- Issued:
- 2009-11-23
- Updated:
- 2010-01-05
RHBA-2009:1598 - Bug Fix Advisory
Synopsis
cman bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated cman packages that resolve several issues are now available.
[Updated 4 Jan 2009]
This update provides improved descriptions of both bug fixes included in this advisory, and especially the description for bug 529712. The packages included in this revised update have not been changed in any way from those included in the original advisory.
Description
The Cluster Manager (cman) utility provides user-level services for managing a Linux cluster.
These updated cman packages provide fixes for the following bugs:
- when using device-mapper-multipath devices, registrations were only sent to the active path, which meant that, in the event of path failure, the node would be unable to access the device via the secondary path or paths because the device would not be registered with the secondary path(s). With this update, the presence of device-mapper-multipath devices is detected correctly, the right paths are discovered, and each path is registered, including secondary paths. (BZ#529712)
- when running the /etc/init.d/scsi_reserve init script to check for errors, such as an incorrect cluster.conf configuration, among others, upon finding an error the script did not print "[FAILED]" to standard output, as is convention for system services which encounter startup errors. With this update, the scsi_reserve init script has been fixed so that it prints "[FAILED]" to standard output when an error is encountered, and "[OK]" otherwise. Any errors encountered are logged to the system log. (BZ#530400)
All users of cman are advised to upgrade to these updated packages, which resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 529712 - RHEL5.3: fence_scsi, mulitpath and persistent reservations
- BZ - 530400 - /etc/init.d/scsi_reserve should produce [FAIL] on failure as it does [ OK ] on success
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
cman-2.0.115-1.el5_4.7.src.rpm | SHA-256: b14ba67c8132e2e894d611d7607a8908df11251e6f0183b9320da1f087044ae8 |
x86_64 | |
cman-2.0.115-1.el5_4.7.x86_64.rpm | SHA-256: 9325a9093a2bf9c5c0b0d84ee0af99d82dbe6d5ebb15534f6021d28a3fb85cf1 |
cman-devel-2.0.115-1.el5_4.7.i386.rpm | SHA-256: d2fff2c05dfa0f3c8f5dbc7868970af8086afdf4b858a8468f6659b45525bead |
cman-devel-2.0.115-1.el5_4.7.x86_64.rpm | SHA-256: de7510ae76c906a9f41ddfcb62e8e6e21c457a2d36f2da1b3f54afa8354d67e1 |
ia64 | |
cman-2.0.115-1.el5_4.7.ia64.rpm | SHA-256: 82220c45683badb34c7a17703996bd419b8426265d0cb02d32a1e33eea9baa54 |
cman-devel-2.0.115-1.el5_4.7.ia64.rpm | SHA-256: 00ec9827054ac7f3107c83f95540202703ec6166047ef25687ebe45bc4127183 |
i386 | |
cman-2.0.115-1.el5_4.7.i386.rpm | SHA-256: c915a6f1bd3b69e2c7873270395f2cfec852b7c502848b6eba3c0491b5ead1a5 |
cman-devel-2.0.115-1.el5_4.7.i386.rpm | SHA-256: d2fff2c05dfa0f3c8f5dbc7868970af8086afdf4b858a8468f6659b45525bead |
Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4
SRPM | |
---|---|
x86_64 | |
ia64 | |
i386 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
cman-2.0.115-1.el5_4.7.src.rpm | SHA-256: b14ba67c8132e2e894d611d7607a8908df11251e6f0183b9320da1f087044ae8 |
x86_64 | |
cman-2.0.115-1.el5_4.7.x86_64.rpm | SHA-256: 9325a9093a2bf9c5c0b0d84ee0af99d82dbe6d5ebb15534f6021d28a3fb85cf1 |
cman-devel-2.0.115-1.el5_4.7.i386.rpm | SHA-256: d2fff2c05dfa0f3c8f5dbc7868970af8086afdf4b858a8468f6659b45525bead |
cman-devel-2.0.115-1.el5_4.7.x86_64.rpm | SHA-256: de7510ae76c906a9f41ddfcb62e8e6e21c457a2d36f2da1b3f54afa8354d67e1 |
i386 | |
cman-2.0.115-1.el5_4.7.i386.rpm | SHA-256: c915a6f1bd3b69e2c7873270395f2cfec852b7c502848b6eba3c0491b5ead1a5 |
cman-devel-2.0.115-1.el5_4.7.i386.rpm | SHA-256: d2fff2c05dfa0f3c8f5dbc7868970af8086afdf4b858a8468f6659b45525bead |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
cman-2.0.115-1.el5_4.7.src.rpm | SHA-256: b14ba67c8132e2e894d611d7607a8908df11251e6f0183b9320da1f087044ae8 |
s390x | |
cman-2.0.115-1.el5_4.7.s390x.rpm | SHA-256: 5c6bf67da7527731a4c85367b1adb9dafb761d65c9c7b0926fd56ac884c65936 |
cman-devel-2.0.115-1.el5_4.7.s390.rpm | SHA-256: 3410d873e7a1a23cc94de47d8b4bfe1d014986e4c1747eea54bd8e7eb9dcc6be |
cman-devel-2.0.115-1.el5_4.7.s390x.rpm | SHA-256: ec4891b0b1cf633fbf73a4982a8ea63b5d46ca39994552169408d18d5e32f244 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4
SRPM | |
---|---|
s390x |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
cman-2.0.115-1.el5_4.7.src.rpm | SHA-256: b14ba67c8132e2e894d611d7607a8908df11251e6f0183b9320da1f087044ae8 |
ppc | |
cman-2.0.115-1.el5_4.7.ppc.rpm | SHA-256: 5f449a79ef6405b5b9c51ae8befa04ce28d92af31c7bb1214fcd144df071d402 |
cman-devel-2.0.115-1.el5_4.7.ppc.rpm | SHA-256: 883836be591dd2a9c5b38b3f56a0fd362aafa9fd4675a0f6a9103f43baaf4988 |
cman-devel-2.0.115-1.el5_4.7.ppc64.rpm | SHA-256: b8fc4e8e569e9ec438269ed326f2fa3166499544d5174944c238989805c2cfad |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4
SRPM | |
---|---|
ppc |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
cman-2.0.115-1.el5_4.7.src.rpm | SHA-256: b14ba67c8132e2e894d611d7607a8908df11251e6f0183b9320da1f087044ae8 |
x86_64 | |
cman-2.0.115-1.el5_4.7.x86_64.rpm | SHA-256: 9325a9093a2bf9c5c0b0d84ee0af99d82dbe6d5ebb15534f6021d28a3fb85cf1 |
cman-devel-2.0.115-1.el5_4.7.i386.rpm | SHA-256: d2fff2c05dfa0f3c8f5dbc7868970af8086afdf4b858a8468f6659b45525bead |
cman-devel-2.0.115-1.el5_4.7.x86_64.rpm | SHA-256: de7510ae76c906a9f41ddfcb62e8e6e21c457a2d36f2da1b3f54afa8354d67e1 |
i386 | |
cman-2.0.115-1.el5_4.7.i386.rpm | SHA-256: c915a6f1bd3b69e2c7873270395f2cfec852b7c502848b6eba3c0491b5ead1a5 |
cman-devel-2.0.115-1.el5_4.7.i386.rpm | SHA-256: d2fff2c05dfa0f3c8f5dbc7868970af8086afdf4b858a8468f6659b45525bead |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.