Date: June 8, 2007 and October 18, 2007 and April 18, 2008
(C) Copyright International Business Machines
Corp., 2005 All rights reserved.
Hints and Tips for using the new web-based
user interface
This user interface is comprised of several major
components: the Banner, the Task bar, the Navigation pane, the Work pane, and
the Status bar. The Banner, across the top of the workplace window,
identifies the product and logo. It is optionally displayed and is set by using
the Change User Interface Settings task. The Task bar, located
below the Banner, displays the name(s) of any tasks that are running, the user
ID you are logged in as, online help information, and the ability to logoff or
disconnect from the console. The Navigation pane, in the left portion of
the window, contains the primary navigation links for managing your system
resources and the Hardware Management Console. The items are referred to as
nodes. The Work pane, in the right portion of the window, displays
information based on the current selection from the Navigation pane. For
example, when Welcome is selected in the Navigation pane, the Welcome
window content is displayed in the Work pane. The Status bar, in the
bottom left portion of the window, provides visual indicators of current
overall system status. It also contains a status overview icon which may be
selected to display more detailed status information in the Work pane.
The System p Operations Guide for the Hardware Management Console and Managed Systems can be accessed online on the HMC. Select Welcome in the Navigation pane. The Welcome window content is displayed in the Work pane. Select HMC Operations Guide to view it.
Additional
education, support, tutorial and technical information can also be accessed
online on the
To log on the HMC from a remote browser, the HMC must
first be configured for web browser access.
See appendix C of the System p Operations Guide for the Hardware Management Console and
Managed Systems for
instructions on how to configure the HMC for remote web browser access. After the HMC has been properly configured,
from your web browser enter the URL of the HMC using the format https://xxx.xxx.xxx.xxx.
Upgrade Hints
Certificates and keyring files generated
by the System Manager Security application (on HMC Version 6) will not be
migrated to HMC Version 7. Applications such as remote 5250, which import the
public key ring file to establish a secure connection with HMC, will need to
import a new public key ring file. The new file, SM.pubkr, will
be generated and stored on HMC V7 under /opt/ccfw/data directory. User can copy
this file, using the scp or sendfile command.
For further information on how to setup
remote 5250 using SSL, see support document located on the System i Technical
Support website at the URL
http://www-03.ibm.com/servers/eserver/support/iseries/index.html.
This document and many others can be found by selecting the "Technical
databases" link.
Server
and Partition Management
§
For GUI login, when
the session runs long enough to reach the timeout minutes (no matter user
actively executes tasks or let it idle), the GUI will prompt a authentication
window to ask this user re-authenticate. If the re-authentication passed, the
next session timeout counting started. If the authentication failed three times
or the authentication password is not re-entered within the Verification
Timeout minutes, the session will be forcedly disconnected.
§
For ssh login, when
the session time reaches the limitation, the ssh session will be closed.
Note: A value zero for Session
timeout minutes, Verification Timeout minutes, or Idel
timeout minutes means no timeout limit
Platform Management
Command
Line
•
A new command, lsfru,
has been added to list selected service processor field-replaceable unit (FRU)
information for a managed system (POWER6 servers only).
•
The following commands
have been added to support LDAP configuration on the HMC:
•
chhmcldap - changes the HMC LDAP configuration
•
lshmcldap - lists LDAP user information and HMC LDAP configuration
data
•
The following commands have been enhanced to
support HMC LDAP configuration and remote LDAP authentication: chhmcusr, lshmcusr, mkhmcusr,
getfile, and rmfile.
•
The following commands have been enhanced to
support virtual switches (POWER6 servers only):
chsyscfg, lssyscfg, mksyscfg, chhwres, and lshwres.
•
The chhmc command
has been enhanced to configure the HMC for IPv6 support, and the lshmc command
has been enhanced to display the HMC IPv6 configuration settings.
•
The chhmc and lshmc
commands have been enhanced to support changing and displaying the network
settings for the sl0 interface.
•
The lshmc command
has been enhanced to display the SSH protocol version(s) the HMC can use.
•
The chsyscfg and
lssyscfg commands have been enhanced to support setting and displaying
the address broadcast performance policy for a managed system (POWER6 servers
only).
•
The chsyscfg and
lssyscfg commands have been enhanced to support setting and displaying
the maximum number of partitions that can use a Host Channel Adapter (HCA)
(POWER6 servers only). You must set this
value if you want more than one partition to use a HCA.
