- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2012:0180 - Bug Fix Advisory
Synopsis
openais bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated openais package that fixes various bugs and adds one enhancement is
now available for Red Hat Enterprise Linux 5.
Description
The Application Interface Specification (AIS) is an API and a set of policies
for developing applications that maintain services during faults. The OpenAIS
Standards Based Cluster Framework is an OSI-certified implementation of the
Service Availability Forum AIS. The openais package contains the openais
executable, OpenAIS service handlers, default configuration files and an init
script.
This update fixes the following bugs:
- Previously, the length of the array cpg_exec_service[]/cpg_exec_engine[] in
OpenAIS and corosync differed. Consequently, OpenAIS failed if corosync ran on
the same network. This update modifies the length of this array in OpenAIS. Now,
OpenAIS and corosync successfully run on the same network. (BZ#708335)
- Previously, the receive buffers could overflow under heavy traffic.
Consequently, packets could be lost and retransmit list error messages appeared
in the log files. Now, incoming messages are processed more frequently, and the
retransmit list error messages no longer appear. (BZ#718773)
- Previously, the OpenAIS service could, under certain circumstances, encounter
a deadlock when starting or stopping the process. This update modifies the
underlying source code to prevent such a deadlock. Deadlock situations no longer
happen during a rapid start or stop process. (BZ#726142)
- Previously, OpenAIS could, under certain circumstances, terminate unexpectedly
when OpenAIS was used in a network losing packets and a large number of
configuration changes occurred. This update modifies the underlying source code,
and OpenAIS no longer terminates under these circumstances. (BZ#729081)
- Previously, OpenAIS could, under certain circumstances, use an incorrect sort
message queue when the "memb_join" message was sent during recovery.
Consequently, OpenAIS could join all nodes. Now, OpenAIS uses the correct sort
message queue if memb_join message is sent during recovery. (BZ#734865)
- Previously, openais_response_send could, under certain circumstances, change
the value of req->ics_channel_handle. Consequently, OpenAIS terminated
unexpectedly when using the subscribe function of the eventing (EVT) service.
This update saves the handle outside the message. OpenAIS no longer terminates
if an application is using the subscribe function of the EVT service.
(BZ#737100)
- Previously, cman could, under certain circumstances, terminate unexpectedly on
all cluster nodes and nodes were not fenced if the system clock was changed on a
cluster node. Consequently, the cluster was not shut down gracefully and had to
be rebooted manually. Now, the underlying code has been modified to handle
significant time changes. The cman service no longer terminates and the cluster
no longer fails. (BZ#738468)
- Previously, the groupd daemon often exited with the "groupd: cpg_leave error
retrying" error message, causing OpenAIS to become unresponsive when stopping
the cman service on a cluster node shutdown. Consequently, the cluster node was
not shut down correctly. Now, the underlying code has been modified to stop cman
correctly. Cluster nodes can be shut down as expected. (BZ#746807)
- Previously, totemip_parse used the getaddrinfo function without an associated
freeaddrinfo call. Consequently, a small amount of memory leaked when calling
OpenAIS. This update adds a call to freeaddrinfo. OpenAIS no longer leaks memory
in totemip module. (BZ#752952)
This update also adds the following enhancement:
