|
---|
Release type: | Patch |
Release date: | 2019-11-05 |
OS update support: | None |
Technote: | None |
Documentation: | None |
Popularity: | 1260 viewed downloaded |
Download size: | 62.47 MB |
Checksum: | 2063938580 |
Application HA 6.2 On RHEL7 x86-64
Cluster Server 6.2 On RHEL7 x86-64 Storage Foundation Cluster File System 6.2 On RHEL7 x86-64 Storage Foundation for Oracle RAC 6.2 On RHEL7 x86-64 Storage Foundation HA 6.2 On RHEL7 x86-64 |
None.
|
3982203
|
VRTSvcs-6.2.1.1100-RHEL7
|
* * * READ ME * * * * * * Symantec Cluster Server 6.2.1 * * * * * * Patch 1100 * * * Patch Date: 2019-08-26 This document provides the following information: * PATCH NAME * OPERATING SYSTEMS SUPPORTED BY THE PATCH * PACKAGES AFFECTED BY THE PATCH * BASE PRODUCT VERSIONS FOR THE PATCH * SUMMARY OF INCIDENTS FIXED BY THE PATCH * DETAILS OF INCIDENTS FIXED BY THE PATCH * INSTALLATION PRE-REQUISITES * INSTALLING THE PATCH * REMOVING THE PATCH PATCH NAME ---------- Symantec Cluster Server 6.2.1 Patch 1100 OPERATING SYSTEMS SUPPORTED BY THE PATCH ---------------------------------------- RHEL7 x86-64 PACKAGES AFFECTED BY THE PATCH ------------------------------ VRTSvcs BASE PRODUCT VERSIONS FOR THE PATCH ----------------------------------- * Symantec Application HA 6.2 * Symantec Cluster Server 6.2 * Symantec Storage Foundation Cluster File System HA 6.2 * Symantec Storage Foundation for Oracle RAC 6.2 * Symantec Storage Foundation HA 6.2 SUMMARY OF INCIDENTS FIXED BY THE PATCH --------------------------------------- Patch ID: 6.2.1.1100 * 3982203 (3981992) A potentially critical security vulnerability in VCS needs to be addressed. DETAILS OF INCIDENTS FIXED BY THE PATCH --------------------------------------- This patch fixes the following incidents: Patch ID: 6.2.1.1100 * 3982203 (Tracking ID: 3981992) SYMPTOM: A potentially critical security vulnerability in VCS needs to be addressed. DESCRIPTION: A potentially critical security vulnerability in VCS needs to be addressed. RESOLUTION: This hotfix addresses the security vulnerability. For details, refer to the security advisory at: https://www.veritas.com/content/support/en_US/security/VTS19-003.html INSTALLING THE PATCH -------------------- Run the Installer script to automatically install the patch: ----------------------------------------------------------- Please be noted that the installation of this P-Patch will cause downtime. To install the patch perform the following steps on at least one node in the cluster: 1. Copy the patch vcs-rhel7_x86_64-Patch-6.2.1.1100.tar.gz to /tmp 2. Untar vcs-rhel7_x86_64-Patch-6.2.1.1100.tar.gz to /tmp/hf # mkdir /tmp/hf # cd /tmp/hf # gunzip /tmp/vcs-rhel7_x86_64-Patch-6.2.1.1100.tar.gz # tar xf /tmp/vcs-rhel7_x86_64-Patch-6.2.1.1100.tar 3. Install the hotfix(Please be noted that the installation of this P-Patch will cause downtime.) # pwd /tmp/hf # ./installVRTSvcs621P11 [<host1> <host2>...] You can also install this patch together with 6.2.1 maintenance release using Install Bundles 1. Download this patch and extract it to a directory 2. Change to the Veritas InfoScale 6.2.1 directory and invoke the installmr script with -patch_path option where -patch_path should point to the patch directory # ./installmr -patch_path [<path to this patch>] [<host1> <host2>...] Install the patch manually: -------------------------- To install the patch perform the following steps on all nodes in the VCS cluster: 1. Stop VCS on the cluster node. 2. Install the patch. 3. Restart VCS on the node. Stopping VCS on the cluster node -------------------------------- To stop VCS on the cluster node: 1. Ensure that the "/opt/VRTSvcs/bin" directory is included in your PATH environment variable so that you can execute all the VCS commands. For more information, refer to the Veritas Cluster Server Installation Guide. 