Tag: centos
CentOS WebPanel 7 SQL Injection
Related:
Sophos Antivirus for Linux: Limited Support for RHEL 6 during Extended Life Phase (Japan only)
Sophos plans to provide Limited Support for Sophos Antivirus for RHEL 6 during Red Hat’s Extended Life Phase (ELP), until June 30, 2024, on the following basis:
- Limited Support for Sophos Antivirus for RHEL 6 is provided on the assumption that the customer subscribes to Red Hat’s Extended Life-cycle Support (ELS) Add-On to receive critical security fixes for the operating system through the Extended Life Phase (ELP)
- Limited Support is subject to a valid subscription to a current Sophos Server Protection license and receipt by Sophos of a support extension fee.
- Limited Support means that Sophos will continue to test and release new versions of the Virus Engine or Virus Data Library as part of the release calendar. Only critical product issues will be addressed, which may include hot fixes, vulnerabilities or improvements to protection, at Sophos’ discretion.
- Limited Support will be provided for 64-bit platforms and the last minor point release of RHEL 6. Sophos will endeavor to provide support for other minor releases on a ‘commercially reasonable efforts’ basis, as follows:
- Support for product configuration and usage questions will be provided by Sophos Technical Support.
- Technical product issues will be investigated using Sophos’ existing maintenance process, on the basis that the issue can be replicated on the last minor release
- If a reported product issue cannot be replicated on the last minor release, Sophos advises that such issues would fall outside the scope of support.
- Limited Support for Sophos Antivirus on RHEL 6 does not include CentOS and Oracle Linux derivatives. See Retirement calendar for supported platforms and operating systems.
- Sophos currently plans to provide Limited Support for Sophos Antivirus on RHEL 6 through Red Hat’s published Extended Life Phase (June 30, 2024). Sophos reserves the right to suspend, reduce or terminate Limited Support before this date for reasons including but not limited to changes in demand, security, and technology. For example, if Sophos discovers an issue that requires the third-party operating system provider to provide a fix and the third party does not provide such fix, or if Sophos determines that a product code change would be required to address an issue for the RHEL 6 operating system.
Limited Support Terms
RHEL 6 Limited Support. AVAILABLE IN JAPAN ONLY. Subject to receipt by Sophos of a support extension Fee (either directly or via an authorized reseller as applicable), Sophos agrees that it will continue to provide Limited Support on a technically and commercially reasonable endeavours basis for a version of Sophos Anti-Virus for Red Hat Enterprise Linux (RHEL) version 6 on 64 bit platforms, beyond the published end of support date until the earlier of (i) the expiry of the support extension period stated in the relevant Schedule, or (ii) 30 June 2024. RHEL 6 Limited Support comprises regular updates to security data and periodic updates to the product engine only. Sophos reserves the right to suspend, reduce or terminate RHEL 6 Limited Support prior to such date for reasons including but not limited to changes in demand, security and technology, and if and to the extent that Sophos determines that a code change would be required to the Sophos Anti-Virus Product to address an issue for the RHEL 6 operating system.
If you’ve spotted an error or would like to provide feedback on this article, please use the section below to rate and comment on the article.
This is invaluable to us to ensure that we continually strive to give our customers the best information possible.
Related:
Sophos Anti-Virus for Linux: Support for minor releases of RHEL, CentOS and Oracle Linux
This article describes the Sophos Anti-Virus for Linux support for minor releases of different Linux distributions.
Sophos uses commercially reasonable efforts, as described below, to support Sophos Antivirus for Linux on all minor point releases of Red Hat Enterprise Linux (RHEL) while the corresponding major version is supported. This includes the CentOS and Oracle Linux derivatives of RHEL.
Sophos will test and support Sophos Antivirus on the current active minor release of RHEL, CentOS, and Oracle Linux. When a new minor version is released by the operating system vendor, the previous minor version typically stops receiving important security updates. Sophos, therefore, recommends customers upgrade to the current active minor release as early as practicable.
