- Issued:
- 2010-03-30
- Updated:
- 2010-03-30
RHBA-2010:0286 - Bug Fix Advisory
Synopsis
dmraid bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated dmraid packages that fix several bugs are now available.
Description
The dmraid packages contain the ATARAID/DDF1 activation tool. The tool
supports RAID device discovery and RAID set activation, and displays
properties for ATARAID/DDF1-formatted RAID sets on Linux kernels using the
device-mapper utility.
These updated dmraid packages fix the following bugs:
- the dmraid-events package was installing the dmevent_syslogpattern.txt
file to the /etc/logwatch/scripts/services directory. The
dmevent_syslogpattern.txt file is used by the logwatch service to record
event logs. SELinux does not allow write access to the
/etc/logwatch/scripts/services directory, and as a result the logwatch
service was prevented from updating the log file. The dmraid-events package
has now been updated to install the log file at
/var/cache/logwatch/dmeventd/syslogpattern.txt, and the log file is updated
as expected. (BZ#513402)
- after a hard disk drive rebuild has been completed using dmraid, the LED
lights on each disk belonging to the rebuilt RAID volume should turn off.
Previously, if the rebuild was initiated manually using the 'dmraid -R'
command, the light on the spare disk would remain illuminated, incorrectly
indicating that the disk was still being built. When rebuilding
automatically with the libdmraid-events library, the light would not remain
lit as expected. The dmraid packages have been updated to turn off the
light correctly after a manual disk rebuild, and the drive light now
correctly indicates the drive state. (BZ#514497)
- dmraid binaries in the /sbin directory previously relied on libraries in
the /usr directory. Since the /sbin directory typically only contains
programs executed by the root user, reliance on libraries in the /usr
directory could result in reference conflicts. The dmraid packages have
been updated to no longer rely on the /usr directory, and library
references are now improved. (BZ#516852)
- the dmraid-events-logwatch tool would take ownership of directories that
were already owned by the logwatch package. This included the following
directories:
- /etc/logwatch/conf
- /etc/logwatch/conf/services
- /etc/logwatch/scripts
- /etc/logwatch/scripts/services
As a consequence, the dmraid-events-logwatch tool and the logwatch
package would conflict. The dmraid-events-logwatch package has been
updated to own only /etc/logwatch/scripts/services/dmeventd directory, and
the conflict no longer arises with the logwatch package. (BZ#545876)
- modifications to Intel support in the libdmraid tool caused the SONAME
field to change. This caused compatibility issues in python-pyblock
symbolic links. The version number in the libdmraid tool's file name has
been updated, which caused the dependencies to be automatically re-
generated during the build process. The symbolic link is now repaired and
there are no compatibility issues between libdmraid and python-pyblock.
(BZ#556254)
- the pthread_mutex_trylock symbol was not being exported against the
libpthread tool. As a consequence, the libdmraid-events-isw.so object would
not be loaded during activation of a RAID5 volume library, reporting that
pthread_mutex_trylock was an undefined symbol. Linking has now been added
to the libpthread tool, and pthread_mutex_trylock is successfully
referenced in the libdmraid-events-isw.so object. (BZ#567922)
All dmraid users should upgrade to these updated packages, which resolve
these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 513402 - SELinux is preventing perl (logwatch_t) "write" to ./services (etc_t).