•
The chlparutil and
lslparutil commands have been enhanced to support new utilization data
sampling rates of 30 seconds, 60 seconds, 5 minutes, and 30 minutes.
•
A new option has been
added to the lpar_netboot command to enable or disable firmware spanning
tree discovery.
•
A new option has been
added to the lssysconn command to list IP addresses that cannot be
automatically discovered by the HMC when using DHCP, and a new option has been
added to the rmsysconn command to remove an IP address from that list.
•
A new option has been
added to the lshwinfo command to allow the user to specify the side of
the managed frame's bulk power assembly for which to list environmental
information. For POWER6 frames with 2
line cords per side, the lshwinfo command will have two output values
per attribute; the first value will be for line cord 1, and the second for line
cord 2.
•
The startdump command
has been enhanced to support initiation of node service processor dumps (POWER6
servers only).
•
The -l option
on the updlic command now accepts a comma-separated list of firmware
levels in the format <stream>_<level>, to allow specific levels to
be specified for a mixed POWER5 and POWER6 environment.
Licensed
Internal Code (LIC) update
Scheduled Operations
Problem Analysis
Service Agent
Help
.
Repair and Verify
System Plan
·
Improved
usability/managability of VIOS install into LPAR.
·
Additional Manage
Install Resource task.
·
Additional ability to
install AIX into LPAR: as stand alone and with NIM.
·
Additional ability to install
RHEL & SLES into LPAR.
·
Additional
provisioning of group capped partition attributes.
·
Improved System Plan
Viewer user controls and details.
National Language
Support in HMC V7R3.3.0
The NLS support remains the same
but there are these known issues:
·
Mnemonics is no longer
supported in the new UI. However, mnemonics are still being shown in certain
language environments.
·
Number format issues
with decimal point in certain locales. For example, sometimes period (.) is
used instead of comma (,) for decimal point.
·
To allow all UI
displayed in English only in remote management, users can only have English or
none in the language list of their browser setting.
·
Due to the limitation
of groff, some characters in the output of "man" command might be
corrupted in traditional Chinese, simplified Chinese and Korean when the window
is too narrow. Widen the window and retry the command again.
·
User ID, User
information, HMC User password, Partition name, managed system name, profile
name and system profile name are in English only.
·
The gifs displayed are
in English in Help for the Main User Interface.
·
The first page (top-level
entries) in each chapter of three Help books ("Base Tasks and
Console","System" and "User Interface") are blank.
·
The order of the
address fields is for US but this address will not be used as Mailing address.
·
The text and flyovers
on the Help window will be displayed in English
Security Fixes
Name Description
CVE=2007-5612 |
Security Vulnerability in L1 agent
(Pegasus) |
CVE-2007-5707 CVE-2007-5708 |
SECURITY: openldap2 remote denial of
service |
FIX_BY_IBM |
SECURITY: Pegasus - CVE-2008-0003 PAM
Callback stack buff... |
CVE-2007-4135 |
SECURITY: nfsidmap name - uid
translation flaw |
CVE-2007-4752 |
SECURITY: openssh X11 cookie and
SIGALRM fixes |
CVE-2007-2445 |
SECURITY: libpng DOS |
CVE-2007-2442 CVE-2007-2443 CVE-2007-2798 |
SECURITY: krb5 remote code execution |
CVE-2007-2754 |
SECURITY: freetype remote code
execution |
CVE-2007-2926 |
SECURITY: bind DNS cache poisoning |
SECURITY: findutils local vulnerability
|
|
CVE-2007-3798 |
SECURITY: tcpcump BGP packet handler
overflow |
HMC Ports
Ports |
Protocol |
Application name |
Description |
Enabled by default |
22 |
tcp |
ssh.name |
Allows remote secure shell access |
No |
443 9960 |
tcp |
SecureRemoteAccess.name |
Allow access to the HMC via remote web browser |
No |
5989 |
tcp |
pegasus.name |
Allows access to OpenPegasus Server |
Yes |
5988 9197 |
tcp |
CSM_SNIA.name |
SNIA CIM for Cluster System Management |
No |
657 |
tcp/udp |
RMC.name |
Allows access between HMC and partitions |
Yes |
9920 9900 |
tcp/udp |
FCS.name |
Allow HMC to HMC communication |
Yes |
9735 |
tcp |
vtty.name |
Allows remote virtual terminal access |
Yes |
2302 |
tcp |
vtty_proxy.name |
Allows remote virtual terminal access |
Yes |
2300 2301 |
tcp |
i5250.name |
5250 terminal access |
Yes |
123 |
udp |
ntp.name |
Network Time Protocol |
No |
1701 |
udp |
l2tp.name |
Allows the HMC to share its modem with an i5 OS partition |
Yes |
427 |
udp |
SLP.name |
Allows the HMC to receive and respond to Service Location Protocol service |
Yes |
12347 12348` |
udp |
RPD.name |
Allow group communication and aliveness UDP packets
produced by RSCT subsystems. This is required when forming an RSCT Peer
Domain across multiple HMCs. |
Yes |
8899 |
tcp |
hwserver.name |
Allow hardware servers between CSM and HMC, or between
HMCs to communicate. This is required for FNM to log errors and report to the
ELA master on HMC. RSCT Peer Domains must also be enabled for this to work
properly |
Yes |
162 |
tcp/udp |
snmptrap.name |
Receive Simple Network Management Protocol (SNMP) Trap
messages. |
No |
Incoming ping |
Echo-request:icmp |
ping.name |
Allow the HMC to respond to the ping network utility. |
Yes |
The chhmc command can be used to change the firewall settings for each of the application above.