To assist customers who are unable to upgrade their systems in line with RHEL minor releases, Sophos uses commercially reasonable efforts to support Sophos Antivirus on non-current minor releases of RHEL, CentOS, and Oracle Linux, on the following basis:
- Support for configuration and usage questions for Sophos Antivirus for Linux will be provided by Sophos Technical Support
- Technical product issues will be investigated using Sophos’ existing maintenance process, on the basis that the issue can be replicated on the current active minor release
- If a reported product issue cannot be replicated on the current active minor release, or in the event that a software update would be required to provide a resolution for a non-current minor release, Sophos advises that such issues may fall outside the scope of commercially reasonable efforts support
- The corresponding major version must be supported by Sophos, excluding extended or limited support offerings
- Endpoint Security and Control: Retirement calendar for supported platforms and operating systems
- Endpoint Security and Control: Previously supported platforms and operating systems
If you’ve spotted an error or would like to provide feedback on this article, please use the section below to rate and comment on the article.
This is invaluable to us to ensure that we continually strive to give our customers the best information possible.
Related:
Auto Protect Malfunctioning
hello everyone,
I have an issue with installing SEP Client on Linux .
as you can see I’m using CentOS 7.4 with kernel 3.10.0-693.el7.x86_64 , which according to the following article , is a valid kernel to install SEP Client on it :
https://support.symantec.com/en_US/article.INFO3983.html
the problem is when i install SEP Client on my linux , everything seems to work fine except Auto-Protect :
so i googled the issue , and found out that i have to complie the auto-protect files manually , so i tried it according to symantec article on the following link :
https://support.symantec.com/en_US/article.TECH132773.html
but i got another error :
so is there anyway to findout the problem ?
thanks in advance
Related:
Client Installation for Linux
I have downloaded the SEP 14.2 trialware to install on our integration and test system, however I am unable to find the Linux client installation package, most of the clients are CentOS. Is it possible that I can be provided with the software? Both auto-compile and manual compile (if they are different) thanks.
I tried the online chat for support, they sent me here. 🙂
Related:
Hotfix XS71ECU1033 – For XenServer 7.1 CU1
Who Should Install This Hotfix?
This is a hotfix for customers running XenServer 7.1 Cumulative Update 1 with a legacy disk partition scheme.
Note: This hotfix is available only to customers on the Customer Success Services program.
Information About this Hotfix
Component | Details |
---|---|
Prerequisite | None |
Post-update tasks* | Restart the XAPI Toolstack |
Content live patchable** | No |
Baselines for Live Patch | N/A |
Revision History |
Published on November 30, 2018 |
** Available to Enterprise Customers. |
Issues Resolved In This Hotfix
This hotfix resolves the following issues:
- If customers upgrade a host with legacy disk partition from XenServer 6.x to XenServer 7.1 CU1, and then attempt to apply a subsequent Cumulative Update as an update, they may receive an insufficient space error. This hotfix includes a fix to reduce the calculated space required to apply the update. You must apply this hotfix to XenServer 7.1 CU1 before attempting to update to a subsequent Cumulative Update. This hotfix should not be necessary on hosts that have the new host disk partition layout introduced in XenServer 7.0.
- When customers are attempting to use Jumbo Frames, a VM without PV drivers installed would cause the MTU to drop to 1500 as the MTU was only being set for the paravirtualised VIF device and not for the fully emulated TAP device.
This hotfix also includes the following previously released hotfixes:
- CTX232564 – Hotfix XS71ECU1011 – For XenServer 7.1 Cumulative Update 1
- CTX236478 – Hotfix XS71ECU1018 – For XenServer 7.1 Cumulative Update 1
- CTX236908 – Hotfix XS71ECU1024 – For XenServer 7.1 Cumulative Update 1
Installing the Hotfix
Customers should use either XenCenter or the XenServer Command Line Interface (CLI) to apply this hotfix. As with any software update, back up your data before applying this update. Citrix recommends updating all hosts within a pool sequentially. Upgrading of hosts should be scheduled to minimize the amount of time the pool runs in a “mixed state” where some hosts are upgraded and some are not. Running a mixed pool of updated and non-updated hosts for general operation is not supported.
Note: The attachment to this article is a zip file. It contains the hotfix update package only. Click the following link to download the source code for any modified open source components XS71ECU1033-sources.iso. The source code is not necessary for hotfix installation: it is provided to fulfill licensing obligations.
Installing the Hotfix by using XenCenter
Choose an Installation Mechanism
There are three mechanisms to install a hotfix:
- Automated Updates
- Download update from Citrix
- Select update or Supplemental pack from disk
The Automated Updates feature is available for XenServer Enterprise Edition customers, or to those who have access to XenServer through their XenApp/XenDesktop entitlement. For information about installing a hotfix using the Automated Updates feature, see the Applying Automated Updates in the XenServer documentation.
