126.96.36.199-ISS-VSP-svm-FP003 - Fix Pack for IBM Security Virtual Server Protection for VMware
This IBM Security Virtual Server Protection for VMware patch fixes LMI pages showing "Loading", but not showing contents. Also fixes a PVU calculation issue due to server models not in the PVUTable.xml.
IBM Security Virtual Server Protection for VMware 188.8.131.52
Last modified: 06/19/2013
PLEASE READ THIS DOCUMENT IN ITS ENTIRETY.
© Copyright IBM Corporation 2009, 2013.
U.S. Government Users Restricted Rights - Use, duplication or
disclosure restricted by GSA ADP Schedule Contract with IBM Corp.
- Applying the Update
- MD5 of included files
- TECHNICAL SUPPORT
- Reporting product issues
This patch contains enhancements for IBM Security Virtual Server Protection for VMware V184.108.40.206
This patch fixes the following issues for IBM Security Virtual Server Protection for VMware Systems:
Under some conditions LMI pages do not work and always show "Loading" but do not show any contents on the page.
PVU calculations were wrong because their server model was not in the PVUTable.xml.
This patch also incorporates these previously released fixes for IBM Security Virtual Server Protection for VMware V220.127.116.11:
+ IBM Security Virtual Server Protection for VMware can be affected by several vulnerabilities in OpenSSL. These vulnerabilities include obtaining sensitive information and denial of service that might be exploited remotely by an attacker.
+On the IBM Security Virtual Server Protection for VMware System, SSH can be affected by these vulnerabilities because no authentication or specialized knowledge is required, and the vulnerabilities are remotely exploitable (CVE-2013-0169, CVE-2013-0166, and CVE-2011-4354).
+ The iptables on the security virtual machine (SVM) block traffic on eth1 interface, which is used by the anti-rootkit module to communicate with the ESX host to perform rootkit detection.
This update applies only to:
IBM Security Virtual Server Protection for VMware V18.104.22.168.
APPLYING THE UPDATE
To apply the update:
Important: You must have root user permissions to perform the steps in this procedure.
These instructions assume that VSP V22.214.171.124 is running on the ESX/ESXi host.
1. Copy the patch file to the /var/support directory of the SVM
2. On the SVM, from the /var/support directory, run the patch installation script:
MD5 OF INCLUDED FILES
TECHNICAL SUPPORT FOR NORTH AMERICA
IBM Security Systems provides technical support to customers that are entitled to receive support.
The IBM Support Portal
Before you contact IBM Security Systems about a problem, see the IBM Support Portal at http://www.ibm.com/software/support
The IBM Software Support Guide
If you need to contact technical support, use the methods described in the IBM Software Support Guide at
The guide provides the following information:
- Registration and eligibility requirements for receiving support
- Technical support telephone numbers for the country in which you are located
- Information you must gather before contacting technical support
INFORMATION REQUIRED FOR REPORTING PRODUCT ISSUES
If you encounter a problem with this product, please make notes that are as detailed as possible about the following:
- Version of IBM Security Virtual Server Protection for VMware
- IBM Security Virtual Server Protection for VMware configuration
- Network deployment
- Specific failure symptoms or undesirable behavior
This information helps us reproduce the problem and resolve it as quickly as possible.
More support for:
IBM Security Virtual Server Protection for VMware
Software version: 126.96.36.199
Operating system(s): Firmware
Software edition: All Editions
Reference #: 1641651
Modified date: 21 June 2013