Examples:
- To disable access to port 5989 for OpenPegasus on network interface eth0:
chhmc –c pegasus.name –s remove –a 0.0.0.0 –nm 0.0.0.0 –i eth0
- To enable access to port 123 for NTP on network interface eth0:
chhmc –c ntp.name –s add –a 0.0.0.0 –nm 0.0.0.0 –i eth0
Known
Issues in
Note: after
Licensed Internal Code has been updated in Step 1, the image is saved on the
HMC. The "disk" repository can then be used for subsequent updates in
Step 2.
Server
and Partition Management
Platform Management
Power Management
Service Management
1.
CCFW JVM activity
2.
Total HMC system
usage
3.
Individual process
usage
4.
Disk partition
utilization
Command
Line
•
The following commands
have been added to manage HMC file system disk space usage:
•
chhmcfs - frees up space in HMC file systems
•
lshmcfs - lists HMC file system disk space usage information
•
The following commands
have been added to configure and list the HMC object manager security setting:
•
chomsec - configures HMC object manager security
•
lsomsec - lists the HMC object manager security setting
•
A new command, rnvi,
has been added to enable HMC users to edit text files in a restricted mode.
•
The following commands
have been added to configure and list power management settings for a managed
system (POWER6 servers only):
•
chpwrmgmt - changes power management settings
•
lspwrmgmt - lists power management settings
•
The following commands
have been added to support partition mobility (POWER6 servers only):
•
lslparmigr - lists partition migration information
•
migrlpar - performs a partition migration operation
•
The following commands
have been enhanced to support partition mobility (POWER6 servers only): chsyscfg, lssyscfg, and mksyscfg.
•
The following commands
have been added to support Kerberos configuration on the HMC:
•
getfile - gets and deploys the Kerberos service key (keytab) file
on the HMC
•
rmfile - removes the Kerberos service key (keytab) file from the
HMC
•
The following commands have been enhanced to
support Kerberos configuration on the HMC and remote Kerberos
authentication: chhmc, lshmc,
chhmcusr, lshmcusr, and mkhmcusr.
•
The following commands have been enhanced to
support multiple shared processor pools (POWER6 servers only): chsyscfg, lssyscfg, mksyscfg,
chhwres, lshwres, and lslparutil.
•
The following commands
have been enhanced to support hardware discovery (POWER6 servers only): chsysstate and lshwres.
•
A new option has been
added to the chhmc command to set the SSH protocol version for the HMC
to use.
•
The chhmc and lshmc
commands have been enhanced to support enabling and disabling remote web
browser access to the HMC.
•
A new ‘s’ option has
been added to the getupgfiles command to allow secure FTP to be used to
transfer the upgrade files.
•
The lssyscfg -r sys
command has been changed. The sp_failover_enabled
and sp_failover_state attributes are no longer output unless the
-F option is specified on the command.
Now those attribute values will only be displayed if either the -F
option is specified with no attribute names, or if the sp_failover_enabled and
sp_failover_state attribute names are specified with the -F
option.