- BZ - 516852 - binaries in /sbin use libraries in /usr/
- BZ - 545876 - dmraid-events-logwatch conflicts with logwatch package
- BZ - 556254 - fix dmraid soname
- BZ - 567922 - [dmraid] During RAID activation event library could not be loaded due to undefined symbols: pthread_mutex_trylock
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-63.el5.src.rpm | SHA-256: 02ea27f539bbb4dbc64c67ae781654feb88ceb22c9a64c3a72b1a4de2f3c1ab5 |
x86_64 | |
dmraid-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: f4cea92378af0c8c2a48b693bd6c34866dabe5396150bcbf641e2d52c076c4ee |
dmraid-devel-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: 313126f4df1d06c278d20e48d61bd6b059c61a881d8d6ad3725f0017af48eb0f |
dmraid-events-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: b2bd9e2c5b61e9a45bd7864be144f3c08d364693cbc4f866cd7a29aa323e3a7a |
dmraid-events-logwatch-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: f776b34c2ce37421e63de6c8501dd6370f3ef73e290f2cf79801d418d3c20ff8 |
ia64 | |
dmraid-1.0.0.rc13-63.el5.ia64.rpm | SHA-256: 08f1279d737487c1991a733eef4005be59e0513deccf7907773cb36c4f9b79f8 |
dmraid-devel-1.0.0.rc13-63.el5.ia64.rpm | SHA-256: 3fe25ae3b03fbe83b0b8cbd84a8af8807b87ba8d7ecf03f34b571ca72781e2e1 |
dmraid-events-1.0.0.rc13-63.el5.ia64.rpm | SHA-256: 35068bdc25d7b6a85d168fe6ba8174e2401cf88e26b53669a70eb29281e9e21e |
dmraid-events-logwatch-1.0.0.rc13-63.el5.ia64.rpm | SHA-256: 496250eb9d23d9557dc0f91b007bbfcf5535866cc0b087f4c43364731366bbc0 |
i386 | |
dmraid-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 0f8ee92e9baa089e6f64ddb3e106db9076242684989baefdb7b78b7a854cba91 |
dmraid-devel-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 35e657dff6c16fefd12156429f6ecf024443538f15a6afbfdadb9a4176e4b53a |
dmraid-events-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 8511605fa3f97295d3348385e43cb2dd972e8c18d570f9c0e5d0763572aa3840 |
dmraid-events-logwatch-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 2e19da6defe8c15a992ef3f5fd4fe4fe9b866d5fd3493eb24b2af450a985f0d0 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-63.el5.src.rpm | SHA-256: 02ea27f539bbb4dbc64c67ae781654feb88ceb22c9a64c3a72b1a4de2f3c1ab5 |
x86_64 | |
dmraid-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: f4cea92378af0c8c2a48b693bd6c34866dabe5396150bcbf641e2d52c076c4ee |
dmraid-devel-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: 313126f4df1d06c278d20e48d61bd6b059c61a881d8d6ad3725f0017af48eb0f |
dmraid-events-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: b2bd9e2c5b61e9a45bd7864be144f3c08d364693cbc4f866cd7a29aa323e3a7a |
dmraid-events-logwatch-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: f776b34c2ce37421e63de6c8501dd6370f3ef73e290f2cf79801d418d3c20ff8 |
i386 | |
dmraid-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 0f8ee92e9baa089e6f64ddb3e106db9076242684989baefdb7b78b7a854cba91 |
dmraid-devel-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 35e657dff6c16fefd12156429f6ecf024443538f15a6afbfdadb9a4176e4b53a |
dmraid-events-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 8511605fa3f97295d3348385e43cb2dd972e8c18d570f9c0e5d0763572aa3840 |
dmraid-events-logwatch-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 2e19da6defe8c15a992ef3f5fd4fe4fe9b866d5fd3493eb24b2af450a985f0d0 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-63.el5.src.rpm | SHA-256: 02ea27f539bbb4dbc64c67ae781654feb88ceb22c9a64c3a72b1a4de2f3c1ab5 |