For information about installing a hotfix using the Download update from Citrix option, see Applying an Update to a Pool in the XenServer documentation.
The following section contains instructions on option (3) installing a hotfix that you have downloaded to disk:
- Download the hotfix to a known location on a computer that has XenCenter installed.
- Unzip the hotfix zip file and extract the .iso file
- In XenCenter, on the Tools menu, select Install Update. This displays the Install Update wizard.
- Read the information displayed on the Before You Start page and click Next to start the wizard.
- Click Browse to locate the iso file, select XS71ECU1033.iso and then click Open.
- Click Next.
- Select the pool or hosts you wish to apply the hotfix to, and then click Next.
- The Install Update wizard performs a number of update prechecks, including the space available on the hosts, to ensure that the pool is in a valid configuration state. The wizard also checks whether the hosts need to be rebooted after the update is applied and displays the result.
- Choose the Update Mode. Review the information displayed on the screen and select an appropriate mode.
- Click Install update to proceed with the installation. The Install Update wizard shows the progress of the update, displaying the major operations that XenCenter performs while updating each host in the pool.
- When the update is applied, click Finish to close the wizard.
- If you chose to carry out the post-update tasks, do so now.
Follow the on-screen recommendations to resolve any update prechecks that have failed. If you want XenCenter to automatically resolve all failed prechecks, click Resolve All. When the prechecks have been resolved, click Next.
Note: If you click Cancel at this stage, the Install Update wizard reverts the changes and removes the update file from the host.
Installing the Hotfix by using the xe Command Line Interface
- Download the hotfix file to a known location.
- Extract the .iso file from the zip.
- Upload the .iso file to the Pool Master by entering the following commands:
(Where -s is the Pool Master’s IP address or DNS name.)
xe -s <server> -u <username> -pw <password> update-upload file-name=<filename>XS71ECU1033.iso
XenServer assigns the update file a UUID which this command prints. Note the UUID.
4058e644-e819-11e8-842a-b36f8ca04d81
- Apply the update to all hosts in the pool, specifying the UUID of the update:
xe update-pool-apply uuid=4058e644-e819-11e8-842a-b36f8ca04d81
Alternatively, if you need to update and restart hosts in a rolling manner, you can apply the update file to an individual host by running the following:
xe update-apply host=<host> uuid=4058e644-e819-11e8-842a-b36f8ca04d81
- Verify that the update was applied by using the update-list command.
xe update-list -s <server> -u root -pw <password> name-label=XS71ECU1033
If the update is successful, the hosts field contains the UUIDs of the hosts to which this patch was successfully applied. This should be a complete list of all hosts in the pool.
Files
Hotfix File
Component | Details |
---|---|
Hotfix Filename | XS71ECU1033.iso |
Hotfix File sha256 | b97c6d527df01ddac8d37746cb4c9d1a80d238b75cb82baf2cba433dcd22413a |
Hotfix Source Filename | XS71ECU1033-sources.iso |
Hotfix Source File sha256 | b33ecea9f4577f674fc725a0f47bb281aa3dbe7e7c6487ae3ff1c881572dd2f7 |
Hotfix Zip Filename | XS71ECU1033.zip |
Hotfix Zip File sha256 | c8fc91a8e4e589e98879e05853bf5f03bdc5165fbbbad3dfcf62e830cb35c893 |
Size of the Zip file | 48.9 MB |
Files Updated
squeezed-0.13.2-1.el7.centos.x86_64.rpm |
v6d-citrix-10.0.7-1.el7.centos.x86_64.rpm |
vhd-tool-0.11.3-1.el7.centos.x86_64.rpm |
xapi-core-1.14.39.1-1.x86_64.rpm |
xapi-tests-1.14.39.1-1.x86_64.rpm |
xapi-xe-1.14.39.1-1.x86_64.rpm |
xcp-networkd-0.13.6-1.el7.centos.x86_64.rpm |
xenopsd-0.17.12-1.el7.centos.x86_64.rpm |
xenopsd-xc-0.17.12-1.el7.centos.x86_64.rpm |
xenopsd-xenlight-0.17.12-1.el7.centos.x86_64.rpm |
More Information
For more information, see XenServer Documentation.