- With this update, manual pages for ais-keygen, aisexec, openais-cfgtool and
openais-confdb-display have been added to OpenAIS. (BZ#703162)
All users of openais are advised to upgrade to this updated package, which fixes
these bugs and adds this enhancement.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 703162 - [RFE] man pages for openais
- BZ - 708335 - Fix coredump when rolling upgrade to Corosync 1.3
- BZ - 726142 - openais deadlocks during rapid start/stop of process
- BZ - 729081 - openais crashes with combo of lossy network and config changes
- BZ - 734865 - openais could use wrong sort queue if memb_join message sent during recovery
- BZ - 752952 - totemip_parse leaks memory
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
openais-0.80.6-36.el5.src.rpm | SHA-256: 3ce0f567cbee4ad528defb414f21e7f7de436ba8bfe7a4041d623c567f016227 |
x86_64 | |
openais-0.80.6-36.el5.x86_64.rpm | SHA-256: ee82edd58485d1e757d383a95b0d079f55885a906d30918108e1d4910a0b503f |
openais-devel-0.80.6-36.el5.i386.rpm | SHA-256: 967bd40822c14a9241e25a3de2fbce89907ea4415e832ea05115b622abdb8e5b |
openais-devel-0.80.6-36.el5.x86_64.rpm | SHA-256: 8ddc2831d643abde35ea462e7300e598491562562a39cfcf14cd9fb5a90c0c5b |
ia64 | |
openais-0.80.6-36.el5.ia64.rpm | SHA-256: 0f9793a80ff06beaa9f13e536feeb41369db1b468fc2f21ca9dc8275c0ad154b |
openais-devel-0.80.6-36.el5.ia64.rpm | SHA-256: 878ac9da62017698548f1f32a8b567f37e55219c03e3215cd53b66ee044b3b2a |
i386 | |
openais-0.80.6-36.el5.i386.rpm | SHA-256: baaecc41a7adbdcc0f10963b60765528a3b44f2c25c9f5f4eaec2dfdc0e580d9 |
openais-devel-0.80.6-36.el5.i386.rpm | SHA-256: 967bd40822c14a9241e25a3de2fbce89907ea4415e832ea05115b622abdb8e5b |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
openais-0.80.6-36.el5.src.rpm | SHA-256: 3ce0f567cbee4ad528defb414f21e7f7de436ba8bfe7a4041d623c567f016227 |
x86_64 | |
openais-0.80.6-36.el5.x86_64.rpm | SHA-256: ee82edd58485d1e757d383a95b0d079f55885a906d30918108e1d4910a0b503f |
openais-devel-0.80.6-36.el5.i386.rpm | SHA-256: 967bd40822c14a9241e25a3de2fbce89907ea4415e832ea05115b622abdb8e5b |
openais-devel-0.80.6-36.el5.x86_64.rpm | SHA-256: 8ddc2831d643abde35ea462e7300e598491562562a39cfcf14cd9fb5a90c0c5b |
i386 | |
openais-0.80.6-36.el5.i386.rpm | SHA-256: baaecc41a7adbdcc0f10963b60765528a3b44f2c25c9f5f4eaec2dfdc0e580d9 |
openais-devel-0.80.6-36.el5.i386.rpm | SHA-256: 967bd40822c14a9241e25a3de2fbce89907ea4415e832ea05115b622abdb8e5b |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
openais-0.80.6-36.el5.src.rpm | SHA-256: 3ce0f567cbee4ad528defb414f21e7f7de436ba8bfe7a4041d623c567f016227 |
ppc | |
openais-0.80.6-36.el5.ppc.rpm | SHA-256: 64f81ab951ad12ef16e54d0f704edc46e3881a054bc2437f82edaf1f30e35463 |
openais-devel-0.80.6-36.el5.ppc.rpm | SHA-256: b0a578851be1a646c50d2992133e2b42f01c55247f57f6af8a39c45bcbfcb137 |
openais-devel-0.80.6-36.el5.ppc64.rpm | SHA-256: c7ce6cac6d27bc7a3e9cae17c5643ebcdcfbf82bf4d5a9523c83f9be711ef6bd |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
openais-0.80.6-36.el5.src.rpm | SHA-256: 3ce0f567cbee4ad528defb414f21e7f7de436ba8bfe7a4041d623c567f016227 |
x86_64 | |
openais-0.80.6-36.el5.x86_64.rpm | SHA-256: ee82edd58485d1e757d383a95b0d079f55885a906d30918108e1d4910a0b503f |
openais-devel-0.80.6-36.el5.i386.rpm | SHA-256: 967bd40822c14a9241e25a3de2fbce89907ea4415e832ea05115b622abdb8e5b |
openais-devel-0.80.6-36.el5.x86_64.rpm | SHA-256: 8ddc2831d643abde35ea462e7300e598491562562a39cfcf14cd9fb5a90c0c5b |
i386 | |
openais-0.80.6-36.el5.i386.rpm | SHA-256: baaecc41a7adbdcc0f10963b60765528a3b44f2c25c9f5f4eaec2dfdc0e580d9 |
openais-devel-0.80.6-36.el5.i386.rpm | SHA-256: 967bd40822c14a9241e25a3de2fbce89907ea4415e832ea05115b622abdb8e5b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.