•
The -o noprobe option
for the mksysplan command has been deprecated. It has been replaced by the --noprobe
option. In addition, two new options for
inventory collection have been added to the mksysplan command: --nohwdisc and --noinvscout.
•
A new option has been
added to the sendfile command to allow the user to specify the name of
the file on the remote system.
•
A new option has been
added to the updlic command to synchronize Licensed Internal Code on
redundant service processors, and also on redundant Bulk Power Controllers.
•
Hardware Discovery
command line enhancements:
Licensed
Internal Code (LIC) update
o If all components are on the T side, the reject option is
grayed out in the GUI, and the "updlic -o j" command will give the
following error message:
o Likewise, if all components are on the P side, the accept
option is grayed out in the GUI, and the "updlic -o c" command will
give the following error message:
o If there is a mixture of components on the T and P sides,
the accept/reject operations can be peformed to the subset of components that
are on the correct side for the operation (i.e. those running on T side for
accept and those running on P side for reject).
In this situation, a message will be displayed to the user asking if they
wish to continue.
Scheduled Operations
Problem Analysis
Service Agent
Repair and Verify
Known
Issues in
The most significant
and the most noticeable change in the HMC for 7.310 is the move to a new
Web-based User Interface both locally and remote. This interface uses a tree style navigation
model providing hierarchical views of system resources and tasks using drill-down
and launch-in-context techniques to enable direct access to hardware resources
and task management capabilities. It
provides views of system resources and provides tasks for system
administration.
HMC 7.310 can manage
both Power5 and Power6 servers.
On Power6
servers the following new features/enhancements have been added.
Translation language packs are not available at this time.
will release the translation language
time. In the initial release there are some locale specific issues,
i.e., decimal
issues will be addressed
in the translation language
Known Issues:
Web Browser Requirements
Hardware Management Console web browser support requires
HTML 2.0, JavaScript™ 1.0, Java Virtual
cookie support in browsers that will connect to it.
Contact your
support personnel to
is configured with a Java
Virtual Machine. It is required that the
web browser uses the HTTP 1.1 protocol and if you are using a
proxy server,
the HTTP 1.1 protocol is enabled for
connections. Additionally, pop-ups must be enabled for all
Hardware Management Consoles
running with pop-ups disabled. The following browsers have
been tested:
.
Other Web Browser
Considerations
Session cookies need to be
enabled in order for ASMI to work when connected to HMC remotely. The asm proxy code
saves session information and uses it.
Using
Internet Explorer
1. Select Tools -> Internet Options
2. Select Privacy tab and select 'Advanced'.
3.
Check if 'Always allow session cookies'
4. If not
checked, check 'Override automatic cookie handling' and check 'Always allow
session cookies'
5. You can
choose how you want to handle First-party Cookies and Third-party Cookies,
block or prompt or accept. (prompt is preferred in which case you will be prompted every
time a site tries to write cookies. It
may be a little annoying, but it is the safe thing to do. Some sites need to be allowed to write
cookies)
Using Firefox
1. Tools -> Options
2.
Select Cookies Tab
3. Select
check box Allow sites to set cookies.
4. If you
want to allow only specific sites then select 'Exceptions' and then you can
just add this HMC to allow.
Other
Issues
Configuration rules:
1.
The maximum Virtual I/O Slot Number
should be set to (at least) 10 plus the number of virtual I/O slots desired by
the customer.
Note that setting the maximum
higher is OK, the danger is setting it too low. Setting it below 10 will cause a
compatibility issue with newer levels of HMC code. Excess virtual slots use a small amount of
additional memory, but otherwise have no impact.
2.
All customer virtual I/O slots (virtual SCSI, virtual Ethernet or
virtual serial) must use virtual slot IDs 11 or greater.