If you experience any difficulties, contact Citrix Technical Support.
Related:
Hotfix XS71ECU1031 – For XenServer 7.1 CU1
Who Should Install This Hotfix?
This is a hotfix for customers running XenServer 7.1 Cumulative Update 1.
All customers who are affected by the issues described in CTX239100 – Citrix XenServer Multiple Security Updates should install this hotfix.
Note: This hotfix is available only to customers on the Customer Success Services program.
Information About this Hotfix
Component | Details |
---|---|
Prerequisite | None |
Post-update tasks* | Restart Host |
Content live patchable** | Yes |
Baselines for Live Patch | XS71ECU1026 |
Revision History |
Published on October 26, 2018 |
** Available to Enterprise Customers. |
Issues Resolved In This Hotfix
This security hotfix addresses the vulnerabilities as described in the Security Bulletin above.
This hotfix also includes the following previously released hotfixes:
- CTX227235 – Hotfix XS71ECU1001 – For XenServer 7.1 Cumulative Update 1
- CTX228721 – Hotfix XS71ECU1003 – For XenServer 7.1 Cumulative Update 1
- CTX229066 – Hotfix XS71ECU1004 – For XenServer 7.1 Cumulative Update 1
- CTX230160 – Hotfix XS71ECU1008 – For XenServer 7.1 Cumulative Update 1
- CTX230788 SUPERSEDED – Hotfix XS71ECU1009 – For XenServer 7.1 Cumulative Update 1
- CTX231719 – Hotfix XS71ECU1010 – For XenServer 7.1 Cumulative Update 1
- CTX233365 – Hotfix XS71ECU1012 – For XenServer 7.1 Cumulative Update 1
- CTX234437 – Hotfix XS71ECU1016 – For XenServer 7.1 Cumulative Update 1
- CTX235131 – Hotfix XS71ECU1017 – For XenServer 7.1 Cumulative Update 1
- CTX235957 – Hotfix XS71ECU1022 – For XenServer 7.1 Cumulative Update 1
- CTX236150 – Hotfix XS71ECU1023 – For XenServer 7.1 Cumulative Update 1
- CTX237088 – Hotfix XS71ECU1026- For XenServer 7.1 Cumulative Update 1
Installing the Hotfix
Customers should use either XenCenter or the XenServer Command Line Interface (CLI) to apply this hotfix. As with any software update, back up your data before applying this update. Citrix recommends updating all hosts within a pool sequentially. Upgrading of hosts should be scheduled to minimize the amount of time the pool runs in a “mixed state” where some hosts are upgraded and some are not. Running a mixed pool of updated and non-updated hosts for general operation is not supported.
Note: The attachment to this article is a zip file. It contains the hotfix update package only. Click the following link to download the source code for any modified open source components XS71ECU1031-sources.iso. The source code is not necessary for hotfix installation: it is provided to fulfill licensing obligations.
Installing the Hotfix by using XenCenter
Choose an Installation Mechanism
There are three mechanisms to install a hotfix:
- Automated Updates
- Download update from Citrix
- Select update or Supplemental pack from disk
The Automated Updates feature is available for XenServer Enterprise Edition customers, or to those who have access to XenServer through their XenApp/XenDesktop entitlement. For information about installing a hotfix using the Automated Updates feature, see the Applying Automated Updates in the XenServer documentation.
For information about installing a hotfix using the Download update from Citrix option, see Applying an Update to a Pool in the XenServer documentation.
The following section contains instructions on option (3) installing a hotfix that you have downloaded to disk:
- Download the hotfix to a known location on a computer that has XenCenter installed.
- Unzip the hotfix zip file and extract the .iso file
- In XenCenter, on the Tools menu, select Install Update. This displays the Install Update wizard.
- Read the information displayed on the Before You Start page and click Next to start the wizard.
- Click Browse to locate the iso file, select XS71ECU1031.iso and then click Open.
- Click Next.
- Select the pool or hosts you wish to apply the hotfix to, and then click Next.
- The Install Update wizard performs a number of update prechecks, including the space available on the hosts, to ensure that the pool is in a valid configuration state. The wizard also checks whether the hosts need to be rebooted after the update is applied and displays the result.