2. Persistently freeze all the service groups: # haconf -makerw # hagrp -freeze [group] -persistent # haconf -dump -makero 3. Stop the cluster on all nodes. If the cluster is writable, you may close the configuration before stopping the cluster. On any node, run the following command to stop the cluster: # hastop -all -force 4. Verify that the cluster is stopped on all nodes: # hasys -state 5. On all nodes, make sure that both the had and hashadow processes are stopped. 6. Stop the VCS CmdServer on all nodes: # /opt/VRTSvcs/bin/CmdServer -stop 7. Copy the /etc/VRTSvcs/conf/config/types.cf file to /etc/VRTSvcs/conf/config/types.cf.orig. 8. Copy the /etc/VRTSvcs/conf/config/main.cf file to /etc/VRTSvcs/conf/config/main.cf.orig. Installing the patch -------------------- To install the patch: 1. Log in as superuser on the system where you are installing the patch. 2. Uncompress the patch that you downloaded from Veritas. 3. Change the directory to the uncompressed patch location. 4. Install the patch using the following command: # rpm -Uvh VRTSvcs-6.2.1.1100-RHEL7.i686.rpm 5. Run the following command to verify if the new patch has been installed: # rpm -q VRTSvcs If the proper patch is installed, the following output is displayed: VRTSvcs-6.2.1.1100-RHEL7.i686 6. Run the following command to load updated scripts # systemctl daemon-reload Starting VCS on the cluster node: 1. To start VCS run the following command: # hastart # /opt/VRTSvcs/bin/CmdServer 2. Make VCS cluster writable: # haconf -makerw 3. Unfreeze all the groups: # hagrp -unfreeze [group] -persistent # haconf -dump -makero REMOVING THE PATCH ------------------ Removal of the patch will result in removing the whole package from the system/node. To go back to a previous installed version of the package, you may need to re-install the package. Run the following steps on the node where the patch is being uninstalled: To remove the patch from a cluster node: --------------------------------------------- 1. Freeze all the service groups persistently. # haconf -makerw # hagrp -freeze [group] -persistent 2. Stop VCS on the node by running the following command: # hastop -all -force 3. Stop the VCS CmdServer #/opt/VRTSvcs/bin/CmdServer -stop 4. Remove the patch by using the following command: # rpm -e VRTSvcs 5. Verify that the patch has been removed from the system: # rpm -qa|grep VRTSvcs Ensure that the package is not be displayed. This confirms that the package is removed. 6. Install the relevant package from the VCS base media. Also refer to SORT for any applicable patches. 7. To start the cluster service, run the following command first on one node: # hastart On all the other nodes, start VCS by issuing the hastart command after the first node's state changes to LOCAL_BUILD or RUNNING. 8. Unfreeze all the service groups: # haconf -makerw # hagrp -unfreeze [group] -persistent # haconf -dump -makero 9. Start the VCS CmdServer on all nodes # /opt/VRTSvcs/bin/CmdServer SPECIAL INSTRUCTIONS -------------------- NONE OTHERS ------ NONE |
1995 - 2023 Veritas Technologies LLC
Why Register?
Get notifications about ASLs/APMs, HCLs, patches, and high availability agents
As a registered user, you can create notifications to receive updates about NetBackup Future Platform and Feature Plans, NetBackup hot fixes/EEBs in released versions, Array Support Libraries (ASLs)/Array Policy Modules (APMs), hardware compatibility lists (HCLs), patches and high availability agents. In addition, you can create system-specific notifications customized to your environment.
Compare configurations
The Compare Configurations feature lets you compare different system scans by the data collector. When you sign in, you can choose a target system, compare reports run at different times, and easily see how the system's configuration has changed.
Save configurations
After logging in, you can retrieve past reports, share reports with colleagues, review notifications you received, and retain custom settings. Anonymous users cannot access these features.
Bulk uploader
As a registered user,you can upload multiple reports, using the Bulk Uploader.