This page lists publically-released patches for Veritas Enterprise Products.
For Product GA build, see Veritas Entitlement Management System(VEMS) by clicking the Veritas Support 'Licensing' option.
For information on private patches, contact Veritas Technical Support.
Veritas is making it easier to find all software installers and updates for Veritas products with a completely redesigned experience. NetBackup HotFixes and NetBackup Appliance patches are now also available at the new Veritas Download Center.
Patches for your product can have a variety of names. These names are based on product, component, or package names. For more information on patch naming conventions and the relationship between products, components, and packages, see the SORT online help.
cpi-Patch-7.0.1.500
Sign in if you want to rate this patch.

 Basic information
Release type: Patch
Release date: 2016-11-01
OS update support: None
Technote: None
Documentation: None
Popularity: 656 viewed    167 downloaded
Download size: 12.34 KB
Checksum: 487558308

 Applies to one or more of the following products:
InfoScale Availability 7.0 On AIX 6.1
InfoScale Availability 7.0 On AIX 7.1
InfoScale Availability 7.0 On RHEL6 x86-64
InfoScale Availability 7.0 On RHEL7 x86-64
InfoScale Availability 7.0 On SLES11 x86-64
InfoScale Availability 7.0 On SLES12 x86-64
InfoScale Availability 7.0 On Solaris 10 SPARC
InfoScale Availability 7.0 On Solaris 11 SPARC
InfoScale Availability 7.0 On Solaris 11 X64
InfoScale Enterprise 7.0 On AIX 6.1
InfoScale Enterprise 7.0 On AIX 7.1
InfoScale Enterprise 7.0 On RHEL6 x86-64
InfoScale Enterprise 7.0 On RHEL7 x86-64
InfoScale Enterprise 7.0 On SLES11 x86-64
InfoScale Enterprise 7.0 On SLES12 x86-64
InfoScale Enterprise 7.0 On Solaris 10 SPARC
InfoScale Enterprise 7.0 On Solaris 11 SPARC
InfoScale Enterprise 7.0 On Solaris 11 X64
InfoScale Foundation 7.0 On AIX 6.1
InfoScale Foundation 7.0 On AIX 7.1
InfoScale Foundation 7.0 On RHEL6 x86-64
InfoScale Foundation 7.0 On RHEL7 x86-64
InfoScale Foundation 7.0 On SLES11 x86-64
InfoScale Foundation 7.0 On SLES12 x86-64
InfoScale Foundation 7.0 On Solaris 10 SPARC
InfoScale Foundation 7.0 On Solaris 11 SPARC
InfoScale Foundation 7.0 On Solaris 11 X64
InfoScale Storage 7.0 On AIX 6.1
InfoScale Storage 7.0 On AIX 7.1
InfoScale Storage 7.0 On RHEL6 x86-64
InfoScale Storage 7.0 On RHEL7 x86-64
InfoScale Storage 7.0 On SLES11 x86-64
InfoScale Storage 7.0 On SLES12 x86-64
InfoScale Storage 7.0 On Solaris 10 SPARC
InfoScale Storage 7.0 On Solaris 11 SPARC
InfoScale Storage 7.0 On Solaris 11 X64

 Obsolete patches, incompatibilities, superseded patches, or other requirements:

This patch supersedes the following patches: Release date
cpi-Patch-7.0.1.400 (obsolete) 2016-06-06
cpi-Patch-7.0.1.300 (obsolete) 2016-05-19
cpi-Patch-7.0.1.200 (obsolete) 2016-02-05
cpi-Patch-7.0.1.100 (obsolete) 2016-01-25

 Fixes the following incidents:
3865899, 3866781, 3878735, 3880941, 3895711

 Patch ID:
None.

 Readme file  [Save As...]
                          * * * READ ME * * *
                         * * * CPI 7.0.1 * * *
                         * * * Patch 500 * * *
                         Patch Date: 2016-11-01


This document provides the following information:

   * PATCH NAME
   * OPERATING SYSTEMS SUPPORTED BY THE PATCH
   * PACKAGES AFFECTED BY THE PATCH
   * BASE PRODUCT VERSIONS FOR THE PATCH
   * SUMMARY OF INCIDENTS FIXED BY THE PATCH
   * DETAILS OF INCIDENTS FIXED BY THE PATCH
   * INSTALLATION PRE-REQUISITES
   * INSTALLING THE PATCH
   * REMOVING THE PATCH


