* * * READ ME * * * * * * Symantec Cluster Server 6.2.1 * * * * * * Patch 1100 * * * Patch Date: 2019-08-26 This document provides the following information: * PATCH NAME * OPERATING SYSTEMS SUPPORTED BY THE PATCH * PACKAGES AFFECTED BY THE PATCH * BASE PRODUCT VERSIONS FOR THE PATCH * SUMMARY OF INCIDENTS FIXED BY THE PATCH * DETAILS OF INCIDENTS FIXED BY THE PATCH * INSTALLATION PRE-REQUISITES * INSTALLING THE PATCH * REMOVING THE PATCH PATCH NAME ---------- Symantec Cluster Server 6.2.1 Patch 1100 OPERATING SYSTEMS SUPPORTED BY THE PATCH ---------------------------------------- Solaris 10 SPARC PACKAGES AFFECTED BY THE PATCH ------------------------------ Host key verification failed. VRTSvcs BASE PRODUCT VERSIONS FOR THE PATCH ----------------------------------- * Symantec Application HA 6.2 * Symantec Cluster Server 6.2 * Symantec Storage Foundation Cluster File System HA 6.2 * Symantec Storage Foundation for Oracle RAC 6.2 * Symantec Storage Foundation HA 6.2 SUMMARY OF INCIDENTS FIXED BY THE PATCH --------------------------------------- Patch ID: 6.2.1.1100 * 3982203 (3981992) A potentially critical security vulnerability in VCS needs to be addressed. DETAILS OF INCIDENTS FIXED BY THE PATCH --------------------------------------- This patch fixes the following incidents: Patch ID: 6.2.1.1100 * 3982203 (Tracking ID: 3981992) SYMPTOM: A potentially critical security vulnerability in VCS needs to be addressed. DESCRIPTION: A potentially critical security vulnerability in VCS needs to be addressed. RESOLUTION: This hotfix addresses the security vulnerability. For details, refer to the security advisory at: https://www.veritas.com/content/support/en_US/security/VTS19-003.html INSTALLING THE PATCH -------------------- Run the Installer script to automatically install the patch: ----------------------------------------------------------- Please be noted that the installation of this P-Patch will cause downtime. To install the patch perform the following steps on at least one node in the cluster: 1. Copy the patch vcs-sol10_sparc-Patch-6.2.1.1100.tar.gz to /tmp 2. Untar vcs-sol10_sparc-Patch-6.2.1.1100.tar.gz to /tmp/hf # mkdir /tmp/hf # cd /tmp/hf # gunzip /tmp/vcs-sol10_sparc-Patch-6.2.1.1100.tar.gz # tar xf /tmp/vcs-sol10_sparc-Patch-6.2.1.1100.tar 3. Install the hotfix(Please be noted that the installation of this P-Patch will cause downtime.) # pwd /tmp/hf # ./installVRTSvcs621P11 [ ...] You can also install this patch together with 6.2.1 maintenance release using Install Bundles 1. Download this patch and extract it to a directory 2. Change to the Veritas InfoScale 6.2.1 directory and invoke the installmr script with -patch_path option where -patch_path should point to the patch directory # ./installmr -patch_path [] [ ...] Install the patch manually: -------------------------- To apply the patch manually, perform the steps listed below on each node. Ensure that the "/opt/VRTS/bin" directory is included in your PATH environment variable. 1. Stop VCS: # haconf -dump -makero # hastop -local -force 2. Stop the VCS CmdServer #/opt/VRTSvcs/bin/CmdServer -stop 3. Copy the /etc/VRTSvcs/conf/config/types.cf file to /etc/VRTSvcs/conf/config/types.cf.orig as a backup. 4. Copy the /etc/VRTSvcs/conf/config/main.cf file to /etc/VRTSvcs/conf/config/main.cf.orig as a backup. 5. Change to the directory where the patch is located and install the patch using the commands shown below: # cd /patches # patchadd 152790-01 6. Verify that the new patch is installed by executing the command below and confirm the output displayed matches the text which follows. Example # showrev -p | grep 152790-01 Output: Patch: 152790-01 Obsoletes: Requires: Incompatibles: Packages: VRTSvcsag 7. Start VCS: # hastart 8. Start CmdServer # /opt/VRTSvcs/bin/CmdServer REMOVING THE PATCH ------------------ Run the Uninstaller script to automatically remove the patch: ------------------------------------------------------------ To uninstall the patch perform the following step on at least one node in the cluster: # /opt/VRTS/install/uninstallVRTSvcs621P11 [ ...] Remove the patch manually: ------------------------- Run the following steps on all the nodes in the VCS cluster. 1. Stop VCS: # haconf -dump -makero # hastop -local -force 2. Stop the VCS CmdServer #/opt/VRTSvcs/bin/CmdServer -stop 3. Uninstall the patch: # patchrm 152790-01 4. Verify that the patch is uninstalled from the node: # showrev -p | grep 152790-01 If the patch was successfully uninstalled, there will be no output. 5. Restart VCS: # hastart SPECIAL INSTRUCTIONS -------------------- --------------------- If a local zone is in 'configured' state while the VRTSvcsag package is being updated, then the package is not updated in local zone. To update packages inside a local zone, execute the below command (repeat per zone as needed): # zoneadm -z attach -u OTHERS ------ NONE