- Issued:
- 2010-05-21
- Updated:
- 2010-05-21
RHBA-2010:0433 - Bug Fix Advisory
Synopsis
lvm2 bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated lvm2 packages that fix various bugs are now available.
Description
The lvm2 packages contain support for Logical Volume Management (LVM).
These updated lvm2 package include fixes for the following bugs:
- fixes a crash in pvs -a command if some device in Volume Group is missing.
(BZ#583995)
- avoids repeated full device scans if using internally-cached VG metadata
(which happens on system with missing device in Volume Group). (BZ#584705)
- disallows removal of primary mirror image (using lvconvert) if the mirror is
not fully synchronised yet. (BZ#584801)
- fixes unexpected symbolic link removal if device is still active after
deactivation failure. (BZ#580831)
All users are advised to upgrade to this updated package, which resolves these
issues.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 580831 - lvchange -an fails for an lv in use but deletes symlink /dev/VGNAME/LVNAME
- BZ - 583995 - SEGFAULT occurs by pvs command with all option
- BZ - 584705 - Execution time of pvdisplay is 3 times longer in RHEL5.5 if missing PVs detected
- BZ - 584801 - CRM#2000874 - lvm should disallow removal of primary image during up-convert
- BZ - 586021 - 2 leg down convert request with only one PV specified behavior changed
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
lvm2-2.02.56-8.el5_5.4.src.rpm | SHA-256: e1c6ebc687d0f297f626b4776dfdf389e5cf5a16bb567e285de0f921abde5034 |
x86_64 | |
lvm2-2.02.56-8.el5_5.4.x86_64.rpm | SHA-256: 8bdca25049ede838357c2a0d435bb25c077d2f01b90f2a1587d6d9cca4770b6d |
ia64 | |
lvm2-2.02.56-8.el5_5.4.ia64.rpm | SHA-256: b6c16a364f22c0ce7e8a2ce5e0d4919f78e3e7fd2df039a0f35dbd24ad0085f1 |
i386 | |
lvm2-2.02.56-8.el5_5.4.i386.rpm | SHA-256: 7826b15854a2034eeb2de9ac4024a9f48461d0a28748827d791cbe041466c0f8 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
lvm2-2.02.56-8.el5_5.4.src.rpm | SHA-256: e1c6ebc687d0f297f626b4776dfdf389e5cf5a16bb567e285de0f921abde5034 |
x86_64 | |
lvm2-2.02.56-8.el5_5.4.x86_64.rpm | SHA-256: 8bdca25049ede838357c2a0d435bb25c077d2f01b90f2a1587d6d9cca4770b6d |
i386 | |
lvm2-2.02.56-8.el5_5.4.i386.rpm | SHA-256: 7826b15854a2034eeb2de9ac4024a9f48461d0a28748827d791cbe041466c0f8 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
lvm2-2.02.56-8.el5_5.4.src.rpm | SHA-256: e1c6ebc687d0f297f626b4776dfdf389e5cf5a16bb567e285de0f921abde5034 |
x86_64 | |
lvm2-2.02.56-8.el5_5.4.x86_64.rpm | SHA-256: 8bdca25049ede838357c2a0d435bb25c077d2f01b90f2a1587d6d9cca4770b6d |
i386 | |
lvm2-2.02.56-8.el5_5.4.i386.rpm | SHA-256: 7826b15854a2034eeb2de9ac4024a9f48461d0a28748827d791cbe041466c0f8 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
lvm2-2.02.56-8.el5_5.4.src.rpm | SHA-256: e1c6ebc687d0f297f626b4776dfdf389e5cf5a16bb567e285de0f921abde5034 |
s390x | |
lvm2-2.02.56-8.el5_5.4.s390x.rpm | SHA-256: e333bbdf8e790218fb61ba5bf43029efecdaac7fe48e7ce4706841e0209076cf |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
lvm2-2.02.56-8.el5_5.4.src.rpm | SHA-256: e1c6ebc687d0f297f626b4776dfdf389e5cf5a16bb567e285de0f921abde5034 |
ppc | |
lvm2-2.02.56-8.el5_5.4.ppc.rpm | SHA-256: db3c444fbcaf4378a44927a4bb65215723a974803280df338d5e6a0c79efd715 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
lvm2-2.02.56-8.el5_5.4.src.rpm | SHA-256: e1c6ebc687d0f297f626b4776dfdf389e5cf5a16bb567e285de0f921abde5034 |
x86_64 | |
lvm2-2.02.56-8.el5_5.4.x86_64.rpm | SHA-256: 8bdca25049ede838357c2a0d435bb25c077d2f01b90f2a1587d6d9cca4770b6d |
i386 | |
lvm2-2.02.56-8.el5_5.4.i386.rpm | SHA-256: 7826b15854a2034eeb2de9ac4024a9f48461d0a28748827d791cbe041466c0f8 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.