This page lists publically-released patches for Veritas Enterprise Products.
For Product GA build, see Veritas Entitlement Management System(VEMS) by clicking the Veritas Support 'Licensing' option.
For information on private patches, contact Veritas Technical Support.
Veritas is making it easier to find all software installers and updates for Veritas products with a completely redesigned experience. NetBackup HotFixes and NetBackup Appliance patches are now also available at the new Veritas Download Center.
Patches for your product can have a variety of names. These names are based on product, component, or package names. For more information on patch naming conventions and the relationship between products, components, and packages, see the SORT online help.
Sign in if you want to rate this patch.

 Basic information
Release type: P-patch
Release date: 2014-06-26
OS update support: None
Technote: None
Documentation: None
Popularity: 771 viewed    157 downloaded
Download size: 9.59 KB
Checksum: 3725692911

 Applies to one or more of the following products:
VirtualStore 6.0 On RHEL5 x86-64
VirtualStore 6.0 On RHEL6 x86-64
VirtualStore 6.0 On SLES10 x86-64
VirtualStore 6.0 On SLES11 x86-64
VirtualStore 6.0 On Solaris 10 SPARC
VirtualStore 6.0 On Solaris 10 X64
Cluster Server 6.0 On AIX 6.1
Cluster Server 6.0 On AIX 7.1
Cluster Server 6.0 On HP-UX 11i v3 (11.31)
Cluster Server 6.0 On RHEL5 x86-64
Cluster Server 6.0 On RHEL6 x86-64
Cluster Server 6.0 On SLES10 x86-64
Cluster Server 6.0 On SLES11 x86-64
Cluster Server 6.0 On Solaris 10 SPARC
Cluster Server 6.0 On Solaris 10 X64
Dynamic Multi-Pathing 6.0 On AIX 6.1
Dynamic Multi-Pathing 6.0 On AIX 7.1
Dynamic Multi-Pathing 6.0 On HP-UX 11i v3 (11.31)
Dynamic Multi-Pathing 6.0 On RHEL5 x86-64
Dynamic Multi-Pathing 6.0 On RHEL6 x86-64
Dynamic Multi-Pathing 6.0 On SLES10 x86-64
Dynamic Multi-Pathing 6.0 On SLES11 x86-64
Dynamic Multi-Pathing 6.0 On Solaris 10 SPARC
Dynamic Multi-Pathing 6.0 On Solaris 10 X64
Storage Foundation 6.0 On AIX 6.1
Storage Foundation 6.0 On AIX 7.1
Storage Foundation 6.0 On HP-UX 11i v3 (11.31)
Storage Foundation 6.0 On RHEL5 x86-64
Storage Foundation 6.0 On RHEL6 x86-64
Storage Foundation 6.0 On SLES10 x86-64
Storage Foundation 6.0 On SLES11 x86-64
Storage Foundation 6.0 On Solaris 10 SPARC
Storage Foundation 6.0 On Solaris 10 X64
Storage Foundation Cluster File System 6.0 On AIX 6.1
Storage Foundation Cluster File System 6.0 On AIX 7.1
Storage Foundation Cluster File System 6.0 On HP-UX 11i v3 (11.31)
Storage Foundation Cluster File System 6.0 On RHEL5 x86-64
Storage Foundation Cluster File System 6.0 On RHEL6 x86-64
Storage Foundation Cluster File System 6.0 On SLES10 x86-64
Storage Foundation Cluster File System 6.0 On SLES11 x86-64
Storage Foundation Cluster File System 6.0 On Solaris 10 SPARC
Storage Foundation Cluster File System 6.0 On Solaris 10 X64
Storage Foundation for Oracle RAC 6.0 On AIX 6.1
Storage Foundation for Oracle RAC 6.0 On AIX 7.1
Storage Foundation for Oracle RAC 6.0 On HP-UX 11i v3 (11.31)
Storage Foundation for Oracle RAC 6.0 On RHEL5 x86-64
Storage Foundation for Oracle RAC 6.0 On RHEL6 x86-64
Storage Foundation for Oracle RAC 6.0 On SLES10 x86-64
Storage Foundation for Oracle RAC 6.0 On SLES11 x86-64
Storage Foundation for Oracle RAC 6.0 On Solaris 10 SPARC
Storage Foundation for Oracle RAC 6.0 On Solaris 10 X64
Storage Foundation for Sybase ASE CE 6.0 On SLES10 x86-64
Storage Foundation for Sybase ASE CE 6.0 On Solaris 10 SPARC
Storage Foundation HA 6.0 On AIX 6.1
Storage Foundation HA 6.0 On AIX 7.1
Storage Foundation HA 6.0 On HP-UX 11i v3 (11.31)
Storage Foundation HA 6.0 On RHEL5 x86-64
Storage Foundation HA 6.0 On RHEL6 x86-64
Storage Foundation HA 6.0 On SLES10 x86-64
Storage Foundation HA 6.0 On SLES11 x86-64
Storage Foundation HA 6.0 On Solaris 10 SPARC
Storage Foundation HA 6.0 On Solaris 10 X64

