Skip to navigation

Bug Fix Advisory cman-kernel bug fix update

Advisory: RHBA-2010:0082-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-02-03
Last updated on: 2010-02-03
Affected Products: Cluster Suite EL4
Cluster Suite EL4.8.z

Details

Updated cman-kernel packages that fix module-loading issues are now
available for Red Hat Enterprise Linux 4.8, kernel release
2.6.9-89.0.19.EL.

The cman-kernel packages contain modules that allow the cluster manager
(cman) to communicate with the kernel.

These updated cman-kernel packages are in sync with the latest kernel
(2.6.9-89.0.19.EL). The modules in earlier cman-kernel packages fail to
load because they do not match the running kernel. It is possible to
force-load the modules; however, with this update, force-loading the
modules is not required. (BZ#557839)

Users are advised to upgrade to these latest cman-kernel packages, which
are updated for use with the 2.6.9-89.0.19.EL kernel.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Cluster Suite EL4

SRPMS:
cman-kernel-2.6.9-56.7.el4_8.10.src.rpm
File outdated by:  RHBA-2011:0157
    MD5: 7506a3f01ca7ea15df62db9475b3bfb8
 
IA-32:
cman-kernel-2.6.9-56.7.el4_8.10.i686.rpm
File outdated by:  RHBA-2012:0115
    MD5: 96d1f8694d6c1f57b859b00378d3e61d
cman-kernel-hugemem-2.6.9-56.7.el4_8.10.i686.rpm
File outdated by:  RHBA-2012:0115
    MD5: 5b6c65fc13dd3f3e5d5f9b3b2d94a7de
cman-kernel-smp-2.6.9-56.7.el4_8.10.i686.rpm
File outdated by:  RHBA-2012:0115
    MD5: fd327ecde570e429bf197abf82534179
cman-kernel-xenU-2.6.9-56.7.el4_8.10.i686.rpm
File outdated by:  RHBA-2012:0115
    MD5: f9b31023de92e18ff17a8d87cb682c04
cman-kernheaders-2.6.9-56.7.el4_8.10.i686.rpm
File outdated by:  RHBA-2012:0115
    MD5: 8bf34328361e351fa7c6fafba0cdd6ae
 
IA-64:
cman-kernel-2.6.9-56.7.el4_8.10.ia64.rpm
File outdated by:  RHBA-2012:0115
    MD5: 30365596bbb9f5715ad977369e7fe1cf
cman-kernheaders-2.6.9-56.7.el4_8.10.ia64.rpm
File outdated by:  RHBA-2012:0115
    MD5: 18381494d460c3d90d9398c5ad6efbf8
 
PPC:
cman-kernel-2.6.9-56.7.el4_8.10.ppc64.rpm
File outdated by:  RHBA-2012:0115
    MD5: a91c994f50dde02b9955c604a0ae8f0f
cman-kernel-largesmp-2.6.9-56.7.el4_8.10.ppc64.rpm
File outdated by:  RHBA-2012:0115
    MD5: e91b25543fddc5c020df64966e408716
cman-kernheaders-2.6.9-56.7.el4_8.10.ppc64.rpm
File outdated by:  RHBA-2012:0115
    MD5: b43179fc07680bc108bce5995ae7eb3f
 
x86_64:
cman-kernel-2.6.9-56.7.el4_8.10.x86_64.rpm
File outdated by:  RHBA-2012:0115
    MD5: e669e38a177682100d871dfb8b4a950b
cman-kernel-largesmp-2.6.9-56.7.el4_8.10.x86_64.rpm
File outdated by:  RHBA-2012:0115
    MD5: f52c8a5c65151e311fe6b42aaf3d624d
cman-kernel-smp-2.6.9-56.7.el4_8.10.x86_64.rpm
File outdated by:  RHBA-2012:0115
    MD5: 1bfd2dcb142a66211fec07a28762c165
cman-kernel-xenU-2.6.9-56.7.el4_8.10.x86_64.rpm
File outdated by:  RHBA-2012:0115
    MD5: c690349ff53f3650130c0c8454c6a503
cman-kernheaders-2.6.9-56.7.el4_8.10.x86_64.rpm
File outdated by:  RHBA-2012:0115
    MD5: 57bb6edd6bb885d0c738411130c15375
 
Cluster Suite EL4.8.z

SRPMS:
cman-kernel-2.6.9-56.7.el4_8.10.src.rpm
File outdated by:  RHBA-2011:0157
    MD5: 7506a3f01ca7ea15df62db9475b3bfb8
 
IA-32:
cman-kernel-2.6.9-56.7.el4_8.10.i686.rpm
File outdated by:  RHBA-2011:0157
    MD5: 96d1f8694d6c1f57b859b00378d3e61d
cman-kernel-hugemem-2.6.9-56.7.el4_8.10.i686.rpm
File outdated by:  RHBA-2011:0157
    MD5: 5b6c65fc13dd3f3e5d5f9b3b2d94a7de
cman-kernel-smp-2.6.9-56.7.el4_8.10.i686.rpm
File outdated by:  RHBA-2011:0157
    MD5: fd327ecde570e429bf197abf82534179
cman-kernel-xenU-2.6.9-56.7.el4_8.10.i686.rpm
File outdated by:  RHBA-2011:0157
    MD5: f9b31023de92e18ff17a8d87cb682c04
cman-kernheaders-2.6.9-56.7.el4_8.10.i686.rpm
File outdated by:  RHBA-2011:0157
    MD5: 8bf34328361e351fa7c6fafba0cdd6ae
 
IA-64:
cman-kernel-2.6.9-56.7.el4_8.10.ia64.rpm
File outdated by:  RHBA-2011:0157
    MD5: 30365596bbb9f5715ad977369e7fe1cf
cman-kernheaders-2.6.9-56.7.el4_8.10.ia64.rpm
File outdated by:  RHBA-2011:0157
    MD5: 18381494d460c3d90d9398c5ad6efbf8
 
PPC:
cman-kernel-2.6.9-56.7.el4_8.10.ppc64.rpm
File outdated by:  RHBA-2011:0157
    MD5: a91c994f50dde02b9955c604a0ae8f0f
cman-kernel-largesmp-2.6.9-56.7.el4_8.10.ppc64.rpm
File outdated by:  RHBA-2011:0157
    MD5: e91b25543fddc5c020df64966e408716
cman-kernheaders-2.6.9-56.7.el4_8.10.ppc64.rpm
File outdated by:  RHBA-2011:0157
    MD5: b43179fc07680bc108bce5995ae7eb3f
 
x86_64:
cman-kernel-2.6.9-56.7.el4_8.10.x86_64.rpm
File outdated by:  RHBA-2011:0157
    MD5: e669e38a177682100d871dfb8b4a950b
cman-kernel-largesmp-2.6.9-56.7.el4_8.10.x86_64.rpm
File outdated by:  RHBA-2011:0157
    MD5: f52c8a5c65151e311fe6b42aaf3d624d
cman-kernel-smp-2.6.9-56.7.el4_8.10.x86_64.rpm
File outdated by:  RHBA-2011:0157
    MD5: 1bfd2dcb142a66211fec07a28762c165
cman-kernel-xenU-2.6.9-56.7.el4_8.10.x86_64.rpm
File outdated by:  RHBA-2011:0157
    MD5: c690349ff53f3650130c0c8454c6a503
cman-kernheaders-2.6.9-56.7.el4_8.10.x86_64.rpm
File outdated by:  RHBA-2011:0157
    MD5: 57bb6edd6bb885d0c738411130c15375
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

557839 - Need rebuild for 2.6.9-89.0.19.EL kernel



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/