3. The VASI adapter (used by the
Licenced Internal Code (
CAN-2003-0989 |
tcpdump
remote DOS |
CAN-2003-0190 |
OpenSSH:
info leak issue |
CAN-2004-0078 |
mutt
remote buffer overflow |
CAN-2004-0110 |
libxml2
URI Parsing Remote Buffer Overflow |
CAN-2004-0109 |
Kernel
ISO9660/JFS local privilege escalation, info leak |
CAN-2004-0183 |
tcpdump
ISAKMP remote DOS |
CA-2005-35 |
SSH Protocol 1 Weakness and Vulnerability |
CAN-2004-0427
|
Kernel
privilege escalation, local DoS |
CAN-2004-0554 |
Kernel "__clear_fpu()"
Macro local DoS |
CAN-2004-0523 |
kerberos
aname_to_localname remote root compromise |
CVE-2004-0493 |
Input Header Memory Allocation Denial of Service |
CVE-2004-0488 |
Apache mod_ssl FakeBasicAuth Buffer overflow |
CVE-2004-0747
CVE-2004-0748
CVE-2004-0751
CVE-2004-0786
CVE-2004-0809
|
Apache 2 Multiple Denial of Service |
CVE-2004-0942 |
Apache MIME Header Memory Consumption |
CAN-2004-0460 |
dhcp-server:
remote system compromise |
CVE-2002-1363 |
libpng
remote DoS |
CAN-2004-0590 |
Certificate
chain authentication in Openswan pluto |
CAN-2004-0649 |
L2tpd:
remote execution of arbitrary files w/ privs of l2tpd user |
VU#388984 |
libpng:
multiple vulnerabilities |
CAN-2004-0415
|
Kernel:
local privilege escalation, race condition in file offset pointer handling |
VU#550464
|
krb5:
remote unauthenticated DoS |
CAN-2004-0817 |
imlib:
local execution via heap overflow |
CAN-2004-0687 |
xf86:
multiple buffer overflows with malformed xpm images |
CAN-2004-0966 |
gettext:
Insecure temporary file handling |
CAN-2004-0804 |
tiff:
Buffer overflows in image decoding |
CAN-2004-0884
|
Cyrus-sasl2:
(ver 2.1.7) Insecure handling of environment variable |
CAN-2004-0971 |
krb5:
krb5-workstation: Possible symlink attack, priv escalation via temproary file
mishandling |
CAN-2004-0989 |
libxml:
remote code execution, buffer overflow |
CVE-2004-0079 |
Openssl vulnerability |
CAN-2004-0975 |
Openssl:
possible symlink attack via temp file mishandling |
SUSE-SA:2004:041 |
xf86:
SuSE security updates for libxpm |
CAN-2004-0782 |
imlib:
xpm security updates in imlib |
CAN-2004-1010 |
zip:
buffer overflow in info-zip when using recursive folder compression |
CAN-2004-1308 |
tiff:
multiple buffer overflows |
CAN-2004-0986 |
iptables:
variable init failure can cause failure to load firewall rules |
CAN-2004-0883 |
Kernel
update for multiple local and remote DoS vulnerabilities |
CAN-2004-0079 CAN-2004-0112 |
OpenSSL
remote DOS |
CVE-2006-2937 CVE-2006-2940 CVE-2006-2969 CVE-2006-3738 CVE-2006-4339 CVE-2006-4343 |
OpenSSL vulnerability |
CAN-2005-0155
|
Perl:
Security update to address two priv escalation and a buffer overflow
condition |
CAN-2005-0449
|
Updates
for multiple issues on 2.4-2.6.11 kernels |
CAN-2005-1993 |
sudo:
vulnerabilities allow execution of arbitrary commands |
CAN-2005-1267 |
tcpdump:
fix for several DOS vulnerabilities |
CAN-2005-1151
|
tiff:
buffer overflow allows execution of arbitrary code |
CAN-2005-0109 |
OpenSSL
update |
CAN-2005-2969 |
OpenSSL
fix for potential SSL 2.0 Rollback vulnerability |
CVE-2001-0572 |
SSHv1
Protocol Available |
CVE-2004-0175 |
OpenSSH
SCP Client File Corruption Vulnerability |
CVE-2006-0225 |
OpenSSH
scp remote attack vulnerability |
CVE-2006-4924 CVE-2006-4925 |
Open SSH vulnerability |
CVE-2006-5051 |
Open SSH vulnerability not applicable to HMC due to GSSAPI being disabled |
