Skip to navigation

Bug Fix Advisory dmraid bug fix update

Advisory: RHBA-2011:1020-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated dmraid packages that fix multiple bugs are now available for Red Hat
Enterprise Linux 5.

The dmraid packages provide the ATARAID/DDF1 activation tool. The tool supports
RAID device discovery and RAID set activation. It also displays properties for
ATARAID/DDF1-formatted RAID sets on Linux kernels using the device-mapper
utility.

This update fixes the following bugs:

* Prior to this update, the dmeventd-logwatch crontab file was not able to
specify the user that the logwatch process should be executed by. Due to this
problem, the dmraid logwatch created an incomplete crontab entry. As a
workaround, users can now change the functional portion of this crontab to: "* *
* * * root /usr/sbin/logwatch --service dmeventd --range today --detail med".
(BZ#516892)

* Prior to this update, the operating system did not boot from the RAID volume
after an interrupted rebuild operation. Due to this problem, a kernel panic
happened during the rebuild process. With this update, the operating system is
fully operational after the rebuild. (BZ#626417)

* Prior to this update, Intel ISW RAID was not correctly rebuilt when a fresh
disk was replaced in the array set. Due to this behavior, data could become
corrupted. With this update, the code is modified so that it inquires the ISW
metadata for rebuilding the drive. (BZ#635995)

* Prior to this update, a code path incorrectly dereferenced already known NULL
pointers. Due to this problem, dmraid ended with an application coredump. This
update adds a check against NULL before the pointer dereference. Now, known NULL
pointers are no longer dereferenced. (BZ#696528)

All dmraid users are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259/

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
dmraid-1.0.0.rc13-65.el5.src.rpm     MD5: 1002556d6afc6acecca95c5d127f666c
SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f
 
IA-32:
dmraid-devel-1.0.0.rc13-65.el5.i386.rpm     MD5: b2825668a1d6ea7d6b07108cfe77363e
SHA-256: f194a3a4bdd7545d78e61e9f40f6432744e7fd3f7d053c47ced4460cf8e892ed
 
x86_64:
dmraid-devel-1.0.0.rc13-65.el5.x86_64.rpm     MD5: fb7070853b921145f9dacad1e78c78ec
SHA-256: 8d7c63df298736913071d66053aac8e148518f50ba8e74bafc03eed4d3c0e2d1
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
dmraid-1.0.0.rc13-65.el5.src.rpm     MD5: 1002556d6afc6acecca95c5d127f666c
SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f
 
IA-32:
dmraid-1.0.0.rc13-65.el5.i386.rpm     MD5: d53c7347dafb75e28b3d82de5737ce6e
SHA-256: 9dad73f8b2641d7c155c0bc82fca73f54ce6f909fcc68f210390cfe7a6073947
dmraid-devel-1.0.0.rc13-65.el5.i386.rpm     MD5: b2825668a1d6ea7d6b07108cfe77363e
SHA-256: f194a3a4bdd7545d78e61e9f40f6432744e7fd3f7d053c47ced4460cf8e892ed
dmraid-events-1.0.0.rc13-65.el5.i386.rpm     MD5: 44130bfac83d7594a8a30c1017656827
SHA-256: 03d7a9d9b0f2998e561af1b9869fb0031c743100a712a2858d917573714eca3f
dmraid-events-logwatch-1.0.0.rc13-65.el5.i386.rpm     MD5: f44c1f70a2157a94ecd27110e9a7c33f
SHA-256: c48ae568d73920ad864d07c11e3823c9d72851814c516b0b0de409dbea99b285
 
IA-64:
dmraid-1.0.0.rc13-65.el5.ia64.rpm     MD5: 9ebed1b9db8425ef81308ff8a26c1513
SHA-256: 985f619ed4e51f6571bbedaf77f9ed063d3a21004047528d9e3600031c8102bb
dmraid-devel-1.0.0.rc13-65.el5.ia64.rpm     MD5: 8469f89839126a55c6d20263ff13e812
SHA-256: 6ed1ec4b2640b36de362e30c145edd8cdb366aa3e65fd1010d367adb10ab3648
dmraid-events-1.0.0.rc13-65.el5.ia64.rpm     MD5: d150e72c11ab20cbf88a64b3109b4bec
SHA-256: c014979a81ec856909eed455b30157ef6911b7d0b9109d0da5562f6a9212f0a9
dmraid-events-logwatch-1.0.0.rc13-65.el5.ia64.rpm     MD5: 969297887d5e206fe91bbd1ce1469f26
SHA-256: 23b98fd9d8bc1bf04039e794db366f49ca5592305cf8794eebcb55e84c221ffb
 