- Choose the Update Mode. Review the information displayed on the screen and select an appropriate mode.
- Click Install update to proceed with the installation. The Install Update wizard shows the progress of the update, displaying the major operations that XenCenter performs while updating each host in the pool.
- When the update is applied, click Finish to close the wizard.
- If you chose to carry out the post-update tasks, do so now.
Follow the on-screen recommendations to resolve any update prechecks that have failed. If you want XenCenter to automatically resolve all failed prechecks, click Resolve All. When the prechecks have been resolved, click Next.
Note: If you click Cancel at this stage, the Install Update wizard reverts the changes and removes the update file from the host.
Installing the Hotfix by using the xe Command Line Interface
- Download the hotfix file to a known location.
- Extract the .iso file from the zip.
- Upload the .iso file to the Pool Master by entering the following commands:
(Where -s is the Pool Master’s IP address or DNS name.)
xe -s <server> -u <username> -pw <password> update-upload file-name=<filename>XS71ECU1031.iso
XenServer assigns the update file a UUID which this command prints. Note the UUID.
5b7e23fc-4b4f-43c3-8691-d7b453c771c3
- Apply the update to all hosts in the pool, specifying the UUID of the update:
xe update-pool-apply uuid=5b7e23fc-4b4f-43c3-8691-d7b453c771c3
Alternatively, if you need to update and restart hosts in a rolling manner, you can apply the update file to an individual host by running the following:
xe update-apply host=<host> uuid=5b7e23fc-4b4f-43c3-8691-d7b453c771c3
- Verify that the update was applied by using the update-list command.
xe update-list -s <server> -u root -pw <password> name-label=XS71ECU1031
If the update is successful, the hosts field contains the UUIDs of the hosts to which this patch was successfully applied. This should be a complete list of all hosts in the pool.
- If the hotfix is applied successfully, restart each host in the pool, starting with the master.
Files
Hotfix File
Component | Details |
---|---|
Hotfix Filename | XS71ECU1031.iso |
Hotfix File sha256 | f58de41675ae60d19be43ed8990edba3b9037f58f05292316bf76690735ed9ca |
Hotfix Source Filename | XS71ECU1031-sources.iso |
Hotfix Source File sha256 | fc52d65d6173fba1b6f495f6df3159cddcf3675462d66336d775c0a4b11750bb |
Hotfix Zip Filename | XS71ECU1031.zip |
Hotfix Zip File sha256 | ac9e69847dcd8e075b03ae463e36e5c88f61eef1071b3928c22190320e2df8cf |
Size of the Zip file | 31.84 MB |
Files Updated
dracut-033-360.el7.centos.xs13.x86_64.rpm |
dracut-network-033-360.el7.centos.xs13.x86_64.rpm |
kexec-tools-2.0.4-31.x86_64.rpm |
linux-firmware-20170622-3.2.noarch.rpm |
microcode_ctl-2.1-26.xs1.x86_64.rpm |
xen-dom0-libs-4.7.5-1.22.x86_64.rpm |
xen-dom0-tools-4.7.5-1.22.x86_64.rpm |
xen-hypervisor-4.7.5-1.22.x86_64.rpm |
xen-libs-4.7.5-1.22.x86_64.rpm |
xen-livepatch_4.7.5_1.21-1-1.x86_64.rpm |
xen-tools-4.7.5-1.22.x86_64.rpm |
More Information
For more information, see XenServer Documentation.
If you experience any difficulties, contact Citrix Technical Support.
Related:
Upgrading Workload Balancing with Internet Access
Upgrading with the Internet requires that you download GNU wget, an HTTP retrieval utility. You also need to download a Python script that configures a repository (add-repo.py) on your virtual appliance.
To upgrade Workload Balancing in environments with Internet access
1. If you have not done so already, log in to the Workload Balancing appliance you want to upgrade as described in Section 8.1.1, “Logging in to the Workload Balancing Virtual Appliance”
2. Install GNU wget so you can retrieve the upgrade repository installation script using HTTP:
a. From the bash prompt, run the following command:
yum install wget
b. During installation, wget Setup asks you to accept various prompts, such as the size of the download package and the CentOS key. Type y when prompted.
3. When the wget installation is complete, download “add-repo” script by running the following command:
wget http://updates.xensource.com/XenServer/WLB/6.5/add-repo.py
When this command finishes running, a message appears stating the ‘add-repo.py’ script is saved.
