- Issued:
- 2006-08-10
- Updated:
- 2006-08-10
RHBA-2006:0558 - Bug Fix Advisory
Synopsis
dlm-kernel bug fix update
Type/Severity
Bug Fix Advisory
Topic
Updated dlm-kernel packages that fix module loading issues are now
available for Red Hat Enterprise Linux 4 Update 4, kernel release
(2.6.9-42.EL).
Description
The dlm-kernel modules allow the dlm (distributed lock manager) to
communicate with the kernel.
The following fixes were applied:
- Non-root users are now allowed to create the default namespace.
- A memory leak was detected and fixed.
- A bug which caused a "bad header version 7fffffff" error is now fixed.
- A bug which caused dlm to crash when initiating a LUN rescan with I/O is
now fixed.
- A bug which allowed one application to release a lockspace that another
application had in use is now fixed.
These updated dlm-kernel packages are in sync with the latest kernel
(2.6.9-42.EL). The modules in earlier dlm-kernel packages failed to load
because they did not match the running kernel. It was possible to force
load the modules; however, with this update, users no longer need to.
Users are advised to upgrade to these latest dlm-kernel packages, which
are updated for use with the 2.6.9-42.EL kernel.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux High Availability for x86_64 4 x86_64
- Red Hat Enterprise Linux High Availability for x86_64 4 ia64
- Red Hat Enterprise Linux High Availability for x86_64 4 i386
Fixes
- BZ - 173811 - dlm: midcomms: bad header version 7fffffff
- BZ - 177934 - dlm_release_lockspace from app A can cause app B to break
- BZ - 178453 - Slow memory leak in /proc/cluster/dlm_dir and /proc/cluster/dlm_locks
- BZ - 188525 - dlm_close crashes when initiating a LUN rescan with I/O present.
CVEs
(none)
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.