This page lists publically-released patches for Veritas Enterprise Products.
For Product GA build, see Veritas Entitlement Management System(VEMS) by clicking the Veritas Support 'Licensing' option.
For information on private patches, contact Veritas Technical Support.
Veritas is making it easier to find all software installers and updates for Veritas products with a completely redesigned experience. NetBackup HotFixes and NetBackup Appliance patches are now also available at the new Veritas Download Center.
Patches for your product can have a variety of names. These names are based on product, component, or package names. For more information on patch naming conventions and the relationship between products, components, and packages, see the SORT online help.
vcs-sles11_x86_64-Patch-6.2.1.1100
Sign in if you want to rate this patch.

 Basic information
Release type: Patch
Release date: 2019-11-05
OS update support: None
Technote: None
Documentation: None
Popularity: 10 viewed    0 downloaded
Download size: 69.79 MB
Checksum: 784048680

 Applies to one or more of the following products:
Application HA 6.2 On SLES11 x86-64
Cluster Server 6.2 On SLES11 x86-64
Storage Foundation Cluster File System 6.2 On SLES11 x86-64
Storage Foundation for Oracle RAC 6.2 On SLES11 x86-64
Storage Foundation HA 6.2 On SLES11 x86-64

 Obsolete patches, incompatibilities, superseded patches, or other requirements:
None.

 Fixes the following incidents:
3982203

 Patch ID:
VRTSvcs-6.2.1.1100-SLES11

 Readme file  [Save As...]
                          * * * READ ME * * *
               * * * Symantec Cluster Server 6.2.1 * * *
                         * * * Patch 1100 * * *
                         Patch Date: 2019-08-26


This document provides the following information:

   * PATCH NAME
   * OPERATING SYSTEMS SUPPORTED BY THE PATCH
   * PACKAGES AFFECTED BY THE PATCH
   * BASE PRODUCT VERSIONS FOR THE PATCH
   * SUMMARY OF INCIDENTS FIXED BY THE PATCH
   * DETAILS OF INCIDENTS FIXED BY THE PATCH
   * INSTALLATION PRE-REQUISITES
   * INSTALLING THE PATCH
   * REMOVING THE PATCH


PATCH NAME
----------
Symantec Cluster Server 6.2.1 Patch 1100


OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
SLES11 x86-64


PACKAGES AFFECTED BY THE PATCH
------------------------------
VRTSvcs


BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
   * Symantec Application HA 6.2
   * Symantec Cluster Server 6.2
   * Symantec Storage Foundation Cluster File System HA 6.2
   * Symantec Storage Foundation for Oracle RAC 6.2
   * Symantec Storage Foundation HA 6.2


SUMMARY OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
Patch ID: 6.2.1.1100
* 3982203 (3981992) A potentially critical security vulnerability in VCS needs to be addressed.


DETAILS OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
This patch fixes the following incidents:

Patch ID: 6.2.1.1100

* 3982203 (Tracking ID: 3981992)

SYMPTOM:
A potentially critical security vulnerability in VCS needs to be addressed.

DESCRIPTION:
A potentially critical security vulnerability in VCS needs to be addressed.

RESOLUTION:
This hotfix addresses the security vulnerability. For details, refer to the security advisory at: https://www.veritas.com/content/support/en_US/security/VTS19-003.html



INSTALLING THE PATCH
--------------------
Run the Installer script to automatically install the patch:
-----------------------------------------------------------
Please be noted that the installation of this P-Patch will cause downtime.

To install the patch perform the following steps on at least one node in the cluster:
1. Copy the patch vcs-sles11_x86_64-Patch-6.2.1.1100.tar.gz to /tmp
2. Untar vcs-sles11_x86_64-Patch-6.2.1.1100.tar.gz to /tmp/hf
    # mkdir /tmp/hf
    # cd /tmp/hf
    # gunzip /tmp/vcs-sles11_x86_64-Patch-6.2.1.1100.tar.gz
    # tar xf /tmp/vcs-sles11_x86_64-Patch-6.2.1.1100.tar
3. Install the hotfix(Please be noted that the installation of this P-Patch will cause downtime.)
    # pwd /tmp/hf
    # ./installVRTSvcs621P11 [<host1> <host2>...]