x86_64 | |
dmraid-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: f4cea92378af0c8c2a48b693bd6c34866dabe5396150bcbf641e2d52c076c4ee |
dmraid-events-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: b2bd9e2c5b61e9a45bd7864be144f3c08d364693cbc4f866cd7a29aa323e3a7a |
dmraid-events-logwatch-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: f776b34c2ce37421e63de6c8501dd6370f3ef73e290f2cf79801d418d3c20ff8 |
i386 | |
dmraid-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 0f8ee92e9baa089e6f64ddb3e106db9076242684989baefdb7b78b7a854cba91 |
dmraid-events-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 8511605fa3f97295d3348385e43cb2dd972e8c18d570f9c0e5d0763572aa3840 |
dmraid-events-logwatch-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 2e19da6defe8c15a992ef3f5fd4fe4fe9b866d5fd3493eb24b2af450a985f0d0 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-63.el5.src.rpm | SHA-256: 02ea27f539bbb4dbc64c67ae781654feb88ceb22c9a64c3a72b1a4de2f3c1ab5 |
s390x | |
dmraid-1.0.0.rc13-63.el5.s390x.rpm | SHA-256: 6fec57859ac59aa692f2357aa1bc994b30eab5f2c107a43021aa5d41f96bcee8 |
dmraid-devel-1.0.0.rc13-63.el5.s390x.rpm | SHA-256: 6c153e93007e4cf286f1ec3a59ea93eefe55d05ec252682db9e03cd1723925e1 |
dmraid-events-1.0.0.rc13-63.el5.s390x.rpm | SHA-256: f625165f73b920fbaf06d11e332de2b59352b44bc7b1b609e28bd4d8839aaddb |
dmraid-events-logwatch-1.0.0.rc13-63.el5.s390x.rpm | SHA-256: 341ff9aaaf3a5278b3245767a4f4dee564488a707dae20b31832ba98ebedad67 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-63.el5.src.rpm | SHA-256: 02ea27f539bbb4dbc64c67ae781654feb88ceb22c9a64c3a72b1a4de2f3c1ab5 |
ppc | |
dmraid-1.0.0.rc13-63.el5.ppc.rpm | SHA-256: fa189fbd0d63c389ccd823f7aef7a89fc308e896aae6eee32538c1c9e5691226 |
dmraid-devel-1.0.0.rc13-63.el5.ppc.rpm | SHA-256: 77c64705324d8379dc418a5dde3d9b7a3c467e8b4399b0d350e7ecef5b902b46 |
dmraid-events-1.0.0.rc13-63.el5.ppc.rpm | SHA-256: 0f02f26b697b38b34710ddf86344b4bcb7a17dc177fe53adb149be4b4d843b57 |
dmraid-events-logwatch-1.0.0.rc13-63.el5.ppc.rpm | SHA-256: 4ff5e5da4a2408643aa004c0df1549afed745a62b53aa135bb70af9757a4a5d6 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-63.el5.src.rpm | SHA-256: 02ea27f539bbb4dbc64c67ae781654feb88ceb22c9a64c3a72b1a4de2f3c1ab5 |
x86_64 | |
dmraid-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: f4cea92378af0c8c2a48b693bd6c34866dabe5396150bcbf641e2d52c076c4ee |
dmraid-devel-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: 313126f4df1d06c278d20e48d61bd6b059c61a881d8d6ad3725f0017af48eb0f |
dmraid-events-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: b2bd9e2c5b61e9a45bd7864be144f3c08d364693cbc4f866cd7a29aa323e3a7a |
dmraid-events-logwatch-1.0.0.rc13-63.el5.x86_64.rpm | SHA-256: f776b34c2ce37421e63de6c8501dd6370f3ef73e290f2cf79801d418d3c20ff8 |
i386 | |
dmraid-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 0f8ee92e9baa089e6f64ddb3e106db9076242684989baefdb7b78b7a854cba91 |
dmraid-devel-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 35e657dff6c16fefd12156429f6ecf024443538f15a6afbfdadb9a4176e4b53a |
dmraid-events-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 8511605fa3f97295d3348385e43cb2dd972e8c18d570f9c0e5d0763572aa3840 |
dmraid-events-logwatch-1.0.0.rc13-63.el5.i386.rpm | SHA-256: 2e19da6defe8c15a992ef3f5fd4fe4fe9b866d5fd3493eb24b2af450a985f0d0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.