Skip to navigation

Bug Fix Advisory opensm bug fix update

Advisory: RHBA-2011:0969-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)

Details

Updated opensm packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

OpenSM is the OpenIB project's Subnet Manager for InfiniBand networks. The
Subnet Manager is run as a system daemon on one of the machines in the
InfiniBand fabric to manage the fabric's routing state. OpenSM also contains
various tools for diagnosing and testing InfiniBand networks that can be used
from any machine and do not need to be run on a machine running the opensm
daemon.

* Prior to this update, an attempt to connect to a target machine using the SCSI
RDMA Protocol (SRP) could cause Small Computer System Interface (SCSI) requests
to fail with a timeout. Due to this fault, the mapping of SCSI over InfiniBand
was rendered unusable. As a workaround, users are advised not to set the dgid
pointer for intra-subnet PR queries. Now, the mapping of SCSI over InfiniBand
works as expected. (BZ#645547)

All InfiniBand users are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
opensm-3.3.3-2.el5.src.rpm
File outdated by:  RHBA-2013:0106
    MD5: 933679b44bee65bc9dc0e7c8c184efb3
SHA-256: 9a59ecf8ee5eee1104cfea6a76bf2cc80b6de2cef7e49c5725b9c48d0a44e93c
 
IA-32:
opensm-3.3.3-2.el5.i386.rpm
File outdated by:  RHBA-2013:0106
    MD5: 0f3b57f39223b4dc1be9855fc1fb11a2
SHA-256: 4c0e51413f4339b9c6bc895cdc33672aa8212b78db1e7c3dff15907006ac9ecf
opensm-devel-3.3.3-2.el5.i386.rpm
File outdated by:  RHBA-2013:0106
    MD5: 4397c97ca69d73e9553441783bbd9d0c
SHA-256: 7c2c54749835fe5d0d4b8c756904a1cb88610e9b7812bbf792c0a9f13ac776b3
opensm-libs-3.3.3-2.el5.i386.rpm
File outdated by:  RHBA-2013:0106
    MD5: f6060028ec12c33684cacd940287744a
SHA-256: 11647724ce131270cbf44663e3a1e4d75912534424487463543b75749c18fb86
opensm-static-3.3.3-2.el5.i386.rpm
File outdated by:  RHBA-2013:0106
    MD5: 140f0ec1ec1c95f52b8ed4adbee0cc14
SHA-256: d05fb1c3eb4d3b06d56d0838875a81e8205fc88a2e6cadf3b85bd165379eac71
 
x86_64:
opensm-3.3.3-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0106
    MD5: 6ac1400df499c6ba1d3b0e6bcc4db9df
SHA-256: 9bf053c35c7970c24195b86749ced3e78d62cc221c7b4357405cbaab709ff149
opensm-devel-3.3.3-2.el5.i386.rpm
File outdated by:  RHBA-2013:0106
    MD5: 4397c97ca69d73e9553441783bbd9d0c
SHA-256: 7c2c54749835fe5d0d4b8c756904a1cb88610e9b7812bbf792c0a9f13ac776b3
opensm-devel-3.3.3-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0106
    MD5: 5659afa53a1e21c64cd45a7f6f570975
SHA-256: 03aa8f971c4a7707ae9b2f5e0f9a955fc788307d5238879fca35f6a635f762c6
opensm-libs-3.3.3-2.el5.i386.rpm
File outdated by:  RHBA-2013:0106
    MD5: f6060028ec12c33684cacd940287744a
SHA-256: 11647724ce131270cbf44663e3a1e4d75912534424487463543b75749c18fb86
opensm-libs-3.3.3-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0106
    MD5: ddf416846a7dda93a30625b0c156aaab
SHA-256: 88cc6fb831bcb29cb974a6b0752f55a0a1dae1d2c47159b69ca2cfac235db143
opensm-static-3.3.3-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0106
    MD5: b27f29e9bcb9426e4e561c475444400a
SHA-256: db4a36f79fcc42bb26e482dcdb98baaf791c9322e508238d10c0410d713f78e2
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
opensm-3.3.3-2.el5.src.rpm
File outdated by:  RHBA-2013:0106
    MD5: 933679b44bee65bc9dc0e7c8c184efb3
SHA-256: 9a59ecf8ee5eee1104cfea6a76bf2cc80b6de2cef7e49c5725b9c48d0a44e93c
 
IA-32:
opensm-3.3.3-2.el5.i386.rpm
File outdated by:  RHBA-2013:0106
    MD5: 0f3b57f39223b4dc1be9855fc1fb11a2
SHA-256: 4c0e51413f4339b9c6bc895cdc33672aa8212b78db1e7c3dff15907006ac9ecf
opensm-devel-3.3.3-2.el5.i386.rpm
File outdated by:  RHBA-2013:0106
    MD5: 4397c97ca69d73e9553441783bbd9d0c
SHA-256: 7c2c54749835fe5d0d4b8c756904a1cb88610e9b7812bbf792c0a9f13ac776b3
opensm-libs-3.3.3-2.el5.i386.rpm
File outdated by:  RHBA-2013:0106
    MD5: f6060028ec12c33684cacd940287744a
SHA-256: 11647724ce131270cbf44663e3a1e4d75912534424487463543b75749c18fb86
opensm-static-3.3.3-2.el5.i386.rpm
File outdated by:  RHBA-2013:0106
    MD5: 140f0ec1ec1c95f52b8ed4adbee0cc14
SHA-256: d05fb1c3eb4d3b06d56d0838875a81e8205fc88a2e6cadf3b85bd165379eac71
 
