Critical System Protection hotfix for Redhat Linux glibc-2.5.-58.el5_6.4 , Critical System Protection hot fix: SCSP-5.2-RHEL-HF1
Last Updated July 19, 2011
Symantec is releasing a hot fix for Symantec Critical System Protection (SCSP) to resolve a compatibility issue on the RedHat Linux platform (RHEL). This hotfix “SCSP-5.2-RHEL-HF1” will work correctly with glibc update version (glibc-2.5.-58.el5_6.4)
On 6/27/2011, RedHat made a glibc patch (glibc-2.5.-58.el5_6.4) available via a RedHat Network Update. This is a typical method that RedHat uses to distribute updates. Typically, users run an update process after their initial installation or as a scheduled update. One of the SCSP programs is not compatible with this version of glibc and causes the agent to hang during the boot process.
Disable the Symantec Critical System Protection agent startup script by renaming it using following command. mv /etc/init.d/sisipsagent /etc/init.d/sisipsagent.bak
Restart the computer in default boot mode
Content of this Hot fix:
This hotfix contains following binaries that are impacted by the latest glibc update.
SCSP agent binary
RHEL 5-U4 and 5-U5 32bit
RHEL 5-U4 and 5-U5 64bit
RHEL 5-U5 and 5-U6 32bit
RHEL 5-U5 and 5-U6, 64bit
Note: These packages are complete install packages which upgrade the SCSP agent on the RedHat 5 platform to this hotfix version. Customers using SCSP agent 5.2.5 on RHEL 5 should upgrade the SCSP agent to 5.2.8 version available with this hotfix.
The following workarounds are provided for customers who cannot apply the hot fix immediately.
Delay your update of this specific version of glibc library.
To avoid an accidental upgrade, exclude them from the list of available updates on yum. Add the following line to your /etc/yum.conf file: exclude=glibc glibc-common glibc-devel glibc-headers glibc-utils nscd
If you have already updated to the glibc-2.5.-58.el5_6.4 version, downgrade by using following command: yum downgrade glibc glibc-common glibc-devel glibc-headers glibc-utils nscd
Other related compatibility issues with glibc latest update: