- Issued:
- 2009-10-20
- Updated:
- 2009-10-20
RHBA-2009:1516 - Bug Fix Advisory
Synopsis
cman bug-fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated cman packages that fix a bug are now available.
Description
The Cluster Manager (cman) utility provides user-level services for
managing a Linux cluster.
This update applies the following bug fix:
Add support for power cycle command to fence_ipmi, which doesn't shut down
the BMC controller.
Old behavior is still the default, so nothing changes without a
configuration change. Now there is a new method option that can have the
value "cycle", which uses the ipmi power cycle command.
Example of usage:...
<fencedevices>
<fencedevice agent="fence_ipmilan_new" ipaddr="1.2.3.4"
login="root" name="ipmifd1" passwd="password" method="cycle" />
...
Users are advised to upgrade to these updated cman packages, which resolve
this issue.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 522529 - ipmi fence failed
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
cman-2.0.115-1.el5_4.3.src.rpm | SHA-256: 359407f88c9b64daac99a1fe3b1a6bbaac17885149af757ab6f957483f830e27 |
x86_64 | |
cman-2.0.115-1.el5_4.3.x86_64.rpm | SHA-256: 29b4a6f43e50c87963493092ca0969a27116fcb1245ad0e105db07b92406d7b5 |
cman-devel-2.0.115-1.el5_4.3.i386.rpm | SHA-256: 40cfc7e1b7efde537f136c621e2919789616b34435bd1a698bf10272c3a77b55 |
cman-devel-2.0.115-1.el5_4.3.x86_64.rpm | SHA-256: 0124820a496b02cf3a3b6fc9ac767b6dc8420a1cce087e265c1aff2b6ef756e1 |
ia64 | |
cman-2.0.115-1.el5_4.3.ia64.rpm | SHA-256: 5ae71d05e63bab279120058d48733716a21c7978c4912990e83e921802a233da |
cman-devel-2.0.115-1.el5_4.3.ia64.rpm | SHA-256: c80347119e859547ebb760aabc9b4b88085b22eae5e6a3c9fdfa68977d173868 |
i386 | |
cman-2.0.115-1.el5_4.3.i386.rpm | SHA-256: 82fdde0ff833b4b4154361ffa9bdbc2cc8eab2b81667647e373014b972904ed3 |
cman-devel-2.0.115-1.el5_4.3.i386.rpm | SHA-256: 40cfc7e1b7efde537f136c621e2919789616b34435bd1a698bf10272c3a77b55 |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4
SRPM | |
---|---|
x86_64 | |
ia64 | |
i386 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
cman-2.0.115-1.el5_4.3.src.rpm | SHA-256: 359407f88c9b64daac99a1fe3b1a6bbaac17885149af757ab6f957483f830e27 |
x86_64 | |
cman-2.0.115-1.el5_4.3.x86_64.rpm | SHA-256: 29b4a6f43e50c87963493092ca0969a27116fcb1245ad0e105db07b92406d7b5 |
cman-devel-2.0.115-1.el5_4.3.i386.rpm | SHA-256: 40cfc7e1b7efde537f136c621e2919789616b34435bd1a698bf10272c3a77b55 |
cman-devel-2.0.115-1.el5_4.3.x86_64.rpm | SHA-256: 0124820a496b02cf3a3b6fc9ac767b6dc8420a1cce087e265c1aff2b6ef756e1 |
i386 | |
cman-2.0.115-1.el5_4.3.i386.rpm | SHA-256: 82fdde0ff833b4b4154361ffa9bdbc2cc8eab2b81667647e373014b972904ed3 |
cman-devel-2.0.115-1.el5_4.3.i386.rpm | SHA-256: 40cfc7e1b7efde537f136c621e2919789616b34435bd1a698bf10272c3a77b55 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
cman-2.0.115-1.el5_4.3.src.rpm | SHA-256: 359407f88c9b64daac99a1fe3b1a6bbaac17885149af757ab6f957483f830e27 |
s390x | |
cman-2.0.115-1.el5_4.3.s390x.rpm | SHA-256: 1a06a20ec7505e0f097060cea6f7678a838b6f513ba00cb987a6a0199d806fd3 |
cman-devel-2.0.115-1.el5_4.3.s390.rpm | SHA-256: 3e63942c8394d3c3db74bfe451e6416a611cdbd23554ced9e4c4f0e46f40fede |
cman-devel-2.0.115-1.el5_4.3.s390x.rpm | SHA-256: 5477dc5c3a7af2ba5d882236b8a67b458ae0e01ebd589990e5d763e1e1645ded |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4
SRPM | |
---|---|
s390x |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
cman-2.0.115-1.el5_4.3.src.rpm | SHA-256: 359407f88c9b64daac99a1fe3b1a6bbaac17885149af757ab6f957483f830e27 |
ppc | |
cman-2.0.115-1.el5_4.3.ppc.rpm | SHA-256: 5003823d6ddf990016fc9e39753f4346f54e64d51570043bd8dc5b47468ece54 |
cman-devel-2.0.115-1.el5_4.3.ppc.rpm | SHA-256: dadf93962c87ed4efedab5d8738d5655b87315c3016c19c9df03cab19f350cb9 |
cman-devel-2.0.115-1.el5_4.3.ppc64.rpm | SHA-256: 8f0f2bffa5d04a4247129f5aa9221f03966b28a1768c121716785a5e06e8f472 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4
SRPM | |
---|---|
ppc |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
cman-2.0.115-1.el5_4.3.src.rpm | SHA-256: 359407f88c9b64daac99a1fe3b1a6bbaac17885149af757ab6f957483f830e27 |
x86_64 | |
cman-2.0.115-1.el5_4.3.x86_64.rpm | SHA-256: 29b4a6f43e50c87963493092ca0969a27116fcb1245ad0e105db07b92406d7b5 |
cman-devel-2.0.115-1.el5_4.3.i386.rpm | SHA-256: 40cfc7e1b7efde537f136c621e2919789616b34435bd1a698bf10272c3a77b55 |
cman-devel-2.0.115-1.el5_4.3.x86_64.rpm | SHA-256: 0124820a496b02cf3a3b6fc9ac767b6dc8420a1cce087e265c1aff2b6ef756e1 |
i386 | |
cman-2.0.115-1.el5_4.3.i386.rpm | SHA-256: 82fdde0ff833b4b4154361ffa9bdbc2cc8eab2b81667647e373014b972904ed3 |
cman-devel-2.0.115-1.el5_4.3.i386.rpm | SHA-256: 40cfc7e1b7efde537f136c621e2919789616b34435bd1a698bf10272c3a77b55 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.