Sign In
Forgot Password

Don’t have an account? Create One.

Security Patch IS-8.0U1SP5 for RHEL9

Patch

Abstract

Security Patch IS-8.0U1SP5 for RHEL9

Description

SORT ID: 19559


Fixes the below incidents:

4112919,4095889,4114375,4113012,4114322 

 

Patch IDs:

VRTSodm-8.0.0.2500-RHEL9 for VRTSodm
VRTSpython-3.9.2.24-RHEL9 for VRTSpython
VRTSsfmh-8.0.0.411_Linux.rpm for VRTSsfmh
VRTSvxfs-8.0.0.2500-RHEL9 for VRTSvxfs 

                          * * * READ ME * * *
                       * * * InfoScale 8.0 * * *
                         * * * Patch 2500 * * *
                         Patch Date: 2023-04-17


This document provides the following information:

   * PATCH NAME
   * OPERATING SYSTEMS SUPPORTED BY THE PATCH
   * PACKAGES AFFECTED BY THE PATCH
   * BASE PRODUCT VERSIONS FOR THE PATCH
   * SUMMARY OF INCIDENTS FIXED BY THE PATCH
   * DETAILS OF INCIDENTS FIXED BY THE PATCH
   * INSTALLATION PRE-REQUISITES
   * INSTALLING THE PATCH
   * REMOVING THE PATCH


PATCH NAME
----------
InfoScale 8.0 Patch 2500


OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
RHEL9 x86-64


PACKAGES AFFECTED BY THE PATCH
------------------------------
VRTSodm
VRTSpython
VRTSsfmh
VRTSvxfs


BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
   * InfoScale Availability 8.0
   * InfoScale Enterprise 8.0
   * InfoScale Foundation 8.0
   * InfoScale Storage 8.0


SUMMARY OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
Patch ID: VRTSvxfs-8.0.0.2500
* 4112919 (4110764) Security Vulnerability observed in Zlib a third party component used by VxFS .
Patch ID: VRTSvxfs-8.0.0.2100
* 4095889 (4095888) Security vulnerabilities exist in the Sqlite third-party components used by VxFS.
Patch ID: -3.9.2.24
* 4114375 (4113851) For VRTSpython need to fix some open CVE's
Patch ID: VRTSsfmh-vom-HF0800411
* 4113012 (4113011) VIOM VRTSsfmh package on Linux to fix dclid/vxlist issue with InfoScale VRTSvxvm 8.0.0.2200
Patch ID: VRTSodm-8.0.0.2500
* 4114322 (4114321) VRTSodm driver will not load with VRTSvxfs 8.0.0.2500 patch.


DETAILS OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
This patch fixes the following incidents:

Patch ID: VRTSvxfs-8.0.0.2500

* 4112919 (Tracking ID: 4110764)

SYMPTOM:
Security Vulnerability observed in Zlib a third party component VxFS uses.

DESCRIPTION:
In an internal security scans vulnerabilities in Zlib were found.

RESOLUTION:
Upgrading the third party component Zlib to address these vulnerabilities.

Patch ID: VRTSvxfs-8.0.0.2100

* 4095889 (Tracking ID: 4095888)

SYMPTOM:
Security vulnerabilities exist in the Sqlite third-party components used by VxFS.

DESCRIPTION:
VxFS uses the Sqlite third-party components in which some security vulnerability exist.

RESOLUTION:
VxFS is updated to use newer version of this third-party components in which the security vulnerabilities have been addressed.

Patch ID: -3.9.2.24

* 4114375 (Tracking ID: 4113851)

SYMPTOM:
Open CVE's detected for the python programming language and other python modules being used in VRTSpython

DESCRIPTION:
Some open CVE's are exploitable in VRTSpython for IS 8.0

RESOLUTION:
VRTSpython is patched with all the open CVE's which are impacting IS 8.0.

Patch ID: VRTSsfmh-vom-HF0800411

* 4113012 (Tracking ID: 4113011)

SYMPTOM:
vxlist output on InfoScale server shows volume name as "-" and status Unknown.

DESCRIPTION:
vxlist output on InfoScale server shows volume name as "-" and status Unknown.

RESOLUTION:
New vxdclid plugin for VxVM has been created.

Patch ID: VRTSodm-8.0.0.2500

* 4114322 (Tracking ID: 4114321)

SYMPTOM:
VRTSodm driver will not load with VRTSvxfs patch.

DESCRIPTION:
Need recompilation of VRTSodm with latest VRTSvxfs.

RESOLUTION:
Recompiled the VRTSodm with new VRTSvxfs .



INSTALLING THE PATCH
--------------------
Run the Installer script to automatically install the patch:
-----------------------------------------------------------
Please be noted that the installation of this P-Patch will cause downtime.

To install the patch perform the following steps on at least one node in the cluster:
1. Copy the patch infoscale-rhel9_x86_64-Patch-8.0.0.2500.tar.gz to /tmp
2. Untar infoscale-rhel9_x86_64-Patch-8.0.0.2500.tar.gz to /tmp/hf
    # mkdir /tmp/hf
    # cd /tmp/hf
    # gunzip /tmp/infoscale-rhel9_x86_64-Patch-8.0.0.2500.tar.gz
    # tar xf /tmp/infoscale-rhel9_x86_64-Patch-8.0.0.2500.tar
3. Install the hotfix(Please be noted that the installation of this P-Patch will cause downtime.)
    # pwd /tmp/hf
    # ./installVRTSinfoscale800P2500 [<host1> <host2>...]

You can also install this patch together with 8.0 base release using Install Bundles
1. Download this patch and extract it to a directory
2. Change to the Veritas InfoScale 8.0 directory and invoke the installer script
   with -patch_path option where -patch_path should point to the patch directory
    # ./installer -patch_path [<path to this patch>] [<host1> <host2>...]

Install the patch manually:
--------------------------
Manual installation is not recommended.


REMOVING THE PATCH
------------------
Manual uninstallation is not recommended.


SPECIAL INSTRUCTIONS
--------------------
Special Notes:
Vulnerabilities fixed:
Following vulnerabilities are fixed in this security SP –
CVE-2023-23931(BDSA-2023-0242), BDSA-2022-1295, CVE-2023-27538 (BDSA-2023-0608), CVE-2022-43552 (BDSA-2022-3660), CVE-2023-23916 (BDSA-2023-0316), CVE-2022-35260 (BDSA-2022-3051), CVE-2023-23915 (BDSA-2023-0312), BDSA-2023-0018, CVE-2022-43551 (BDSA-2022-3659), CVE-2022-42916 (BDSA-2022-3047), CVE-2023-27535 (BDSA-2023-0603), CVE-2023-27533 (BDSA-2023-0598), CVE-2023-27534 (BDSA-2023-0599), CVE-2023-23914 (BDSA-2023-0305), CVE-2023-27536 (BDSA-2023-0606), CVE-2022-32221 (BDSA-2022-3049), CVE-2022-42915 (BDSA-2022-3050), CVE-2023-24329(BDSA-2023-0348), CVE-2022-45061(BDSA-2022-3175), CVE-2022-23491(BDSA-2022-3717), CVE-2023-25577(BDSA-2023-0323), CVE-2022-37434(BDSA-2022-2183).


OTHERS
------
NONE


Applies to the following product releases

Update files

File name Description Version Platform Size