Sign In
Forgot Password

Don’t have an account? Create One.

Patch_7_4_10008_0_4022624

Patch

Abstract

Connections between VEA server and clients fail when JRE is upgraded on an InfoScale 7.4.1 system.

Description

A security vulnerability causes the connection between VEA servers and clients to fail. This issue occurs when JRE is upgraded to a version later than 1.8.0_181 on a system where InfoScale 7.4.1 installed.

README VERSION: 1.1
DATE: 2021-10-18

FIXES APPLIED FOR PRODUCTS:
---------------------------
VRTSvxvm 7.4.1


PACKAGES:  
PATCH NAME: Patch_7_4_10008_0_4022624
SUPERSEDED PATCHES: NONE
REQUIRED PATCHES: NONE
PATCH CATEGORY:  CORE
PATCH CRITICALITY       : OPTIONAL
HAS KERNEL COMPONENT    : YES
ID                      : NONE
REBOOT REQUIRED: YES


OS: w2k12r2X64,w2k12X64,w2k16X64,w2k19X64


INSTALL/UNINSTALL INSTRUCTIONS:
-------------------------------
This package contains self-extracting files that are specific to the processor architecture and operating system version.
Choose the appropriate file for your computer's configuration.
======================================================================================
Operating System    Platform    File Name

----------------------------------------------------------------------------------------
Download the appropriate hotfix executable to a temporary location on your system.
You can install this hotfix using the GUI or from the command line. Instructions for both options are provided below.This package contains self-extracting files that are specific to the processor architecture and operating system version.
Download the appropriate hotfix executable to a temporary location on your system.
You can install this hotfix using the GUI or the CLI. Instructions for both these options are provided below.

Prepare to install the hotfix
-------------------------------------------------------------------------
1. Close the VEA GUI.
2. Back up the existing JRE version folder located at"%VIP_PATH%\jre".
3. Copy the new JRE version folder at the %VIP_PATH% location.
4. If UAC is enabled, run the program or commands in the "Run as administrator" mode even if the logged-on user belongs to the local administrators group. Alternatively, log on as a domain administrator to perform the tasks.

To install the hotfix on server systems using the GUI
-------------------------------------------------------------------------
1. Double-click the hotfix executable file to extract its contents to a default location on the cluster node.
By default, the files are extracted to:
"%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates"

The Hotfix Installer Wizard is automatically launched after the files are extracted.

2. Click "Next" on the Welcome screen. 
The 'Hotfix Installation Task' screen lists the tasks that are performed by the installer.

3. Click "Install Hotfix" to begin the hotfix installation. 
The status of each installation task is updated as it completes.

4. After the tasks are complete, click "Next" and then click "Finish" to complete the installation process.

5. If this is a clustered configuration (VCS or MSCS), perform steps 1-4 on all additional nodes in the cluster.

6. Open the VEA GUI and connect to server.

To install the hotfix on server systems using the CLI
------------------------------------------------------------------------
1. Navigate to the following location at the command prompt:
"C:\temp"

2. Run one of the following commands to extract the hotfix files to the default location:
<Hotfix_BuildVersion_IncidentNumber_OS_Platform>.exe /x
or
<Hotfix_BuildVersion_IncidentNumber_OS_Platform>.exe /extract

3. Navigate to the default location where the hotfix files are extracted.
By default, the files are extracted to:
"%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates\<Hotfix_BuildVersion_IncidentNumber>"

4. Run the following command to install the hotfix:
VxHF.exe /install:<Hotfix_BuildVersion_IncidentNumber> /silent
Here, <Hotfix_BuildVersion_IncidentNumber> is the name of the hotfix file excluding the OS, platform, and .exe extension.

5. To complete the hotfix installation, follow the instructions that are displayed at the command prompt.

6. If this is a clustered configuration (VCS or MSCS), perform steps 1-5 on all additional nodes in the cluster.

7. Open the VEA GUI and connect to server.

Additional Notes
------------------------
- To confirm the installation of a hotfix, run the following command:
vxhf.exe /list

On server systems, vxhf.exe is located at:
"%programfiles(x86)%\Common Files\Veritas Shared\WxRTPrivates\<Hotfix_BuildVersion_IncidentNumber>"

The output of this command lists the hotfixes installed on a system.

- The hotfix installer (vxhf.exe) creates and stores logs at:
"%allusersprofile%\Application Data\Veritas\VxHF"

- For general information about the hotfix installer (vxhf.exe), refer to the following technote:
http://www.veritas.com/docs/TECH73446

- To view a list of hotfixes already installed on a system, refer to the steps mentioned in the following technote: 
http://www.veritas.com/docs/TECH73438

- For information on uninstalling a hotfix, refer to the steps mentioned in the following technote: 
http://www.veritas.com/docs/TECH73443

Additional instructions to uninstall the hotfix
-------------------------------------------------------------------------
1. Close the VEA GUI.
2. Restore the default JRE version (1.8.0_181) folder located at "%VIP_PATH%\jre".
3. If UAC is enabled, run the program or commands in the "Run as administrator" mode even if the logged-on user belongs to the local administrators group. Alternatively, log on as a domain administrator to perform the tasks.
4. Open the VEA GUI and connect to server.

SUMMARY OF FIXED ISSUES:
-----------------------------------------


 PATCH ID:Patch_7_4_10008_0_4022624

4022624 (4012757)  0 

SUMMARY OF KNOWN ISSUES:
-----------------------------------------
NONE 


FIXED INCIDENTS:
----------------

 PATCH ID:Patch_7_4_10008_0_4022624

 * INCIDENT NO:4022624     TRACKING ID:4012757

SYMPTOM: Connections between VEA server and clients fail when JRE is upgraded on an InfoScale 7.4.1 or later system. 

DESCRIPTION: A security vulnerability causes the connection between VEA servers and clients to fail. This issue occurs when JRE is upgraded to a version later than 1.8.0_181 on a system where InfoScale 7.4.1 or later is installed. 

RESOLUTION: This patch addresses the issue by fixing the vulnerability in VEA.
For further details, refer to the article at:
https://www.veritas.com/support/en_US/article.100048367
 
FILE / VERSION:
CleanupScript.bat / -
PostHotFixActivity.bat / -
vxvea3.dll / 3.5.001.1
VxVMCERT.pem / - 

KNOWN INCIDENTS:
----------------
NONE

INCIDENTS FROM OLD PATCHES:
---------------------------
NONE

DISCLAIMER: This fix is provided without warranty of any kind including the warranties of title or implied warranties of merchantability, fitness for a particular purpose and non-infringement. Veritas disclaims all liability relating to or arising out of this fix. It is recommended that the fix be evaluated in a test environment before implementing it in your production environment. When the fix is incorporated into an InfoScale for Windows maintenance release, the resulting Hotfix or Service Pack must be installed as soon as possible. Veritas Technical Services will notify you when the maintenance release (Hotfix or Service Pack) is available if you sign up for notifications from the Veritas support site http://www.veritas.com/support and/or from Services Operations Readiness Tools (SORT) http://sort.veritas.com.


 

Applies to the following product releases

Update files

File name Description Version Platform Size