- Issued:
- 2008-03-24
- Updated:
- 2008-03-24
RHBA-2008:0188 - Bug Fix Advisory
Synopsis
cman bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated cman packages that fix several bugs are now available.
Description
The Cluster Manager (cman) utility provides user-level services for
managing a Red Hat cluster.
The updated cman packages fix the following bugs:
- ccsd consumes 90%+ of the CPU during startup when two clusters on the
same subnet with different endian architectures are used.
- Potentially, a panic is caused after a device_write on ppc64 architectures.
- qdisk ignores the interval set in cluster.conf to check the heuristics.
All cman users should upgrade to the updated packages, which resolve
these bugs.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.1 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.1 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 428325 - Mixed endian clusters on same subnet can cause ccsd to consume 90+% memory and cpu during startup.
- BZ - 429181 - DLM: panic after device_write
- BZ - 430574 - qdisk does not check the heuristics
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
cman-2.0.73-1.el5_1.5.src.rpm | SHA-256: 798d706bb07a4c8f546bad281a1b6ed72ac8c27de497bdd745b8c47d9f1b439a |
x86_64 | |
cman-2.0.73-1.el5_1.5.x86_64.rpm | SHA-256: 2c1a0a6196cb6cb496e3af228f0a5fbbd25573d909451747486569d0ad530931 |
cman-devel-2.0.73-1.el5_1.5.i386.rpm | SHA-256: a0074ce10e189047f4319d461299717b06182de033ba85e63038d52463e532b0 |
cman-devel-2.0.73-1.el5_1.5.x86_64.rpm | SHA-256: 4d197dc630cf8bbd21ed9412e6d7610d8a2133d4e246e3aced4f921912cf09d0 |
ia64 | |
cman-2.0.73-1.el5_1.5.ia64.rpm | SHA-256: 96fea25e1846b51ee6ab50c3087852c2e84b9a6a4e0ecfcabbb50681e9ce4462 |
cman-devel-2.0.73-1.el5_1.5.ia64.rpm | SHA-256: fac1a90f283cde5488942a7d4df15def7b9a0f590216eb293a1b734b36e3a513 |
i386 | |
cman-2.0.73-1.el5_1.5.i386.rpm | SHA-256: c47e10b6fd7d0eb4ef5265aba74eb15496077acdf051e3f0c90e6282df1d2af1 |
cman-devel-2.0.73-1.el5_1.5.i386.rpm | SHA-256: a0074ce10e189047f4319d461299717b06182de033ba85e63038d52463e532b0 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.1
SRPM | |
---|---|
x86_64 | |
ia64 | |
i386 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
cman-2.0.73-1.el5_1.5.src.rpm | SHA-256: 798d706bb07a4c8f546bad281a1b6ed72ac8c27de497bdd745b8c47d9f1b439a |
x86_64 | |
cman-2.0.73-1.el5_1.5.x86_64.rpm | SHA-256: 2c1a0a6196cb6cb496e3af228f0a5fbbd25573d909451747486569d0ad530931 |
cman-devel-2.0.73-1.el5_1.5.i386.rpm | SHA-256: a0074ce10e189047f4319d461299717b06182de033ba85e63038d52463e532b0 |
cman-devel-2.0.73-1.el5_1.5.x86_64.rpm | SHA-256: 4d197dc630cf8bbd21ed9412e6d7610d8a2133d4e246e3aced4f921912cf09d0 |
i386 | |
cman-2.0.73-1.el5_1.5.i386.rpm | SHA-256: c47e10b6fd7d0eb4ef5265aba74eb15496077acdf051e3f0c90e6282df1d2af1 |
cman-devel-2.0.73-1.el5_1.5.i386.rpm | SHA-256: a0074ce10e189047f4319d461299717b06182de033ba85e63038d52463e532b0 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
cman-2.0.73-1.el5_1.5.src.rpm | SHA-256: 798d706bb07a4c8f546bad281a1b6ed72ac8c27de497bdd745b8c47d9f1b439a |
s390x | |
cman-2.0.73-1.el5_1.5.s390x.rpm | SHA-256: f0cbeb4dbe8cfb02d918cef8fd6f7e93fa471a2b5f25cd25528e82317e924501 |
cman-devel-2.0.73-1.el5_1.5.s390.rpm | SHA-256: 23e256cbcb60b7bafb0479aa667a408cd0fc6fe1d74cb1f30deae8c4612b8854 |
cman-devel-2.0.73-1.el5_1.5.s390x.rpm | SHA-256: ec42ed1046046f1b8749b046f44d442f8484ff18ecc2e45a1ecb2efb448bc536 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.1
SRPM | |
---|---|
s390x |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
cman-2.0.73-1.el5_1.5.src.rpm | SHA-256: 798d706bb07a4c8f546bad281a1b6ed72ac8c27de497bdd745b8c47d9f1b439a |
ppc | |
cman-2.0.73-1.el5_1.5.ppc.rpm | SHA-256: d810396b1bd4069f230e7d370c7b91475d358443ae9f23748d2baca42f0ee6b0 |
cman-devel-2.0.73-1.el5_1.5.ppc.rpm | SHA-256: e8380942abc1d3d7c7c35e33a139f09233e7bd955482acb74ddd312c0c5aea6d |
cman-devel-2.0.73-1.el5_1.5.ppc64.rpm | SHA-256: 9794fbd1faa096a19fb3e6dbc2befd24b9e6ab7b390165c41720520e0d6028b5 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.1
SRPM | |
---|---|
ppc |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
cman-2.0.73-1.el5_1.5.src.rpm | SHA-256: 798d706bb07a4c8f546bad281a1b6ed72ac8c27de497bdd745b8c47d9f1b439a |
x86_64 | |
cman-2.0.73-1.el5_1.5.x86_64.rpm | SHA-256: 2c1a0a6196cb6cb496e3af228f0a5fbbd25573d909451747486569d0ad530931 |
cman-devel-2.0.73-1.el5_1.5.i386.rpm | SHA-256: a0074ce10e189047f4319d461299717b06182de033ba85e63038d52463e532b0 |
cman-devel-2.0.73-1.el5_1.5.x86_64.rpm | SHA-256: 4d197dc630cf8bbd21ed9412e6d7610d8a2133d4e246e3aced4f921912cf09d0 |
i386 | |
cman-2.0.73-1.el5_1.5.i386.rpm | SHA-256: c47e10b6fd7d0eb4ef5265aba74eb15496077acdf051e3f0c90e6282df1d2af1 |
cman-devel-2.0.73-1.el5_1.5.i386.rpm | SHA-256: a0074ce10e189047f4319d461299717b06182de033ba85e63038d52463e532b0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.