4. At the bash prompt, run the following command to create the upgrade repository on the Workload Balancing appliance:
python add-repo.py
After the script finishes, the output states “Done.”
5. Do one of the following to upgrade your Workload Balancing virtual appliance:
• To upgrade both CentOS and Workload Balancing, run:
yum update
• To upgrade Workload Balancing only, run:
yum update citrix-wlb
• To upgrade CentOS only, run:
yum update –disablerepo=citrix-wlb
6. After upgrading either CentOS or Workload Balancing or both, restart the Workload Balancing virtual appliance.
Note:
After upgrading CentOS, the operating-system time changes from Coordinated Universal Time (UTC) to the local time zone. One side effect of this change is that the timestamps in the Workload Balancing log file (LogFile.log) also change from UTC time to local time. If you want to change the system time back to UTC time, run the following command in the Workload Balancing virtual appliance: rm -rf /etc/localtime.
Related:
Hotfix XS71ECU1026 – For XenServer 7.1 Cumulative Update 1
Who Should Install This Hotfix?
This is a hotfix for customers running XenServer 7.1 Cumulative Update 1.
All customers who are affected by the issues described in CTX236548 – Citrix XenServer Multiple Security Updates should install this hotfix.
Important: Customers running XenServer on AMD hardware may not be able to live migrate VMs back to the updated host. For more information, see CTX237585 – Unable to live migrate VMs on AMD hardware.
Note: This hotfix is available only to customers on the Customer Success Services program.
Information About this Hotfix
Component | Details |
---|---|
Prerequisite | None |
Post-update tasks* | Restart Host |
Content live patchable** | No |
Baselines for Live Patch | N/A |
Revision History |
Published on August 14, 2018 |
** Available to Enterprise Customers. |
Issues Resolved In This Hotfix
This security hotfix addresses the vulnerabilities as described in the Security Bulletin above.
This hotfix also includes the following previously released hotfixes:
- CTX227235 – Hotfix XS71ECU1001 – For XenServer 7.1 Cumulative Update 1
- CTX228721 – Hotfix XS71ECU1003 – For XenServer 7.1 Cumulative Update 1
- CTX229066 – Hotfix XS71ECU1004 – For XenServer 7.1 Cumulative Update 1
- CTX230160 – Hotfix XS71ECU1008 – For XenServer 7.1 Cumulative Update 1
- CTX230788 SUPERSEDED – Hotfix XS71ECU1009 – For XenServer 7.1 Cumulative Update 1
- CTX231719 – Hotfix XS71ECU1010 – For XenServer 7.1 Cumulative Update 1
- CTX233365 – Hotfix XS71ECU1012 – For XenServer 7.1 Cumulative Update 1
- CTX234437 – Hotfix XS71ECU1016 – For XenServer 7.1 Cumulative Update 1
- CTX235131 – Hotfix XS71ECU1017 – For XenServer 7.1 Cumulative Update 1
- CTX235957 – Hotfix XS71ECU1022 – For XenServer 7.1 Cumulative Update 1
- CTX236150 – Hotfix XS71ECU1023 – For XenServer 7.1 Cumulative Update 1
Installing the Hotfix
Customers should use either XenCenter or the XenServer Command Line Interface (CLI) to apply this hotfix. As with any software update, back up your data before applying this update. Citrix recommends updating all hosts within a pool sequentially. Upgrading of hosts should be scheduled to minimize the amount of time the pool runs in a “mixed state” where some hosts are upgraded and some are not. Running a mixed pool of updated and non-updated hosts for general operation is not supported.
Note: The attachment to this article is a zip file. It contains the hotfix update package only. Click the following link to download the source code for any modified open source components XS71ECU1026-sources.iso. The source code is not necessary for hotfix installation: it is provided to fulfill licensing obligations.
Installing the Hotfix by using XenCenter
Choose an Installation Mechanism
There are three mechanisms to install a hotfix:
- Automated Updates
- Download update from Citrix
- Select update or Supplemental pack from disk
The Automated Updates feature is available for XenServer Enterprise Edition customers, or to those who have access to XenServer through their XenApp/XenDesktop entitlement. For information about installing a hotfix using the Automated Updates feature, see the section Applying Automated Updates in the XenServer Installation Guide.