PATCH NAME
----------
CPI 7.0.1 Patch 500


OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
AIX
RHEL6 x86-64
RHEL7 x86-64
SLES11 x86-64
SLES12 x86-64
Solaris 10 SPARC
Solaris 11 SPARC



BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
   * InfoScale Availability 7.0
   * InfoScale Enterprise 7.0
   * InfoScale Foundation 7.0
   * InfoScale Storage 7.0


SUMMARY OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
Patch ID: 7.0.1.500
* 3865899 (3866180) The installer fails to configure I/O fencing.
* 3866781 (3867243) After configuring CP based fencing, VxFEN fails to start.
* 3878735 (3879593) Veritas product installation fails for the new operating system (OS) update
version since the installer cannot validate the correct version of dependency
Operating System (OS) rpms for the new OS update.
* 3880941 (3875921) The installer does not install VRTSaslapm when you install InfoScale 
Enterprise on a new OS update version.
* 3895711 (3895368) The installer blocks the installation when you install an InfoScale product on the 
Linux platform with an unqualified Linux kernel.


DETAILS OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
This patch fixes the following incidents:

Patch ID: 7.0.1.500

* 3865899 (Tracking ID: 3866180)

SYMPTOM:
After fencing is configured, VxFEN fails to start.

DESCRIPTION:
VxFEN fails to start if the installer uses the openssl command installed with 
OS, because the version of the openssl command is not latest enough to support 
the -sha256 option. As a result, the openssl command fails to generate the csr 
file. The fencing fails to start because of the csr file missing.

RESOLUTION:
The installer is modified to use the openssl command shipped with the VRTSperl 
package.

* 3866781 (Tracking ID: 3867243)

SYMPTOM:
After configuring CP based fencing, VxFEN fails to start.

DESCRIPTION:
On CP client side, the installer uses the openssl command shipped with VRTSperl. On 
CP server 
side, the installer still uses the openssl command installed with OS if the OS 
platforms of 
the CP client side and the CP server side are different. 
The version of the openssl command installed with OS may not be latest enough to 
support the 
-sha256 option, which is used on the server side when the installer sets up HTTPS 
trust 
between CP server and CP client. In this case, the openssl command fails to generate 
the csr 
file, causing the VxFEN to fail to start.

RESOLUTION:
The code is modified to use the openssl command shipped with the VRTSperl package on 
both the 
CP client side and the CP server side.

* 3878735 (Tracking ID: 3879593)

SYMPTOM:
Veritas product installation failed for the new OS update version.

DESCRIPTION:
During installation, the installer verifies the dependency rpms of OS for the
product. For the new OS update version, there is no defined
or set dependency rpms value. Hence, the product installation fails or the
installer displays incorrect versions of OS rpms.

RESOLUTION:
Set a default dependency OS rpms for each platform (RHEL6, RHEL7, SLES11, and
SLES12) and for each release. Remove the specific version for each rpm, just
keep the rpm name and architecture type, like: glibc.x86_64.

* 3880941 (Tracking ID: 3875921)

SYMPTOM:
VRTSaslapm is not installed when you install InfoScale Enterprise on a new OS update version.

DESCRIPTION:
The installer defines VRTSaslapm as a patch, although VRTSaslapm is a package. 
When you install InfoScale Enterprise, the installer downloads the must-have 
patch for the new OS update automatically. But since the patch installer 
defines VRTSaslapm as a patch, it does not install VRTSaslapm.

RESOLUTION:
Set VRTSaslapm as a package and add it to the list of packages that need to be 
installed.

* 3895711 (Tracking ID: 3895368)

SYMPTOM:
The installer blocks the installation when you install an InfoScale product on the 
Linux platform with an unqualified Linux kernel.

DESCRIPTION:
If you attempt to install an InfoScale product on the Linux platform with an 
unqualified Linux kernel, the installer blocks the installation. But it is not 
necessary for the intaller to block the installation, it should just give a warning.

RESOLUTION:
The installer gives a warning message when you attempt to install an InfoScale 
product on the Linux platform with an unqualified Linux kernel.



INSTALLING THE PATCH
--------------------
1. Copy the hot-fix CPI_7.0.1_P5.pl to /tmp
2. Run installation scripts with the hot-fix
Example:
./installer -require /tmp/CPI_7.0.1_P5.pl


REMOVING THE PATCH
------------------
NONE


SPECIAL INSTRUCTIONS
--------------------
NONE


OTHERS
------
NONE



Read and accept Terms of Service