CVE-2016-10088
CVE-2016-10142
CVE-2016-2069
CVE-2016-2384
CVE-2016-6480
CVE-2016-7042
Common
Vulnerability and
Updated Package Red Hat Advisory Red Hat Errata Exposure (CVE) ID
CVE-2016-7097
CVE-2016-8399
CVE-2016-9578
RHSA-2017:0307-1 https://access.redhat.com/errata/RHSA-2017:0307 CVE-2016-6136
CVE-2016-9555
RHSA-2017:0293-1 https://access.redhat.com/errata/RHSA-2017:0293 CVE-2017-6074
RHSA-2016:2006-1 https://access.redhat.com/errata/RHSA-2016:2006 CVE-2016-4470
CVE-2016-5829
RHSA-2016:1664-1 https://access.redhat.com/errata/RHSA-2016:1664 CVE-2016-5696
RHSA-2016:1406-1 https://access.redhat.com/errata/RHSA-2016:1406 CVE-2016-4565
RHSA-2016:0715-1 https://access.redhat.com/errata/RHSA-2016:0715 CVE-2015-5157
CVE-2015-8767
mysql-libs RHSA-2017:0184-1 https://access.redhat.com/errata/RHSA-2017:0184 CVE-2016-5616
CVE-2016-6662
CVE-2016-6663
nss RHSA-2017:1100-1 https://access.redhat.com/errata/RHSA-2017:1100 CVE-2017-5461
nss-util
nss-tools
nss-sysint
ntp RHSA-2017:0252-1 https://access.redhat.com/errata/RHSA-2017:0252 CVE-2016-7426
ntpdate CVE-2016-7429
CVE-2016-7433
CVE-2016-9310
CVE-2016-9311
RHSA-2016:0780-1 https://access.redhat.com/errata/RHSA-2016:0780 CVE-2015-5194
CVE-2015-5195
CVE-2015-5219
CVE-2015-7691
CVE-2015-7692
CVE-2015-7701
CVE-2015-7702
CVE-2015-7703
CVE-2015-7852
CVE-2015-7977
CVE-2015-7978
openssh RHSA-2017:0641-1 https://access.redhat.com/errata/RHSA-2017:0641 CVE-2015-8325
openssh-clients
openssh-server
openssl RHSA-2017:0286-1 https://access.redhat.com/errata/RHSA-2017:0286 CVE-2016-8610
CVE-2017-3731
RHSA-2016:1940-1 https://access.redhat.com/errata/RHSA-2016:1940 CVE-2016-2177
CVE-2016-2178
CVE-2016-2179
CVE-2016-2180
CVE-2016-2181
CVE-2016-2182
CVE-2016-6302
CVE-2016-6304
CVE-2016-6306
sudo RHSA-2017:1574-1 https://access.redhat.com/errata/RHSA-2017:1574 CVE-2017-1000368
Resolution
Install Linux Security Update 2.
Workaround or alternative remediation
n/a
Remarks
LSUs 1 and 2 included the following updates, which are also included in LSU 3 since LSUs are cumulative:
Common
Vulnerability and
Updated Package Red Hat Advisory Red Hat Errata Exposure (CVE) ID
bind RHSA-2016:2871-1 https://rhn.redhat.com/errata/RHSA-2016-2871.html CVE-2016-8864
LSU 2 content
RHSA-2016:2141-1 https://rhn.redhat.com/errata/RHSA-2016-2141.html CVE-2016-8864
RHSA-2016:1944-1 https://rhn.redhat.com/errata/RHSA-2016-1944.html CVE-2016-2776
RHSA-2016:2093-1 https://rhn.redhat.com/errata/RHSA-2016-2093.html CVE-2016-2848
RHSA-2016:2099-1 https://rhn.redhat.com/errata/RHSA-2016-2099.html CVE-2016-2776
CVE-2016-2848
curl RHSA-2015-1254 https://rhn.redhat.com/errata/RHSA-2015-1254.html CVE-2014-3613
CVE-2014-3707
CVE-2014-8150
CVE-2015-3143
CVE-2015-3148
expat RHSA-2016:2824-1 https://rhn.redhat.com/errata/RHSA-2016-2824.html CVE-2016-0718
LSU 2 content
file RHSA-2016:0760-1 https://rhn.redhat.com/errata/RHSA-2016-0760.html CVE-2014-3538
file-libs CVE-2014-3587
CVE-2014-3710
© 2017 Avaya Inc. All Rights Reserved. Page 4
CVE-2014-8116
CVE-2014-8117
CVE-2014-9620
CVE-2014-9653
glibc RHSA-2016:0175-1 https://rhn.redhat.com/errata/RHSA-2016-0175.html CVE-2015-7547
glibc-common
httpd RHSA-2016:1421-1 https://access.redhat.com/errata/RHSA-2016:1421 CVE-2016-5387
LSU 2 content
kernel RHSA-2016:0855-1 https://rhn.redhat.com/errata/RHSA-2016-0855.html CVE-2010-5313
kernel-headers CVE-2013-4312
kernel-firmware CVE-2014-7842
CVE-2014-8134
CVE-2015-5156
CVE-2015-7509
CVE-2015-8215
CVE-2015-8324
CVE-2015-8543
CVE-2016-3841
RHSA-2016:2006-1 https://rhn.redhat.com/errata/RHSA-2016-2006.html CVE-2016-4470
CVE-2016-5829
RHSA-2016:0715-1 https://rhn.redhat.com/errata/RHSA-2016-0715.html CVE-2015-5157
CVE-2015-8767
RHSA-2016:1406 https://access.redhat.com/errata/RHSA-2016:1406 CVE-2016-4565
Patch Notes
The information in this section concerns the patch, if any, recommended in the Resolution above.
