Translation Notice
Please note that this content includes text that has been machine-translated from English. Veritas does not guarantee the accuracy regarding the completeness of the translation. You may also refer to the English Version of this knowledge base article for up-to-date information.
vcs-aix-Patch-7.4.1.1100
Patch
Abstract
This update was migrated from sort.veritas.com. For details (readme, files, etc.), click the 'Update name' link to view the update download page for this update.
Description
OS update support:
SORT ID: 15229
Fixes the following incidents:
3982912
Patch ID:
VRTSvcs.bff
* * * READ ME * * *
* * * Veritas Cluster Server 7.4.1 * * *
* * * Patch 1100 * * *
Patch Date: 2019-08-26
This document provides the following information:
* PATCH NAME
* OPERATING SYSTEMS SUPPORTED BY THE PATCH
* PACKAGES AFFECTED BY THE PATCH
* BASE PRODUCT VERSIONS FOR THE PATCH
* SUMMARY OF INCIDENTS FIXED BY THE PATCH
* DETAILS OF INCIDENTS FIXED BY THE PATCH
* INSTALLATION PRE-REQUISITES
* INSTALLING THE PATCH
* REMOVING THE PATCH
PATCH NAME
----------
Veritas Cluster Server 7.4.1 Patch 1100
OPERATING SYSTEMS SUPPORTED BY THE PATCH
----------------------------------------
AIX 7.1
AIX 7.2
PACKAGES AFFECTED BY THE PATCH
------------------------------
VRTSvcs
BASE PRODUCT VERSIONS FOR THE PATCH
-----------------------------------
* InfoScale Availability 7.4.1
* InfoScale Enterprise 7.4.1
* InfoScale Storage 7.4.1
SUMMARY OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
Patch ID: 7.4.1.1100
* 3982912 (3981992) A potentially critical security vulnerability in VCS needs to be addressed.
DETAILS OF INCIDENTS FIXED BY THE PATCH
---------------------------------------
This patch fixes the following incidents:
Patch ID: 7.4.1.1100
* 3982912 (Tracking ID: 3981992)
SYMPTOM:
A potentially critical security vulnerability in VCS needs to be addressed.
DESCRIPTION:
A potentially critical security vulnerability in VCS needs to be addressed.
RESOLUTION:
This hotfix addresses the security vulnerability. For details, refer to the security advisory at: https://www.veritas.com/support/en_US/security/VTS19-003.html
INSTALLING THE PATCH
--------------------
Run the Installer script to automatically install the patch:
-----------------------------------------------------------
Please be noted that the installation of this P-Patch will cause downtime.
To install the patch perform the following steps on at least one node in the cluster:
1. Copy the patch vcs-aix-Patch-7.4.1.1100.tar.gz to /tmp
2. Untar vcs-aix-Patch-7.4.1.1100.tar.gz to /tmp/hf
# mkdir /tmp/hf
# cd /tmp/hf
# gunzip /tmp/vcs-aix-Patch-7.4.1.1100.tar.gz
# tar xf /tmp/vcs-aix-Patch-7.4.1.1100.tar
3. Install the hotfix(Please be noted that the installation of this P-Patch will cause downtime.)
# pwd /tmp/hf
# ./installVRTSvcs741P1100 [ ...]
You can also install this patch together with 7.4.1 base release using Install Bundles
1. Download this patch and extract it to a directory
2. Change to the Veritas InfoScale 7.4.1 directory and invoke the installer script
with -patch_path option where -patch_path should point to the patch directory
# ./installer -patch_path [] [ ...]
Install the patch manually:
--------------------------
Run the following steps on all the nodes in the VCS cluster:
Prerequisite: The system should have VRTSvcs 7.4.1-GA installed before the installation of this patch.
1. Save the VCS configuration:
# haconf -dump
2. Stop VCS:
# hastop -local -force
3. Persistently freeze all the service groups:
# haconf -makerw
# hagrp -freeze [group] -persistent
# haconf -dump -makero
4. Stop the cluster on all nodes. On any node, run the following command to stop the cluster:
# hastop -all -force
5. Verify that the cluster is stopped on all nodes:
# hasys -state
6. On all nodes, make sure that both the had and hashadow processes are stopped.
7. Stop the VCS CmdServer on all nodes:
# /opt/VRTSvcs/bin/CmdServer -stop
8. Copy the /etc/VRTSvcs/conf/config/types.cf file to /etc/VRTSvcs/conf/config/types.cf.orig as a backup.
9. Copy the /etc/VRTSvcs/conf/config/main.cf file to /etc/VRTSvcs/conf/config/main.cf.orig as a backup.
10. Install the patch by using the following command:
a. Change to the appropriate directory where patch is present.
b. Apply patch as:
# installp -a -d VRTSvcs.bff VRTSvcs
11. Verify that the new patch is applied:
# lslpp -l VRTSvcs
12. To commit the patch:
Note: Once you commit this patch, you cannot remove it.
Execute the following command:
# installp -c VRTSvcs
13. Start VCS:
# hastart
14. Start the VCS CmdServer on all nodes
# /opt/VRTSvcs/bin/CmdServer
REMOVING THE PATCH
------------------
Run the Uninstaller script to automatically remove the patch:
------------------------------------------------------------
To uninstall the patch perform the following step on at least one node in the cluster:
# /opt/VRTS/install/uninstallVRTSvcs741P1100 [ ...]
Remove the patch manually:
-------------------------
Run the following steps on all the nodes in the VCS cluster:
1. Save the VCS configuration:
# haconf -dump
2. Stop VCS:
# hastop -local -force
3. Stop the VCS CmdServer
#/opt/VRTSvcs/bin/CmdServer -stop
4. Uninstall the patch:
Note: You can rollback the patch only if it has not been committed.
Patch Rollback:
# installp -r VRTSvcs 7.4.1.1100
5. Start VCS:
# hastart
6. Start the VCS CmdServer on all nodes
# /opt/VRTSvcs/bin/CmdServer
SPECIAL INSTRUCTIONS
--------------------
NONE
OTHERS
------
NONE
Applies to the following product releases
Update files
|
File name | Description | Version | Platform | Size |
---|