IA-64:
opensm-3.3.3-2.el5.ia64.rpm
File outdated by:  RHBA-2013:0106
    MD5: 59a96dd0cb381bdceb867b7a7808eb75
SHA-256: 205012816c5d48156fe8a41cb5b75185b2eaa8155ff291bddc0678502b64f53a
opensm-devel-3.3.3-2.el5.ia64.rpm
File outdated by:  RHBA-2013:0106
    MD5: b2dcce99d30a25b91e9082a0df716cec
SHA-256: 03cc70c932e6610b42946f10ff27fe88de050948accd513193877b54ec27177b
opensm-libs-3.3.3-2.el5.ia64.rpm
File outdated by:  RHBA-2013:0106
    MD5: 749c8797a31cac1da5b4cb9deb80fea6
SHA-256: 4c0e4f974b9d2c4fb51f7a6a13e902dbab82b5003578799dd63b943790a48935
opensm-static-3.3.3-2.el5.ia64.rpm
File outdated by:  RHBA-2013:0106
    MD5: 07bea1e05241f83d5077e62dbc9e299f
SHA-256: afa2921832692d479fe956b39c3f4b2dfab990e60c359a1ba1ab7bd3b2ad5b48
 
PPC:
opensm-3.3.3-2.el5.ppc.rpm
File outdated by:  RHBA-2013:0106
    MD5: 8d935fa808fa76b60b755575897a79d5
SHA-256: 4492ec335d8a27d223c0125f3825c635a7667913b63f0efe4d1bf5ad5d100d9f
opensm-devel-3.3.3-2.el5.ppc.rpm
File outdated by:  RHBA-2013:0106
    MD5: cc2f009af7f31626d63758478a6e0459
SHA-256: 83c8d151d9303afd5d6d47942f36c3dc9ae5b1aae09336c96ec7895eb4b5971c
opensm-devel-3.3.3-2.el5.ppc64.rpm
File outdated by:  RHBA-2013:0106
    MD5: a98123945a3424b9bfc2cff61d2c5ad5
SHA-256: 467422e68b7fb76a4bfdba3f64194ff116b6f59805d45568099fc397b978292b
opensm-libs-3.3.3-2.el5.ppc.rpm
File outdated by:  RHBA-2013:0106
    MD5: 9697ce562444048732e3206159d65fb3
SHA-256: 5dd64bd65e7c94f5011eb73d94165d2f0417a4bd0b0aced4ece70074e7330485
opensm-libs-3.3.3-2.el5.ppc64.rpm
File outdated by:  RHBA-2013:0106
    MD5: 959a87a04188fc3ebece9f70e2ef55e6
SHA-256: 8cc5908f5d66bb191a783453b4d05b4e6d50a619513bdb1402831326580faa9a
opensm-static-3.3.3-2.el5.ppc.rpm
File outdated by:  RHBA-2013:0106
    MD5: edaaa6e8564a5cc7bd17f687cd194bea
SHA-256: 15c8bee3529de28a607d97d3d9d5f195bbb2dd87677952c17fd2ca37add75f1a
opensm-static-3.3.3-2.el5.ppc64.rpm
File outdated by:  RHBA-2013:0106
    MD5: 6d0ce3ed4b64bab2a49b8b2d366e2966
SHA-256: 84fda800f7ea12d2b6c94b4164f83395c97c4144a66f60112304ac909d4902e4
 
x86_64:
opensm-3.3.3-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0106
    MD5: 6ac1400df499c6ba1d3b0e6bcc4db9df
SHA-256: 9bf053c35c7970c24195b86749ced3e78d62cc221c7b4357405cbaab709ff149
opensm-devel-3.3.3-2.el5.i386.rpm
File outdated by:  RHBA-2013:0106
    MD5: 4397c97ca69d73e9553441783bbd9d0c
SHA-256: 7c2c54749835fe5d0d4b8c756904a1cb88610e9b7812bbf792c0a9f13ac776b3
opensm-devel-3.3.3-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0106
    MD5: 5659afa53a1e21c64cd45a7f6f570975
SHA-256: 03aa8f971c4a7707ae9b2f5e0f9a955fc788307d5238879fca35f6a635f762c6
opensm-libs-3.3.3-2.el5.i386.rpm
File outdated by:  RHBA-2013:0106
    MD5: f6060028ec12c33684cacd940287744a
SHA-256: 11647724ce131270cbf44663e3a1e4d75912534424487463543b75749c18fb86
opensm-libs-3.3.3-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0106
    MD5: ddf416846a7dda93a30625b0c156aaab
SHA-256: 88cc6fb831bcb29cb974a6b0752f55a0a1dae1d2c47159b69ca2cfac235db143
opensm-static-3.3.3-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:0106
    MD5: b27f29e9bcb9426e4e561c475444400a
SHA-256: db4a36f79fcc42bb26e482dcdb98baaf791c9322e508238d10c0410d713f78e2
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

645547 - opensm 3.3.3 breaks SRP (and some ib connections)



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/