CVE-2006-5794 |
Open SSH vulnerability |
CVE-2006-0058 |
Sendmail
remote code execution |
CVE-2006-1721 |
Cyrus-sasl
remote denial of service |
CVE-2006-2024 CVE-2006-2025 CVE-2006-2026 |
Libtiff:
various denial of service attacks |
CVE-2005-3352 CVE-2005-3357 |
Apache2
cross site scripting in mod_imap and mod_ssl |
CVE-2006-0455 |
Gpg
remote execution by signature checking |
CVE-2005-3353 CVE-2005-3389 CVE-2005-3390 CVE-2005-3391 CVE-2005-3392 CVE-2005-3883 |
Multiple
vulnerabilities in php4 |
CVE-2005-2970 |
Apache2
worker memory leak |
CVE-2005-2974 CVE-2005-3350 |
Libungif
denial of service attack/buffer overflow |
CVE-2005-2959 |
Sudo
environment cleaning privilege escalation vulnerability |
CAN-2005-2491 |
PCRE:
Integer overflow vulnerability |
CVE-2005-3119 CVE-2005-3179 CVE-2005-3180 CVE-2005-3181 |
Kernel
potential denial of service and information disclosure |
CAN-2005-2797 CAN-2005-2798 |
OpenSSH:
fixes to prevent escalation of privileges and bypass certain security
restrictions |
CVE-2005-2876 |
Util-linux
umount “-r” Re-Mounting security issue |
CAN-2005-2495 |
Xf86:
Fix remote command execution |
CAN-2005-2491 CAN-2005-2700 CAN-2005-2728 |
Apache2:
Security fixes |
CAN-2005-1761 CAN-2005-1768 CAN-2005-2500 |
Kernel:
Various Security Fixes |
CAN-2005-2452 |
Tiff:
Vulnerability allows DOS attack due to divide by zero error |
CAN-2005-2177 |
Net-snmp
remote attack vulnerability |
CAN-2005-0448 |
Perl
vulnerabilities |
CAN-2005-0758 CAN-2005-0988 CAN-2005-1228 CAN-2005-1260 CAN-2005-0953 |
Bzip2
vulnerability |
CAN-2004-1189 |
Krb5
multiple security issues |
CAN-2005-1849 CAN-2005-2096 |
Zlib
buffer overflow |
CAN-2005-2088 CAN-2005-1268 |
Apache2:
fix for multiple vulnerabilities |
CVE-2005-2970 |
Apache2: memory leak |
CVE-2005-3357 |
Apache2 Cryptographic problem |
CVE-2006-3747 |
Apache2: Off-by-one error in the ldap scheme handling in the Rewrite module |
CVE-2006-3918 |
Apache2 vulnerability |
CVE-2005-2728 |
|
CAN-2004-1453 CAN-2004-0968 CAN-2004-1382 |
Glibc:
Infoleak and symlink attack vulnerabilities |
CAN-2005-1111 CAN-2005-1229 |
Cpio
directory traversal and privilege escalation |
CAN-2005-0605 |
Xf86:
libXPM integer overflow |
CAN-2004-0970 |
Gzip:
temporary file mishandling |
CAN-2005-0160 CAN-2005-0161 CAN-2005-0961 |
telnet:
ENV buffer overflow |
CAN-2005-1704 |
Binutils
vulnerabilities |
CAN-2005-1993 |
Sudo:
race condition |
CAN-2005-0373 |
Cyrus-sasl,
cyrus-sasl2 remote code execution |
CVE-2005-0916 CVE-2005-2456 CVE-2005-2457 CVE-2005-2458 CVE-2005-2555 CVE-2006-0554 CVE-2006-0555 CVE-2006-0557 CVE-2006-0744 CVE-2006-1055 CVE-2006-1056 CVE-2006-1242 CVE-2006-1523 CVE-2006-1524 CVE-2006-1525 CVE-2006-1527 CVE-2006-1528 CVE-2006-1857 CVE-2006-1858 CVE-2006-1863 CVE-2006-1864 CVE-2006-2271 CVE-2006-2272 CVE-2006-2274 CVE-2006-2444 CVE-2006-2448 CVE-2006-2451 CVE-2006-2934 CVE-2006-2935 CVE-2006-3085 CVE-2005-3180 CVE-2006-3468 CVE-2006-3626 CVE-2006-3745 CVE-2006-4093 CVE-2006-4145 CVE-2006-4813 CVE-2006-4997 CVE-2006-5757 CVE-2006-5823 CVE-2006-6053 CVE-2006-2274 CVE-2006-2444 CVE-2006-2448 CVE-2006-2451 CVE-2006-2934 CVE-2006-2935 CVE-2006-3085 CVE-2005-3180 CVE-2006-3468 CVE-2006-3626 CVE-2006-3745 CVE-2006-4093 CVE-2006-4145 CVE-2006-4813 CVE-2006-4997 CVE-2006-5757 CVE-2006-5823 CVE-2006-6053 |
Kernel Vulnerabilities
|