vcs-sol10_sparc-Patch-6.2.1.1100

 Basic information
Release type: Patch
Release date: 2019-11-05
OS update support: None
Technote: None
Documentation: None
Popularity: 949 viewed    downloaded
Download size: 87.22 MB
Checksum: 3538743364

 Applies to one or more of the following products:
Application HA 6.2 On Solaris 10 SPARC
Cluster Server 6.2 On Solaris 10 SPARC
Storage Foundation Cluster File System 6.2 On Solaris 10 SPARC
Storage Foundation for Oracle RAC 6.2 On Solaris 10 SPARC
Storage Foundation for Sybase ASE CE 6.2 On Solaris 10 SPARC
Storage Foundation HA 6.2 On Solaris 10 SPARC

 Obsolete patches, incompatibilities, superseded patches, or other requirements:
None.

 Fixes the following incidents:
3982203

 Patch ID:
None.

Readme file
                          * * * READ ME * * *
               * * * Symantec Cluster Server 6.2.1 * * *
                         * * * Patch 1100 * * *
                         Patch Date: 2019-08-26


This document provides the following information:

   * PATCH NAME
   * OPERATING SYSTEMS SUPPORTED BY THE PATCH
   * PACKAGES AFFECTED BY THE PATCH
   * BASE PRODUCT VERSIONS FOR THE PATCH
   * SUMMARY OF INCIDENTS FIXED BY THE PATCH
   * DETAILS OF INCIDENTS FIXED BY THE PATCH
   * INSTALLATION PRE-REQUISITES
   * INSTALLING THE PATCH
   * REMOVING THE PATCH


PATCH NAME
----------
Symantec Cluster Server 6.2.1 Patch 1100


OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
Solaris 10 SPARC


PACKAGES AFFECTED BY THE PATCH
------------------------------
Host key verification failed.
VRTSvcs


BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
   * Symantec Application HA 6.2
   * Symantec Cluster Server 6.2
   * Symantec Storage Foundation Cluster File System HA 6.2
   * Symantec Storage Foundation for Oracle RAC 6.2
   * Symantec Storage Foundation HA 6.2


SUMMARY OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
Patch ID: 6.2.1.1100
* 3982203 (3981992) A potentially critical security vulnerability in VCS needs to be addressed.


DETAILS OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
This patch fixes the following incidents:

Patch ID: 6.2.1.1100

* 3982203 (Tracking ID: 3981992)

SYMPTOM:
A potentially critical security vulnerability in VCS needs to be addressed.

DESCRIPTION:
A potentially critical security vulnerability in VCS needs to be addressed.

RESOLUTION:
This hotfix addresses the security vulnerability. For details, refer to the security advisory at: https://www.veritas.com/content/support/en_US/security/VTS19-003.html



INSTALLING THE PATCH
--------------------
Run the Installer script to automatically install the patch:
-----------------------------------------------------------
Please be noted that the installation of this P-Patch will cause downtime.

To install the patch perform the following steps on at least one node in the cluster:
1. Copy the patch vcs-sol10_sparc-Patch-6.2.1.1100.tar.gz to /tmp
2. Untar vcs-sol10_sparc-Patch-6.2.1.1100.tar.gz to /tmp/hf
    # mkdir /tmp/hf
    # cd /tmp/hf
    # gunzip /tmp/vcs-sol10_sparc-Patch-6.2.1.1100.tar.gz
    # tar xf /tmp/vcs-sol10_sparc-Patch-6.2.1.1100.tar
3. Install the hotfix(Please be noted that the installation of this P-Patch will cause downtime.)
    # pwd /tmp/hf
    # ./installVRTSvcs621P11 [<host1> <host2>...]

You can also install this patch together with 6.2.1 maintenance release using Install Bundles
1. Download this patch and extract it to a directory
2. Change to the Veritas InfoScale 6.2.1 directory and invoke the installmr script
   with -patch_path option where -patch_path should point to the patch directory
    # ./installmr -patch_path [<path to this patch>] [<host1> <host2>...]

Install the patch manually:
--------------------------
To apply the patch manually, perform the steps listed below on each node.
Ensure that the "/opt/VRTS/bin" directory is included in your PATH environment variable.
1. Stop VCS:
    # haconf -dump -makero
    # hastop -local -force
2. Stop the VCS CmdServer
    #/opt/VRTSvcs/bin/CmdServer -stop
3. Copy the /etc/VRTSvcs/conf/config/types.cf file to /etc/VRTSvcs/conf/config/types.cf.orig as a backup.
4. Copy the /etc/VRTSvcs/conf/config/main.cf file to /etc/VRTSvcs/conf/config/main.cf.orig as a backup.
5. Change to the directory where the patch is located and install the patch using the commands shown below:
    # cd <patch_directory> /patches
    # patchadd 152790-01
6. Verify that the new patch is installed by executing the command below and confirm the output 
displayed matches the text which follows.
    Example
    # showrev -p | grep 152790-01
    Output: 
    Patch: 152790-01 Obsoletes:  Requires:  Incompatibles:  Packages: VRTSvcsag
7. Start VCS:
    # hastart
8. Start CmdServer
    # /opt/VRTSvcs/bin/CmdServer


REMOVING THE PATCH
------------------
Run the Uninstaller script to automatically remove the patch:
------------------------------------------------------------
To uninstall the patch perform the following step on at least one node in the cluster:
    # /opt/VRTS/install/uninstallVRTSvcs621P11 [<host1> <host2>...]

Remove the patch manually:
-------------------------
Run the following steps on all the nodes in the VCS cluster.
1. Stop VCS:
    # haconf -dump -makero
    # hastop -local -force
2. Stop the VCS CmdServer
    #/opt/VRTSvcs/bin/CmdServer -stop
3. Uninstall the patch:
    # patchrm 152790-01
4. Verify that the patch is uninstalled from the node:
    # showrev -p | grep 152790-01
    If the patch was successfully uninstalled, there will be no output.
5. Restart VCS:
    # hastart


SPECIAL INSTRUCTIONS
--------------------
---------------------
If a local zone is in 'configured' state while the VRTSvcsag package
is being updated, then the package is not updated in local zone. To update
packages inside a local zone, execute the below command (repeat per zone as needed):
    # zoneadm -z <zonename>   attach -u


OTHERS
------
NONE