Backup before applying the patch
Backup AE Services server data before applying the LSU:
1. Log into the AE Services Management Console using a browser.
2. From the main menu, select Maintenance > Server Data > Backup.
AE Services backs up the database, and displays The backup file can be downloaded from Here on the
Database Backup screen,
3. Click the "Here" link.
A file download dialog box is displayed, from where you can open or save the backup file
serverName_SoftwareVersion_aesvcsdbddmmyyyy.tar.gz. Where, ddmmyyyy is the date stamp).
4. Click Save, and download the backup file to a location from where you can gain access after the system upgrade.
For example, save the file to your local computer or another computer used for storing backups.
Download
To download the AE Services patch:
A. Download from the Ayava support site:
1. Go to Avaya Support (http://support.avaya.com/downloads).
2. Click Support by Products >Downloads:
i. In Enter Product Name type “Avaya Aura Application Enablement Services”
ii. In Choose Release select “7.0.x” from the drop-down menu.
iii. In the list of Downloads locate and select the following entry:
Avaya Aura® Application Enablement Services 7.0.1 Linux Security Updates, 7.0.x
(paging might be necessary to find the entry).
B. Download from PLDS
1. Go to the link- https://plds.avaya.com.
2. Select View Downloads.
3. Use the search engine to locate the available downloads for Application Enablement Services using version 7.0 to
narrow the search.
4. Locate the entry, Avaya Aura® Application Enablement Services 7.0.1 Linux Security Update Patch 3 (paging
might be necessary to find the entry). Alternatively, you can search for the Download ID, which is AES00000597.
Note: All AE Services Software Downloads are available in PLDS, while the Release Note documents are available on the Support
Site. Cross references between the corresponding download entries for patches are provided.
LSU 3:
PLDS ID AES00000597
File Name 701_LSUPatch3.bin
File Size 155.25 MB (158,981 KB)
MD5 Sum b7cdaf532992a873787220e24c76e770
Before you start with the installation of the patch, check the md5 checksum of the file.
To get the checksum, run the following command from the command line:
md5sum 701_LSUPatch3.bin
Note: If the MD5 checksum does not match the stated value, do not proceed with installation. Download the patch again and verify
the MD5 checksum matches.
Pre-requisite: For the VMware offer, use the AE Services Linux console (and hence see whether the
patch has been applied already):
1. Start a Linux console session on the AE Services server (locally, via service port, or remotely
using e.g. putty or SSH)
2. Execute the following command:
swversion
3. If the patch, LSU-7.0.1-3, is not listed, then continue with the procedure How to install the
Patch to the AE Services server.
Verification
1. Locally, through service port, or remotely, by using putty, start a Linux console session on the AE Services server ()
2. Log in with the credentials.
3. Run the following command to verify the installation of the LSU:
© 2017 Avaya Inc. All Rights Reserved. Page 8
swversion
The swversion command displays a message similar to the following if Linux Security Update Patch 2 is installed:
Failure
Contact Technical Support.
Security Notes
The information in this section concerns the security risk, if any, represented by the topic of this PSN.
Security risks
Failure to apply the LSU has the potential to result in a security breach.
Avaya Security Vulnerability Classification
Not Susceptible
Mitigation
n/a
© 2017 Avaya Inc. All Rights Reserved. Page 9
If you require further information or assistance please contact your Authorized Service Provider, or visit
support.avaya.com. There you can access more product information, chat with an Agent, or open an online
Service Request. Support is provided per your warranty or service contract terms unless otherwise specified in the
Avaya support Terms of Use.
Disclaimer: ALL INFORMATION IS BELIEVED TO BE CORRECT AT THE TIME OF PUBLICATION AND IS PROVIDED “AS IS”.
AVAYA INC., ON BEHALF OF ITSELF AND ITS SUBSIDIARIES AND AFFILIATES (HEREINAFTER COLLECTIVELY REFERRED TO
AS “AVAYA”), DISCLAIMS ALL WARRANTIES, EITHER EXPRESS OR IMPLIED, INCLUDING THE WARRANTIES OF
MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE AND FURTHERMORE, AVAYA MAKES NO REPRESENTATIONS
OR WARRANTIES THAT THE STEPS RECOMMENDED WILL ELIMINATE SECURITY OR VIRUS THREATS TO CUSTOMERS’
SYSTEMS. IN NO EVENT SHALL AVAYA BE LIABLE FOR ANY DAMAGES WHATSOEVER ARISING OUT OF OR IN CONNECTION
WITH THE INFORMATION OR RECOMMENDED ACTIONS PROVIDED HEREIN, INCLUDING DIRECT, INDIRECT, CONSEQUENTIAL
DAMAGES, LOSS OF BUSINESS PROFITS OR SPECIAL DAMAGES, EVEN IF AVAYA HAS BEEN ADVISED OF THE POSSIBILITY OF
SUCH DAMAGES.
THE INFORMATION PROVIDED HERE DOES NOT AFFECT THE SUPPORT AGREEMENTS IN PLACE FOR AVAYA PRODUCTS.
SUPPORT FOR AVAYA PRODUCTS CONTINUES TO BE EXECUTED AS PER EXISTING AGREEMENTS WITH AVAYA.
All trademarks identified by ® or TM are registered trademarks or trademarks, respectively, of Avaya Inc.
All other trademarks are the property of their respective owners.