You can also install this patch together with 6.2.1 maintenance release using Install Bundles
1. Download this patch and extract it to a directory
2. Change to the Veritas InfoScale 6.2.1 directory and invoke the installmr script
   with -patch_path option where -patch_path should point to the patch directory
    # ./installmr -patch_path [<path to this patch>] [<host1> <host2>...]

Install the patch manually:
--------------------------
To install the patch perform the following steps on all nodes in theVCS cluster:
1. Stop VCS on the cluster node.
2. Install the patch.
3. Restart VCS on the node.
Stopping VCS on the cluster node
--------------------------------
To stop VCS on the cluster node:
1. Ensure that the "/opt/VRTSvcs/bin" directory is included in your PATH environment variable so that you can execute all the VCS commands. For more information, refer to the Veritas Cluster Server Installation Guide.
2. Verify that the base version of VRTSvcs is 7.3.1.
3. Persistently freeze all the service groups:
   # haconf -makerw
   # hagrp -freeze [group] -persistent
   # haconf -dump -makero
4. Stop the cluster on all nodes. If the cluster is writable, you may close the configuration before stopping the cluster.
   On any node, run the following command to stop the cluster:
   # hastop -all -force
5. Verify that the cluster is stopped on all nodes: 
   # hasys -state
6. On all nodes, make sure that both the had and hashadow processes are stopped. 
7. Stop the VCS CmdServer on all nodes:
   # /opt/VRTSvcs/bin/CmdServer -stop
8. Copy the /etc/VRTSvcs/conf/config/types.cf file to 
   /etc/VRTSvcs/conf/config/types.cf.orig.
9. Copy the /etc/VRTSvcs/conf/config/main.cf file to 
   /etc/VRTSvcs/conf/config/main.cf.orig.
Installing the patch
--------------------
To install the patch:
1. Log in as superuser on the system where you are installing the patch.
2. Uncompress the patch that you downloaded from Veritas.
3. Change the directory to the uncompressed patch location.
4. Install the patch: 
   # rpm -Uvh VRTSvcs-6.2.1.1100-SLES11.i686.rpm
5. After the installation completes, verify that the patch is installed.
   # rpm -q VRTSvcs
   You will find the following output on display with the patch installed properly:
   VRTSvcs-6.2.1.1100-SLES11.i686
Restarting VCS on the cluster node
----------------------------------
To restart VCS on the cluster node:
1. Verify the configuration:
   # hacf -verify config 
2. Start the cluster services on all cluster nodes. 
   First start VCS on a node
   # hastart
   On all the other nodes, start VCS by issuing the hastart command after the first node's state changes to LOCAL_BUILD or RUNNING.
3. Unfreeze all the service groups:
   # haconf -makerw
   # hagrp -unfreeze [group] -persistent
   # haconf -dump -makero
4. Start the VCS CmdServer on all nodes
   # /opt/VRTSvcs/bin/CmdServer


REMOVING THE PATCH
------------------
To uninstall the patch perform the following steps:
1. Stop VCS on the node by following the steps in the section "Stopping VCS on the cluster node".
2. Remove the patch:
   #  rpm -e VRTSvcs
3. After the removal completes, verify that the patch has been removed from all the system in the cluster. On each system type:
   # rpm -qa | grep VRTSvcs
   The package VRTSvcs should not be displayed, which confirms that the package is removed.
4. Install previous VCS version rpm.
5. Copy the /etc/VRTSvcs/conf/config/types.cf.orig file to /etc/VRTSvcs/conf/config/types.cf.
6. Copy the /etc/VRTSvcs/conf/config/main.cf.orig file to /etc/VRTSvcs/conf/config/main.cf.
7. Start the cluster services on all cluster nodes. First start VCS on 
   one node:
   # hastart
   On all the other nodes, start VCS by issuing the hastart command after the first node's state changes to LOCAL_BUILD or RUNNING.
8. Unfreeze all the service groups:
   # haconf -makerw
   # hagrp -unfreeze [group] -persistent
   # haconf -dump -makero
9. Start the VCS CmdServer on all nodes
   # /opt/VRTSvcs/bin/CmdServer


SPECIAL INSTRUCTIONS
--------------------
NONE


OTHERS
------
NONE



Read and accept Terms of Service