Red Hat Customer Portal

Skip to main content

Bug Fix Advisory cmirror bug fix update

Advisory: RHBA-2010:0883-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-11-12
Last updated on: 2010-11-12
Affected Products: RHEL Cluster-Storage (v. 5 server)


An updated cmirror package that fixes a bug is now available.

The cmirror package is necessary for LVM-based mirroring (RAID1) in a cluster

This updated cmirror package fixes the following bug:

* Previously, the MAJOR/MINOR macros caused a device number miscalculation,
which could result in an association of a given device number with the wrong
device. With this update, the miscalculation no longer occurs and the given
device number is associated with the right device. (BZ#640912)

All users of cmirror are advised to upgrade to this updated package, which
resolves this issue.


Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at

Updated packages

RHEL Cluster-Storage (v. 5 server)

File outdated by:  RHBA-2013:0017
    MD5: fa785c8924065d2eaeb4746238e26534
SHA-256: 5c1daae2d2433db41985708cf113e6d16f866120f1c0281176bd2c47da27bd97
File outdated by:  RHBA-2013:0017
    MD5: 3b166c63000ac6f35a075a5c7df148f5
SHA-256: facdb0ab3d7ec60fc897d1d51f788b0f598ae496aefdcd68ddb46c6e2465fb03
File outdated by:  RHBA-2013:0017
    MD5: 0b7c9a359340bb9c5e60a2ebfe4dc61d
SHA-256: 0eceb23f30edb365411a5cc3ebd50860548e9c628bef952fc4050eb51155843a
File outdated by:  RHBA-2013:0017
    MD5: 98a513291b31691dcb39fe912a2e4f57
SHA-256: c498c9d0485068d3d84c260cb9ecf9fec70d9b65781256da864f510dd1baf64e
File outdated by:  RHBA-2013:0017
    MD5: 1cf4d857de6156ec41bc5a18f79b9e9c
SHA-256: 93ee30e30f1d45885bb43f1c4e33bd49a24e7e30e256c1e0e0b0614576aad5e6
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

640912 - Wrong include file causes bad device lookup

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is More contact details at