- Issued:
- 2010-04-22
- Updated:
- 2010-04-22
RHBA-2010:0367 - Bug Fix Advisory
Synopsis
openais bug fix update
Type/Severity
Bug Fix Advisory
Topic
An updated openais package that fixes a bug is now available for Red Hat
Enterprise Linux 5.4 Extended Update Support.
Description
The Application Interface Specification (AIS) is an API and set of policies for
developing applications that maintain service during faults. The OpenAIS
Standards Based Cluster Framework is an OSI-certified implementation of the
Service Availability Forum AIS. The openais package contains the openais
executive, openais service handlers, default configuration files and init
script.
These updated openais packages provide fixes for the following bugs:
- all Red Hat Enterprise Linux packages are built with the '-fstack-protector'
compilation flag, which is used to detect stack overflows. In very rare cases,
the aisexec component generated a stack overflow which resulted in a
segmentation fault in the OpenAIS aisexec process. With this update, such a
stack overflow no longer occurs. (BZ#548480)
- files on a cluster node could have reported being locked by process IDs which
were not running on any nodes in the cluster. This was caused by mishandling in
GFS's plock file-locking mechanism, which has been fixed in this update.
(BZ#554488)
- CPG messages could have been corrupted if the dispatch buffer was filled up
with an exact number of bytes, which resulted in the contents of the dispatch
buffer being overwritten with newer messages. This update ensures that messages
in the dispatch buffer are never overwritten by newer messages, thus preventing
possible message corruption. (BZ#565402)
- multicast messages which were lost at the end of stream of messages resulted
in an inability to recover those messages and a "FAILED TO RECEIVE" state.
(BZ#577886)
All users of openais are advised to upgrade to these updated packages, which
resolve these issues.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 ia64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.4 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 5.4 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.4 ppc
Fixes
- BZ - 548480 - Occasionally a node within a 5-node RHEL 5.3 cluster is fenced for no apparent reason resulting in a core dump of aisexec.
- BZ - 554488 - gfs lock is reported on 2 out of 4 nodes in cluster.
- BZ - 565402 - ipc doesn't differentiate between full buffer and empty buffer properly resulting in cpg messaging corruption
- BZ - 577886 - openais FAILED TO RECEIVE / GATHER loop
CVEs
(none)
References
(none)
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.