vcs-win_x64-Patch_7_4_10002_3982225_x64

 Basic information
Release type: Patch
Release date: 2019-11-05
OS update support: None
Technote: None
Documentation: None
Popularity: 1102 viewed    downloaded
Download size: 879.63 KB
Checksum: 1736869099

 Applies to one or more of the following products:
InfoScale Availability 7.4.1 On Windows x64
InfoScale Enterprise 7.4.1 On Windows x64
InfoScale Foundation 7.4.1 On Windows x64
InfoScale Storage 7.4.1 On Windows x64

 Obsolete patches, incompatibilities, superseded patches, or other requirements:
None.

 Fixes the following incidents:
3982225

 Patch ID:
None.

Readme file
                          * * * READ ME * * *
                * * * Veritas Cluster Server 7.4.1 * * *
                          * * * Patch 2 * * *
                         Patch Date: 2019-08-26


This document provides the following information:

   * PATCH NAME
   * OPERATING SYSTEMS SUPPORTED BY THE PATCH
   * PACKAGES AFFECTED BY THE PATCH
   * BASE PRODUCT VERSIONS FOR THE PATCH
   * SUMMARY OF INCIDENTS FIXED BY THE PATCH
   * DETAILS OF INCIDENTS FIXED BY THE PATCH
   * INSTALLATION PRE-REQUISITES
   * INSTALLING THE PATCH
   * REMOVING THE PATCH


PATCH NAME
----------
Veritas Cluster Server 7.4.1 Patch 2


OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
Windows 2012 X64
Windows Server 2012 R2 X64
Windows 2016 X64
Windows 2019 X64



BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
   * InfoScale Availability 7.4.1
   * InfoScale Enterprise 7.4.1
   * InfoScale Foundation 7.4.1
   * InfoScale Storage 7.4.1


SUMMARY OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
Patch ID: Patch_7_4_10002_3982225
* 3982225 (3981992) A potentially critical security vulnerability in VCS needs to be addressed.


DETAILS OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
This patch fixes the following incidents:

Patch ID: Patch_7_4_10002_3982225

* 3982225 (Tracking ID: 3981992)

SYMPTOM:
A potentially critical security vulnerability in VCS needs to be addressed.

DESCRIPTION:
A potentially critical security vulnerability in VCS needs to be addressed.

RESOLUTION:
This hotfix addresses the security vulnerability. For details, refer to the security advisory at: 
https://www.veritas.com/content/support/en_US/security/VTS19-003.html

FILE / VERSION:
cmdserver / 7.4.10002.0
cmdslave / 7.4.10002.0



INSTALLING THE PATCH
--------------------
This package contains self-extracting files that are specific to the processor architecture and operating system version.
Download the appropriate hotfix executable to a temporary location on your system.
You can install this hotfix using the GUI or the CLI. Instructions for both these options are provided below.


To install the hotfix on server systems using the GUI
-------------------------------------------------------------------------
1. Double-click the hotfix executable file to extract its contents to a default location on the cluster node.
By default, the files are extracted to:
"%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates"

The Hotfix Installer Wizard is automatically launched after the files are extracted.

2. Click "Next" on the Welcome screen. 
The 'Hotfix Installation Task' screen lists the tasks that are performed by the installer.

3. Click "Install Hotfix" to begin the hotfix installation. 
The status of each installation task is updated as it completes.

4. After the tasks are complete, click "Next" and then click "Finish" to complete the installation process.

5. If this is a clustered configuration (VCS or MSCS), perform steps 1-4 on all the other nodes in the cluster.


To install the hotfix on server systems using the CLI
------------------------------------------------------------------------
1. Navigate to the following location at the command prompt:
"C:\temp"

2. Run one of the following commands to extract the hotfix files to the default location:
<Hotfix_BuildVersion_IncidentNumber_OS_Platform> .exe /x
or
<Hotfix_BuildVersion_IncidentNumber_OS_Platform> .exe /extract

3. Navigate to the default location where the hotfix files are extracted.
By default, the files are extracted to:
"%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates\<Hotfix_BuildVersion_IncidentNumber> "

4. Run the following command to install the hotfix:
VxHF.exe /install:<Hotfix_BuildVersion_IncidentNumber>  /silent
Here, <Hotfix_BuildVersion_IncidentNumber> is the name of the hotfix file excluding the OS, platform, and .exe extension.

5. To complete the hotfix installation, follow the instructions that are displayed at the command prompt.

6. If this is a clustered configuration (VCS or MSCS), perform steps 1-5 on all the other nodes in the cluster.


REMOVING THE PATCH
------------------
Additional Notes
------------------------
- To confirm the installation of a hotfix, run the following command:
vxhf.exe /list

On server systems, vxhf.exe is located at:
"%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates\<Hotfix_BuildVersion_IncidentNumber> "

The output of this command lists the hotfixes installed on a system.

- The hotfix installer (vxhf.exe) creates and stores logs at:
"%allusersprofile%\Application Data\Veritas\VxHF"

- For general information about the hotfix installer (vxhf.exe), refer to the following technote:
https://www.veritas.com/support/en_US/article.TECH73446

- To view a list of hotfixes already installed on a system, refer to the steps mentioned in the following technote: 
https://www.veritas.com/support/en_US/article.TECH73438

- For information on uninstalling a hotfix, refer to the steps mentioned in the following technote: 
https://www.veritas.com/support/en_US/article.TECH73443


SPECIAL INSTRUCTIONS
--------------------
DISCLAIMER: This fix is provided without warranty of any kind including the warranties of title or implied warranties of merchantability, fitness for a particular purpose and non-infringement. Veritas disclaims all liability relating to or arising out of this fix. It is recommended that the fix be evaluated in a test environment before implementing it in your production environment. When the fix is incorporated into an InfoScale for Windows maintenance release, the resulting Hotfix or Service Pack must be installed as soon as possible. Veritas Technical Services will notify you when the maintenance release (Hotfix or Service Pack) is available if you sign up for notifications from the Veritas support site http://www.veritas.com/support and/or from Services Operations Readiness Tools (SORT) http://sort.veritas.com.


OTHERS
------
NONE