Critical System Protection hotfix for Redhat Linux glibc-2.5.-58.el5_6.4
Last Updated August 23, 2013
Critical System Protection hot fix
Symantec is releasing a hot fix for the Critical System Protection product to resolve a compatibility issue on the RedHat platform. This hotfix “SCSP-5.2-RHEL-HF1” will work correctly with glibc update version (glibc-2.5.-58.el5_6.4)
RedHat on 6/27/2011 made a glibc patch (glibc-2.5.-58.el5_6.4) available via RedHat Network Update. This is a normal way of receiving updates from RedHat and users would run update process after initial install, scheduled update or automatic update. One of the SCSP programs is not compatible with this version of glibc and causes the agent start to hang the boot-up process
If the glibc update has been applied and the system is experiencing a hang state, reboot the system using a suggested method below. Then apply this hot fix and follow the instructions.
If the glibc has not yet been updated, apply this hot fix first and follow the instructions. After the hot fix is applied, you may update the glibc to bring the system up to date with all available patches.
If applying this hot fix is not a viable option at this time, there are a few suggested workarounds below.
How to boot up a hung system successfully:
·Restart the system, power reset if necessary.
·Upon start up boot into single user mode. For further details on how to start in single user mode please refer to the follow document.
This hot fix contains following binaries that are impacted by the latest glibc update.
SCSP agent binary
RHEL 5-U4 and 5-U5 32bit
RHEL 5-U4 and 5-U5 64bit
RHEL 5-U5 and 5-U6 32bit
RHEL 5-U5 and 5-U6, 64bit
Note: These packages are complete install packages which upgrade the SCSP agent on the RedHat 5 platform to this hot fix version. Customers using SCSP agent 5.2.5 on RHEL 5 should upgrade SCSP agent to the 5.2.8 RHEL agent.
These workarounds are provided for customers who are unable to apply the hotfix immediately.
·Delay update of this specific update for glibc library.
·To avoid accidental upgrade, exclude them from the list of available updates on yum. Add the following to your /etc/yum.conf file: