- Issued:
- 2011-02-16
- Updated:
- 2011-02-16
RHBA-2011:0236 - Bug Fix Advisory
Synopsis
lvm2 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated lvm2 package that fixes several bugs and adds an enhancement is now
available for Red Hat Enterprise Linux 4.
Description
The lvm2 packages provide support for Logical Volume Management.
This update fixes the following bugs:
- This update ensures that the pvcreate utility correctly detects and
conditionally wipes swap space signatures. (BZ#488354)
- This update enables the use of cached metadata for the pvs and pvdisplay
commands to avoid excessive memory consumption when processing Volume Group with
large number of Physical Volumes (PVs). (BZ#488739)
- Under certain circumstances, running the pvmove utility could cause a device
to be left in a suspended state. This update fixes the pvmove abort to be
cluster-aware when a temporary mirror activation fails. (BZ#500849)
- The manual page for the lvs utility has been corrected to provide more
detailed information about supported arguments of the "-o" command line option.
(BZ#500861)
- Previously, the vgreduce utility could terminate unexpectedly with a
segmentation fault when a device disappeared from the system. With this update,
a backported patch has been applied to address this issue, and the absence of a
device no longer causes vgreduce to crash. (BZ#531250)
- Due to an error in the device-mapper library, on certain configurations, the
vgchange utility could terminate unexpectedly with a segmentation fault when
calling a hash table lookup function. This occurred during the execution of the
lookup function when keys of different lengths were compared. With this update,
the package has been updated to use the corrected device-mapper library, and
hash table lookups no longer cause a segmentation fault. (BZ#571699)
As well, this update adds the following enhancement:
- The pvmove utility has been updated to produce a more descriptive error
message when when all source logical volumes (LVs) are skipped. (BZ#500898)
Users of lvm2 are advised to upgrade to this updated package, which resolves
these issues and adds this enhancement. In clustered environments, this bug fix
must be applied along with the lvm2-cluster advisory.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 488354 - pvcreate does not wipe swap label
- BZ - 500849 - pvmove on a cluster logical volume results in suspends devices
- BZ - 500861 - lvs man page should include seg_pe_ranges option
- BZ - 500898 - RFE: give better message when pvmove is already in progress on requested VG
- BZ - 571699 - Fix hash lookup segfault when keys compared are different lengths (lvm.static)
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
lvm2-2.02.42-9.el4.src.rpm | SHA-256: 7827c7393b7f1de0d55301f9f1962934810b785ad3c6a364416b3f7e683fdf84 |
x86_64 | |
lvm2-2.02.42-9.el4.x86_64.rpm | SHA-256: c839748ef790ac9d718b461669cca0f4918335199b1f5e1f438cd6d43608502c |
lvm2-2.02.42-9.el4.x86_64.rpm | SHA-256: c839748ef790ac9d718b461669cca0f4918335199b1f5e1f438cd6d43608502c |
ia64 | |
lvm2-2.02.42-9.el4.ia64.rpm | SHA-256: 19599a67c9a85755d722402582f552afa71a71b21a45251d50313f9b0d634aab |
lvm2-2.02.42-9.el4.ia64.rpm | SHA-256: 19599a67c9a85755d722402582f552afa71a71b21a45251d50313f9b0d634aab |
i386 | |
lvm2-2.02.42-9.el4.i386.rpm | SHA-256: 8b6a5a8712342de3a3b5e3e24b8bad8e400cc7524db6390eb089469a9534495f |
lvm2-2.02.42-9.el4.i386.rpm | SHA-256: 8b6a5a8712342de3a3b5e3e24b8bad8e400cc7524db6390eb089469a9534495f |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
lvm2-2.02.42-9.el4.src.rpm | SHA-256: 7827c7393b7f1de0d55301f9f1962934810b785ad3c6a364416b3f7e683fdf84 |
x86_64 | |
lvm2-2.02.42-9.el4.x86_64.rpm | SHA-256: c839748ef790ac9d718b461669cca0f4918335199b1f5e1f438cd6d43608502c |
ia64 | |
lvm2-2.02.42-9.el4.ia64.rpm | SHA-256: 19599a67c9a85755d722402582f552afa71a71b21a45251d50313f9b0d634aab |
i386 | |
lvm2-2.02.42-9.el4.i386.rpm | SHA-256: 8b6a5a8712342de3a3b5e3e24b8bad8e400cc7524db6390eb089469a9534495f |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
lvm2-2.02.42-9.el4.src.rpm | SHA-256: 7827c7393b7f1de0d55301f9f1962934810b785ad3c6a364416b3f7e683fdf84 |
x86_64 | |
lvm2-2.02.42-9.el4.x86_64.rpm | SHA-256: c839748ef790ac9d718b461669cca0f4918335199b1f5e1f438cd6d43608502c |
i386 | |
lvm2-2.02.42-9.el4.i386.rpm | SHA-256: 8b6a5a8712342de3a3b5e3e24b8bad8e400cc7524db6390eb089469a9534495f |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
lvm2-2.02.42-9.el4.src.rpm | SHA-256: 7827c7393b7f1de0d55301f9f1962934810b785ad3c6a364416b3f7e683fdf84 |
s390x | |
lvm2-2.02.42-9.el4.s390x.rpm | SHA-256: 911ae627afb8e0eb7f7f1b51871cdc31808950fbd7cea544d32ef49328ee4e0e |
s390 | |
lvm2-2.02.42-9.el4.s390.rpm | SHA-256: be8b1530fab8e4346aae6b8b00ff7074060a8e5ead26388abd518e46d6deaead |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
lvm2-2.02.42-9.el4.src.rpm | SHA-256: 7827c7393b7f1de0d55301f9f1962934810b785ad3c6a364416b3f7e683fdf84 |
ppc | |
lvm2-2.02.42-9.el4.ppc.rpm | SHA-256: ca4871613cba7ec1b5ee6a826a9fc97408db9cc8ec242367a19dd87f5337919f |
lvm2-2.02.42-9.el4.ppc64.rpm | SHA-256: 7e6a5955d357a10ed4420255dbd2f964c10ed70da168e9ea092f4795833bf541 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.