[+]
SORT Support
[+]
SORT Suggestions
/ Downloads / Patches / Patch Detail
This page lists publically-released patches for Symantec Enterprise Products.
For information on private patches, contact Symantec Technical Support.
For NetBackup Enterprise Server and NetBackup Server patches, see the NetBackup Downloads.
Patches for your product can have a variety of names. These names are based on product, component, or package names. For more information on patch naming conventions and the relationship between products, components, and packages, see the SORT online help.
vea-5.0MP1HF_3_3_934_2372164_linux
Sign in if you want to rate this patch.

 Basic information
Patch type: Hot Fix
Release date: 2011-08-09
Technote: None
Documentation: None
Popularity: 146 viewed    11 downloaded
Download size: 12.5 MB
Checksum: 3300105035

 Applies to one or more of the following products:
Storage Foundation 5.0MP1 On RHEL4 i686
Storage Foundation 5.0MP1 On RHEL4 x86-64
Storage Foundation 5.0MP1 On SLES9 i586
Storage Foundation 5.0MP1 On SLES9 x86-64
Storage Foundation HA 5.0MP1 On RHEL4 i686
Storage Foundation HA 5.0MP1 On RHEL4 x86-64
Storage Foundation HA 5.0MP1 On SLES9 i586
Storage Foundation HA 5.0MP1 On SLES9 x86-64

 Obsolete patches, incompatibilities, superseded patches, or other requirements:
None.

 Fixes the following incidents:
2372164

 Patch ID:
None.

 Readme file  [Save As...]
Date: 03, Aug, 2011

OS: Linux

OS Version: RHEL 4/5, SLES 9/10

Etrack Incidents: 2372164

Errors/Problems Fixed:
   VEA service(vxsvc) running on port 2148 crashes and dumps core.

Fixes Applied for Products: 

Storage Foundation 5.0MP1 and any RP on 5.0MP1
Storage Foundation HA 5.0MP1 and any RP on 5.0MP1


Overview of the Hotfix
---------------------------------------------------------------------------

Etrack - 2372164
----------------
SYMPTOM: VEA service(vxsvc) running on port 2148 crashes and dumps core.    

DESCRIPTION: Veritas Enterprise Administrator service (vxsvc) is prone to buffer overflows which may result in a crash.

RESOLUTION:  Code was modified to validate the data packets received over the network and reject the malformed packet(s).


Packages applied: VRTSobc33, VRTSob


Build Version: 3.3.934.0


Install Instructions:
===========================================================================
Instructions to apply the hotfix
===========================================================================

   1. Stop vxsvc process using command: "/opt/VRTSob/bin/vxsvcctrl stop"
   2. Stop all vxpal agent processes using command: "/opt/VRTSobc/pal33/bin/vxpalctrl -a <agent name> -c stop"


Installing the Hotfix
--------------------------------------------------------------------------

   1. Download the patch of VRTSobc33, VRTSob to a tmp location
   2. Install the patch using following command
	rpm -U VRTSob-3.3.934.0-0.i686.rpm
        rpm -U VRTSobc33-3.3.934.0-0.i686.rpm


Additional Notes:
No reboot is required after installation or un-installation of these rpms.


Known issue 
--------------------------------------------------------------------------

None



Feedback
Click here to rate this page
Read and accept Terms of Service