IMPORTANT NOTICE: Patch Available, Immediate Installation Required
We are pleased to announce that we have completed all Engineering (Development and Quality Assurance) related activities for the issue that impacted the following kernel and versions:
|RHEL/CentOS/OEL 8.2||All||SPS-L v9.5.1|
|RHEL 8.3||All||SPS-L v9.5.1|
|SLES 12 SP4||>= 4.12.14-95.51||SPS-L v9.3.2 – v9.5.1|
|SLES 12 SP5||4.12.14-122.20 – 4.12.14-122.74.0||SPS-L v9.5.0 – v9.5.1|
|SLES 15 SP1||>= 4.12.14-197.37.1||SPS-L v9.4.1 – v9.5.1|
|SLES 15 SP2||5.3.18-22.2 – 5.3.18-24.67.1||SPS-L v9.5.1|
|OEL 7.x UEK 5||4.14.35-2025.400.8 – 4.14.35-2047.504.1||SPS-L v9.4.0 – v9.5.1|
We recommend that all customers running SIOS Protection Suite for Linux v9.5.1 or earlier with DataKeeper replication on the operating systems listed above apply the SPS for Linux patch as soon as possible. The patch is located at: http://ftp.us.sios.com/pickup/HOTFIX-PL-9146-raid1_data_integrity_patch. Patched versions of the raid1 kernel module are distributed natively with v9.5.2 and are automatically installed on affected systems when installing or upgrading to v9.5.2. Please see the readme for the required steps to upgrade SIOS Protection Suite for Linux on systems running the patch.
The steps required to successfully install the patch are outlined in the readme file located in the patch folder. http://ftp.us.sios.com/pickup/HOTFIX-PL-9146-raid1_data_integrity_patch/readme.txt.html
The readme file will assist you with application of the patch by describing the pre-conditions, steps, and post-conditions and by providing recommended steps for verifying your data after the patch has been applied. This patch addresses the issue in the impacted raid1 kernel module immediately.
After you have applied the patch, we recommend that you do not update the kernel to a different version that does not include our patched raid1 kernel module. Refer to your Operating System documentation for restricting the automatic kernel updates. Also, you may refer to Solution 995 in our Self Service portal for restricting kernel updates with RHEL (log into the Customer Portal first to access). We will continue to provide updates for the final resolution.
If a kernel upgrade is required after applying the patch (due to security issues or regulations), please follow the steps in the “Performing a planned kernel upgrade after the patch has been installed” section of the readme file.
We are committed to providing you with the highest quality of products and services and we are always available to answer any questions you may have.