- Issued:
- 2010-04-19
- Updated:
- 2010-04-19
RHBA-2010:0355 - Bug Fix Advisory
Synopsis
openais bug fix update
Type/Severity
Bug Fix Advisory
Topic
Updated openais packages that resolve several issues are now available for Red
Hat Enterprise Linux 5.3 Extended Update Support.
Description
The Application Interface Specification (AIS) is an API and set of policies for
developing applications that maintain service during faults. The OpenAIS
Standards Based Cluster Framework is an OSI-certified implementation of the
Service Availability Forum AIS. The openais packages contain the openais
executable, OpenAIS service handlers, default configuration files and init
script.
These updated openais packages provide fixes for the following bugs:
- all Red Hat Enterprise Linux packages are built with the '-fstack-protector'
compilation flag, which is used to detect stack overflows. In very rare cases,
the aisexec component generated a stack overflow which resulted in a
segmentation fault in the OpenAIS aisexec process. With this update, such a
stack overflow no longer occurs. (BZ#554486)
- files on a cluster node could have reported being locked by process IDs which
were not running on any nodes in the cluster. This was caused by mishandling in
GFS's plock file-locking mechanism, which has been fixed in this update.
(BZ#554487)
- CPG messages could have been corrupted if the dispatch buffer was filled up
with an exact number of bytes, which resulted in the contents of the dispatch
buffer being overwritten with newer messages. This update ensures that messages
in the dispatch buffer are never overwritten by newer messages, thus preventing
possible message corruption. (BZ#567372)
All users of openais are advised to upgrade to these updated packages, which
resolve these issues.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.3 i386
- Red Hat Enterprise Linux Server - AUS 5.3 x86_64
- Red Hat Enterprise Linux Server - AUS 5.3 ia64
- Red Hat Enterprise Linux Server - AUS 5.3 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.3 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.3 ppc
Fixes
- BZ - 554486 - Occasionally a node within a 5-node RHEL 5.3 cluster is fenced for no apparent reason resulting in a core dump of aisexec.
- BZ - 554487 - gfs lock is reported on 2 out of 4 nodes in cluster.
- BZ - 567372 - ipc doesn't differentiate between full buffer and empty buffer properly resulting in cpg messaging corruption
CVEs
(none)
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.