Skip to navigation

Bug Fix Advisory openais bug fix update

Advisory: RHBA-2010:0629-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-08-13
Last updated on: 2010-08-13
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)

Details

An updated openais package that fixes various bugs is now available.

The Application Interface Specification (AIS) is an API and a set of policies
for developing applications that maintain services during faults. The OpenAIS
Standards Based Cluster Framework is an OSI-certified implementation of the
Service Availability Forum AIS. The openais package contains the openais
executable, OpenAIS service handlers, default configuration files and an init
script.

This updated openais package provides fixes for the following bugs:

* in high loss networks, all nodes in a cluster experienced a buffer overflow
and aborted when a threshold of unprocessed/not transmitted packets was reached.
With this update, even when a significant number of packets is unprocessed/not
transmitted, all nodes in a cluster work as expected and do not abort.
(BZ#601086)

* when an Openais client process sent an event to the server (aisexec), the
server stopped working. When the client process tried to send the event using
the saEvtEventPublish() function, it hanged indefinitely on a semaphore
(semop()) operation. Even when the server was restarted, the blocked client
process was still blocked. With this update, the client process no longer hangs
indefinitely and is unblocked after a set period of time. (BZ#603615)

* when the openais server was stopped, server clients may have encountered a
segmentation fault because of an invalid return code in an internal function.
With this update, the segmentation fault no longer occurs. (BZ#603623)

* previously, CPG API returned the wrong results when a cluster component failed
that was using openais. With this update, the correct results are returned.
(BZ#618766)

* previously, openais returned a segmentation fault if it received a CPQ
message. With this update, new message IDs are introduced into the CPQ service
so that the CPQ messages no longer cause a segmentation fault in openais.
(BZ#611931)

All users of openais are advised to upgrade to this updated package, which
resolves these issues.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

IA-32:
openais-0.80.6-16.el5_5.7.i386.rpm
File outdated by:  RHBA-2013:0013
    MD5: dbc44a735443ac848d22dcd1bdd571c9
SHA-256: 560b90c8a4c7b2cf4ce1dec932dc5a6bdfc4b37a32d8dac8d697bda6069c2183
openais-devel-0.80.6-16.el5_5.7.i386.rpm
File outdated by:  RHBA-2013:0013
    MD5: 9eada37445e71faa879e53a34d70ffcf
SHA-256: 6bd1f8cf61aa0db0b3fa3f99e624ae471e4090d19ffe7b6d2641896ad12d144e
 
x86_64:
openais-0.80.6-16.el5_5.7.x86_64.rpm
File outdated by:  RHBA-2013:0013
    MD5: fdf0aa60e473653cfc23fc9b262967ce
SHA-256: b1dbb150ac66b58d4f3abb9be7b997612f7d30ae2c6afb2e4c9f39b5a527dada
openais-devel-0.80.6-16.el5_5.7.i386.rpm
File outdated by:  RHBA-2013:0013
    MD5: 9eada37445e71faa879e53a34d70ffcf
SHA-256: 6bd1f8cf61aa0db0b3fa3f99e624ae471e4090d19ffe7b6d2641896ad12d144e
openais-devel-0.80.6-16.el5_5.7.x86_64.rpm
File outdated by:  RHBA-2013:0013
    MD5: 9b8cb9fc45228a074e2f730230b84f6a
SHA-256: bdb9f4fa7f118ef1ad52514c16b10b3c1b96463121b590cc7ca01fc2d3effd2e
 
Red Hat Enterprise Linux (v. 5 server)

IA-32:
openais-0.80.6-16.el5_5.7.i386.rpm
File outdated by:  RHBA-2013:0013
    MD5: dbc44a735443ac848d22dcd1bdd571c9
SHA-256: 560b90c8a4c7b2cf4ce1dec932dc5a6bdfc4b37a32d8dac8d697bda6069c2183
openais-devel-0.80.6-16.el5_5.7.i386.rpm
File outdated by:  RHBA-2013:0013
    MD5: 9eada37445e71faa879e53a34d70ffcf
SHA-256: 6bd1f8cf61aa0db0b3fa3f99e624ae471e4090d19ffe7b6d2641896ad12d144e
 
IA-64:
openais-0.80.6-16.el5_5.7.ia64.rpm
File outdated by:  RHBA-2013:0013
    MD5: 568f411c4cea8e078d748062912d1df8
SHA-256: aa1cb4131ddadd154e514c024bbb7adc83f7eebdd1a2d86ed2f6475e4d88bad9
openais-devel-0.80.6-16.el5_5.7.ia64.rpm
File outdated by:  RHBA-2013:0013
    MD5: 84afdbe36d615f203668ab27f2b908dd
SHA-256: 6b14adbd1fe955f7faeda323c3c4dd95f0aee4928dec460b37751d46938bb2f8
 
PPC:
openais-0.80.6-16.el5_5.7.ppc.rpm
File outdated by:  RHBA-2013:0013
    MD5: d3bbc5b6e2f5a5555bc90f224d836cb3
SHA-256: fe8c945d6ad3867d726725e616a2491da2be9798548dde4eb3bd0148486caa80
openais-devel-0.80.6-16.el5_5.7.ppc.rpm
File outdated by:  RHBA-2013:0013
    MD5: 46251ae47a74d3ee876c3087e1653441
SHA-256: c93311ad8fad0be8d5ee3ecb72c2d1c022fec753e3d59a71d261a7bd4de96937
openais-devel-0.80.6-16.el5_5.7.ppc64.rpm
File outdated by:  RHBA-2013:0013
    MD5: 279d008c4320ed77e9293d47c9fb6e8a
SHA-256: edf731aa0a50e15713549631bf81a8a567ebbcee8027b9c1c5c5f87e87a8a2c6
 
x86_64:
openais-0.80.6-16.el5_5.7.x86_64.rpm
File outdated by:  RHBA-2013:0013
    MD5: fdf0aa60e473653cfc23fc9b262967ce
SHA-256: b1dbb150ac66b58d4f3abb9be7b997612f7d30ae2c6afb2e4c9f39b5a527dada
openais-devel-0.80.6-16.el5_5.7.i386.rpm
File outdated by:  RHBA-2013:0013
    MD5: 9eada37445e71faa879e53a34d70ffcf
SHA-256: 6bd1f8cf61aa0db0b3fa3f99e624ae471e4090d19ffe7b6d2641896ad12d144e
openais-devel-0.80.6-16.el5_5.7.x86_64.rpm
File outdated by:  RHBA-2013:0013
    MD5: 9b8cb9fc45228a074e2f730230b84f6a
SHA-256: bdb9f4fa7f118ef1ad52514c16b10b3c1b96463121b590cc7ca01fc2d3effd2e
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

601086 - All nodes fail during recovery with stack protector sigabrt
603615 - Openais client blocked indefinitely on semaphore when the server goes down
603623 - When dispatch_avail is set to -1 (openais server is killed), library functions segfault
611931 - corosync 2801 introduces need for compat patch in rhel to roll
618766 - killing process gives CPG_REASON_LEAVE instead of CPG_REASON_PROCDOWN



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/