Skip to navigation

Bug Fix Advisory cman bug fix update

Advisory: RHBA-2008:0188-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2008-03-24
Last updated on: 2008-03-24
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux EUS (v. 5.1.z server)

Details

Updated cman packages that fix several bugs are now available.

The Cluster Manager (cman) utility provides user-level services for
managing a Red Hat cluster.

The updated cman packages fix the following bugs:

* ccsd consumes 90%+ of the CPU during startup when two clusters on the
same subnet with different endian architectures are used.

* Potentially, a panic is caused after a device_write on ppc64 architectures.

* qdisk ignores the interval set in cluster.conf to check the heuristics.

All cman users should upgrade to the updated packages, which resolve
these bugs.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
cman-2.0.73-1.el5_1.5.src.rpm
File outdated by:  RHBA-2014:0282
    MD5: 95f05ce28bb55f91e4ca8e494ecfac61
 
IA-32:
cman-2.0.73-1.el5_1.5.i386.rpm
File outdated by:  RHBA-2014:0282
    MD5: 3685c8f4021449ed3b03ea79f88678ba
cman-devel-2.0.73-1.el5_1.5.i386.rpm
File outdated by:  RHBA-2014:0282
    MD5: 0600b81a15132ff9d71c20dcb5def4a2
 
x86_64:
cman-2.0.73-1.el5_1.5.x86_64.rpm
File outdated by:  RHBA-2014:0282
    MD5: 71475c3f4910eddca5e6b25019956258
cman-devel-2.0.73-1.el5_1.5.i386.rpm
File outdated by:  RHBA-2014:0282
    MD5: 0600b81a15132ff9d71c20dcb5def4a2
cman-devel-2.0.73-1.el5_1.5.x86_64.rpm
File outdated by:  RHBA-2014:0282
    MD5: 425d8c90c1eb8c2ead81f14d4ec08fc2
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
cman-2.0.73-1.el5_1.5.src.rpm
File outdated by:  RHBA-2014:0282
    MD5: 95f05ce28bb55f91e4ca8e494ecfac61
 
IA-32:
cman-2.0.73-1.el5_1.5.i386.rpm
File outdated by:  RHBA-2014:0282
    MD5: 3685c8f4021449ed3b03ea79f88678ba
cman-devel-2.0.73-1.el5_1.5.i386.rpm
File outdated by:  RHBA-2014:0282
    MD5: 0600b81a15132ff9d71c20dcb5def4a2
 
IA-64:
cman-2.0.73-1.el5_1.5.ia64.rpm
File outdated by:  RHBA-2014:0282
    MD5: 41a0968b7cc706b2b88d1aed2fdb16b3
cman-devel-2.0.73-1.el5_1.5.ia64.rpm
File outdated by:  RHBA-2014:0282
    MD5: f5e5ff3e32618048513d0da411605e10
 
PPC:
cman-2.0.73-1.el5_1.5.ppc.rpm
File outdated by:  RHBA-2014:0282
    MD5: 340b6ea7c73d1f1d0dfd5af67bda75dc
cman-devel-2.0.73-1.el5_1.5.ppc.rpm
File outdated by:  RHBA-2014:0282
    MD5: dda5ed99042c56e12366b9acd8925245
cman-devel-2.0.73-1.el5_1.5.ppc64.rpm
File outdated by:  RHBA-2014:0282
    MD5: 46f6ec556d3cdb1378ccf86d250f63c9
 
s390x:
cman-2.0.73-1.el5_1.5.s390x.rpm
File outdated by:  RHBA-2009:1622
    MD5: 1483498e5d0a1c4caadd5dd9784b9223
cman-devel-2.0.73-1.el5_1.5.s390.rpm
File outdated by:  RHBA-2009:1622
    MD5: fd7cb1705d214b47d6cca4e064d18f2e
cman-devel-2.0.73-1.el5_1.5.s390x.rpm
File outdated by:  RHBA-2009:1622
    MD5: d0e09176730a7bf14c1de40ce45887b7
 
x86_64:
cman-2.0.73-1.el5_1.5.x86_64.rpm
File outdated by:  RHBA-2014:0282
    MD5: 71475c3f4910eddca5e6b25019956258
cman-devel-2.0.73-1.el5_1.5.i386.rpm
File outdated by:  RHBA-2014:0282
    MD5: 0600b81a15132ff9d71c20dcb5def4a2
cman-devel-2.0.73-1.el5_1.5.x86_64.rpm
File outdated by:  RHBA-2014:0282
    MD5: 425d8c90c1eb8c2ead81f14d4ec08fc2
 
Red Hat Enterprise Linux EUS (v. 5.1.z server)

SRPMS:
cman-2.0.73-1.el5_1.5.src.rpm
File outdated by:  RHBA-2014:0282
    MD5: 95f05ce28bb55f91e4ca8e494ecfac61
 
IA-32:
cman-2.0.73-1.el5_1.5.i386.rpm     MD5: 3685c8f4021449ed3b03ea79f88678ba
cman-devel-2.0.73-1.el5_1.5.i386.rpm     MD5: 0600b81a15132ff9d71c20dcb5def4a2
 
IA-64:
cman-2.0.73-1.el5_1.5.ia64.rpm     MD5: 41a0968b7cc706b2b88d1aed2fdb16b3
cman-devel-2.0.73-1.el5_1.5.ia64.rpm     MD5: f5e5ff3e32618048513d0da411605e10
 
PPC:
cman-2.0.73-1.el5_1.5.ppc.rpm     MD5: 340b6ea7c73d1f1d0dfd5af67bda75dc
cman-devel-2.0.73-1.el5_1.5.ppc.rpm     MD5: dda5ed99042c56e12366b9acd8925245
cman-devel-2.0.73-1.el5_1.5.ppc64.rpm     MD5: 46f6ec556d3cdb1378ccf86d250f63c9
 
s390x:
cman-2.0.73-1.el5_1.5.s390x.rpm     MD5: 1483498e5d0a1c4caadd5dd9784b9223
cman-devel-2.0.73-1.el5_1.5.s390.rpm     MD5: fd7cb1705d214b47d6cca4e064d18f2e
cman-devel-2.0.73-1.el5_1.5.s390x.rpm     MD5: d0e09176730a7bf14c1de40ce45887b7
 
x86_64:
cman-2.0.73-1.el5_1.5.x86_64.rpm     MD5: 71475c3f4910eddca5e6b25019956258
cman-devel-2.0.73-1.el5_1.5.i386.rpm     MD5: 0600b81a15132ff9d71c20dcb5def4a2
cman-devel-2.0.73-1.el5_1.5.x86_64.rpm     MD5: 425d8c90c1eb8c2ead81f14d4ec08fc2
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

428325 - Mixed endian clusters on same subnet can cause ccsd to consume 90+% memory and cpu during startup.
429181 - DLM: panic after device_write
430574 - qdisk does not check the heuristics


Keywords

cman


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/