 Obsolete patches, incompatibilities, superseded patches, or other requirements:

This patch supersedes the following patches: Release date
cpi-6.0P2 (obsolete) 2012-06-19
cpi-hpux1131-6.0P1 (obsolete) 2012-01-05

 Fixes the following incidents:
2621720, 2628469, 2817631, 3390290

 Patch ID:
None.

 Readme file  [Save As...]
Date: 26-12-2011
OS: HPUX

The patch fixes the following installer issues:

Issue 1:
Release: 6.0
OS: HPUX
OS version: 11.31.1109
Products: All Products 
Etrack Incidents: 2628469

Problem statement:
Base501 packages are not removed on fresh installation of Storage Foundation and High Availability products with 1109 fusion

Issue 2:
Release: 6.0
OS: HPUX
OS version: 11.31
Products: SFRAC
Etrack Incidents: 2621720  

Problem statement:
Installer does not install required package VRTSvcsea during installation of SFRAC 6.0 when user selects minimum package set for installation.

Workaround Steps:
Symantec has provided a patch to resolve the above mentioned issues.

Issue 3:
Release: 6.0
Platform: SunOS, Linux, AIX and HP-UX
Products: All Products
Etrack Incidents: 2817631
 
Problem statement:
SFCFS 6.0 rolling upgrade fails if some of disks in shared disk group have clone flag set.
 
Workaround Steps:
Customer can refer to Tech Note #189944 to unset the clone flag before upgrade.

Issue 4:
Release: 6.0
Platform: SunOS, Linux, AIX and HP-UX
Products: All Products
Etrack Incidents: 3390290
 
Problem statement:
The Symantec Product Installer attempts to start vxconfigd before upgrade, which may lead data corruption.

LUNs over 1TB in size in Volume Manager(VxVM) may encounter data corruption when upgrading from 5.1SP1 5.1SP1RP1, 5.1SP1RP2, or 5.1SP1RP3.
TechNote: http://www.symantec.com/business/support/index?page=content&id=TECH188018

During patch upgrade from 5.1SP1, 5.1SP1RP1, 5.1SP1RP2, or 5.1SP1RP3 to 6.0 release, the Symantec Product Installer attempts to start vxconfigd before patch upgrade, which leads data corruption.

Workaround Steps:
CPI provides a patch for customer to avoid vxconfigd get started when upgrade from 5.1SP1, 5.1SP1RP1, 5.1SP1RP2 or 5.1SP1RP3.

Usage:
1. Copy the hot-fix CPI_60_P3.pl to /tmp
2. Run installer script with the hot-fix
   Example:
   ./installer -require /tmp/CPI_60_P3.pl



Read and accept Terms of Service