For information about installing a hotfix using the Download update from Citrix option, see the section Applying an Update to a Pool in the XenServer Installation Guide.
The following section contains instructions on option (3) installing a hotfix that you have downloaded to disk:
- Download the hotfix to a known location on a computer that has XenCenter installed.
- Unzip the hotfix zip file and extract the .iso file
- In XenCenter, on the Tools menu, select Install Update. This displays the Install Update wizard.
- Read the information displayed on the Before You Start page and click Next to start the wizard.
- Click Browse to locate the iso file, select XS71ECU1026.iso and then click Open.
- Click Next.
- Select the pool or hosts you wish to apply the hotfix to, and then click Next.
- The Install Update wizard performs a number of update prechecks, including the space available on the hosts, to ensure that the pool is in a valid configuration state. The wizard also checks whether the hosts need to be rebooted after the update is applied and displays the result.
- Choose the Update Mode. Review the information displayed on the screen and select an appropriate mode.
- Click Install update to proceed with the installation. The Install Update wizard shows the progress of the update, displaying the major operations that XenCenter performs while updating each host in the pool.
- When the update is applied, click Finish to close the wizard.
- If you chose to carry out the post-update tasks, do so now.
Follow the on-screen recommendations to resolve any update prechecks that have failed. If you want XenCenter to automatically resolve all failed prechecks, click Resolve All. When the prechecks have been resolved, click Next.
Note: If you click Cancel at this stage, the Install Update wizard reverts the changes and removes the update file from the host.
Installing the Hotfix by using the xe Command Line Interface
- Download the hotfix file to a known location.
- Extract the .iso file from the zip.
- Upload the .iso file to the Pool Master by entering the following commands:
(Where -s is the Pool Master’s IP address or DNS name.)
xe -s <server> -u <username> -pw <password> update-upload file-name=<filename>XS71ECU1026.iso
XenServer assigns the update file a UUID which this command prints. Note the UUID.
558b7a50-a412-471c-81a1-9f5cf87f1011
- Apply the update to all hosts in the pool, specifying the UUID of the update:
xe update-pool-apply uuid=558b7a50-a412-471c-81a1-9f5cf87f1011
Alternatively, if you need to update and restart hosts in a rolling manner, you can apply the update file to an individual host by running the following:
xe update-apply host=<host> uuid=558b7a50-a412-471c-81a1-9f5cf87f1011
Verify that the update was applied by using the update-list command.
-
xe update-list -s <server> -u root -pw <password> name-label=XS71ECU1026
If the update is successful, the hosts field contains the UUIDs of the hosts to which this patch was successfully applied. This should be a complete list of all hosts in the pool.
- If the hotfix is applied successfully, restart each host in the pool, starting with the master.
Files
Hotfix File
Component | Details |
---|---|
Hotfix Filename | XS71ECU1026.iso |
Hotfix File sha256 | 4ee056f647d2cb659d7ccc337c8a9f5be394c029b8351b0484644cbdc1d36472 |
Hotfix Source Filename | XS71ECU1026-sources.iso |
Hotfix Source File sha256 | 2a6188b061d2bbbe8cff5f41ecf63b65ddd6b7d5777c5da6ec232434f5adf95e |
Hotfix Zip Filename | XS71ECU1026.zip |
Hotfix Zip File sha256 | 92e672c5d242fef72411ea0e3aeed0bdad1318ebf13d4a92872bdf4c04154f9f |
Size of the Zip file | 31.83 MB |
Files Updated
dracut-033-360.el7.centos.xs13.x86_64.rpm |
dracut-network-033-360.el7.centos.xs13.x86_64.rpm |
kexec-tools-2.0.4-31.x86_64.rpm |
linux-firmware-20170622-3.2.noarch.rpm |
microcode_ctl-2.1-26.xs1.x86_64.rpm |
xen-dom0-libs-4.7.5-1.21.x86_64.rpm |
xen-dom0-tools-4.7.5-1.21.x86_64.rpm |
xen-hypervisor-4.7.5-1.21.x86_64.rpm |
xen-libs-4.7.5-1.21.x86_64.rpm |
xen-tools-4.7.5-1.21.x86_64.rpm |
More Information
For more information, see XenServer Documentation.
If you experience any difficulties, contact Citrix Technical Support.