PPC:
dmraid-1.0.0.rc13-65.el5.ppc.rpm     MD5: ae21be152104381bf6dec37bff3d4090
SHA-256: 9549bd1df13b15796354c3edf0c489f5c0aaacd4049355102e980fb1805d4fe8
dmraid-devel-1.0.0.rc13-65.el5.ppc.rpm     MD5: 077563b7b285798fe177c1393701d647
SHA-256: e4d190ee51e24bac81df56858855851f4a21db40679df514b00b79e6403b3282
dmraid-events-1.0.0.rc13-65.el5.ppc.rpm     MD5: f4893424fa4f8fc42e17845654917ecd
SHA-256: 5d2faa5a1c74a8dc384a9acbd247eeb757b500adc1fad7e33759c04f239dd75e
dmraid-events-logwatch-1.0.0.rc13-65.el5.ppc.rpm     MD5: 8977e0a4e566cf1f6a911bb7c9ecdcd6
SHA-256: a974fd0544004bebc2687df757d2c7c3759c75d04e26cb570c3ca788ae9cdc8a
 
s390x:
dmraid-1.0.0.rc13-65.el5.s390x.rpm     MD5: ea31bd2aabbede5a6e3aaf606d6bd9f4
SHA-256: b7ee3a7393ffb6ae33a44f8ac5bd76ee5fb68c9dd696e02a69a88c8ea2de626b
dmraid-devel-1.0.0.rc13-65.el5.s390x.rpm     MD5: 2c3314aefb8b4e7fd82490017f5e67fd
SHA-256: 507f0da7354c6bb28259841ee08b12f2f28f9733485245aeac74fd4181e63ec8
dmraid-events-1.0.0.rc13-65.el5.s390x.rpm     MD5: 2873cf5ba26262af7f1aa12478c3e36d
SHA-256: df35bc9890706a6b29e8c22524f945dce64ff662d462fb4b8f375c74aedcba77
dmraid-events-logwatch-1.0.0.rc13-65.el5.s390x.rpm     MD5: 9822a814d199f07d595b708262a28975
SHA-256: 7f26d4ad747fa2cfcd6d41a32bd050bf17fc9805a3cffcb1fcb69a8fa366db43
 
x86_64:
dmraid-1.0.0.rc13-65.el5.x86_64.rpm     MD5: 920b3074096f3b6cec1050b11e00c995
SHA-256: 520373aa8101413857a1245c2c4c7a6fbedb7cb4d6008f6cbe784466cf1a0627
dmraid-devel-1.0.0.rc13-65.el5.x86_64.rpm     MD5: fb7070853b921145f9dacad1e78c78ec
SHA-256: 8d7c63df298736913071d66053aac8e148518f50ba8e74bafc03eed4d3c0e2d1
dmraid-events-1.0.0.rc13-65.el5.x86_64.rpm     MD5: eb1a3e84cb7f5990baf7a8c4b05982a6
SHA-256: f413a8202d27bdeae0befac4ee9f3a76bda420d15a5be8a924a4feebdd741605
dmraid-events-logwatch-1.0.0.rc13-65.el5.x86_64.rpm     MD5: 7c60571d4fbe27ceb7b86e8c97d8d028
SHA-256: 785be2e67a46dad28d9f22779de35ea27561f4de601666993dfe36a1058bb55c
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
dmraid-1.0.0.rc13-65.el5.src.rpm     MD5: 1002556d6afc6acecca95c5d127f666c
SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f
 
IA-32:
dmraid-1.0.0.rc13-65.el5.i386.rpm     MD5: d53c7347dafb75e28b3d82de5737ce6e
SHA-256: 9dad73f8b2641d7c155c0bc82fca73f54ce6f909fcc68f210390cfe7a6073947
dmraid-events-1.0.0.rc13-65.el5.i386.rpm     MD5: 44130bfac83d7594a8a30c1017656827
SHA-256: 03d7a9d9b0f2998e561af1b9869fb0031c743100a712a2858d917573714eca3f
dmraid-events-logwatch-1.0.0.rc13-65.el5.i386.rpm     MD5: f44c1f70a2157a94ecd27110e9a7c33f
SHA-256: c48ae568d73920ad864d07c11e3823c9d72851814c516b0b0de409dbea99b285
 
x86_64:
dmraid-1.0.0.rc13-65.el5.x86_64.rpm     MD5: 920b3074096f3b6cec1050b11e00c995
SHA-256: 520373aa8101413857a1245c2c4c7a6fbedb7cb4d6008f6cbe784466cf1a0627
dmraid-events-1.0.0.rc13-65.el5.x86_64.rpm     MD5: eb1a3e84cb7f5990baf7a8c4b05982a6
SHA-256: f413a8202d27bdeae0befac4ee9f3a76bda420d15a5be8a924a4feebdd741605
dmraid-events-logwatch-1.0.0.rc13-65.el5.x86_64.rpm     MD5: 7c60571d4fbe27ceb7b86e8c97d8d028
SHA-256: 785be2e67a46dad28d9f22779de35ea27561f4de601666993dfe36a1058bb55c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

626417 - [Intel 5.7 Bug] Kernel panic when rebuilding and reboot occurs on IMSM RAID5 volume.
696528 - libdmraid-events-isw.c: Dereferencing null variable



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/