- Issued:
- 2011-07-21
- Updated:
- 2011-07-21
RHBA-2011:1020 - Bug Fix Advisory
Synopsis
dmraid bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated dmraid packages that fix multiple bugs are now available for Red Hat
Enterprise Linux 5.
Description
The dmraid packages provide the ATARAID/DDF1 activation tool. The tool supports
RAID device discovery and RAID set activation. It also displays properties for
ATARAID/DDF1-formatted RAID sets on Linux kernels using the device-mapper
utility.
This update fixes the following bugs:
- Prior to this update, the dmeventd-logwatch crontab file was not able to
specify the user that the logwatch process should be executed by. Due to this
problem, the dmraid logwatch created an incomplete crontab entry. As a
workaround, users can now change the functional portion of this crontab to: "* *
- * * root /usr/sbin/logwatch --service dmeventd --range today --detail med".
(BZ#516892)
- Prior to this update, the operating system did not boot from the RAID volume
after an interrupted rebuild operation. Due to this problem, a kernel panic
happened during the rebuild process. With this update, the operating system is
fully operational after the rebuild. (BZ#626417)
- Prior to this update, Intel ISW RAID was not correctly rebuilt when a fresh
disk was replaced in the array set. Due to this behavior, data could become
corrupted. With this update, the code is modified so that it inquires the ISW
metadata for rebuilding the drive. (BZ#635995)
- Prior to this update, a code path incorrectly dereferenced already known NULL
pointers. Due to this problem, dmraid ended with an application coredump. This
update adds a check against NULL before the pointer dereference. Now, known NULL
pointers are no longer dereferenced. (BZ#696528)
All dmraid users are advised to upgrade to these updated packages, which fix
these bugs.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259/
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 626417 - [Intel 5.7 Bug] Kernel panic when rebuilding and reboot occurs on IMSM RAID5 volume.
- BZ - 696528 - libdmraid-events-isw.c: Dereferencing null variable
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-65.el5.src.rpm | SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f |
x86_64 | |
dmraid-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: 520373aa8101413857a1245c2c4c7a6fbedb7cb4d6008f6cbe784466cf1a0627 |
dmraid-devel-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: 8d7c63df298736913071d66053aac8e148518f50ba8e74bafc03eed4d3c0e2d1 |
dmraid-events-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: f413a8202d27bdeae0befac4ee9f3a76bda420d15a5be8a924a4feebdd741605 |
dmraid-events-logwatch-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: 785be2e67a46dad28d9f22779de35ea27561f4de601666993dfe36a1058bb55c |
ia64 | |
dmraid-1.0.0.rc13-65.el5.ia64.rpm | SHA-256: 985f619ed4e51f6571bbedaf77f9ed063d3a21004047528d9e3600031c8102bb |
dmraid-devel-1.0.0.rc13-65.el5.ia64.rpm | SHA-256: 6ed1ec4b2640b36de362e30c145edd8cdb366aa3e65fd1010d367adb10ab3648 |
dmraid-events-1.0.0.rc13-65.el5.ia64.rpm | SHA-256: c014979a81ec856909eed455b30157ef6911b7d0b9109d0da5562f6a9212f0a9 |
dmraid-events-logwatch-1.0.0.rc13-65.el5.ia64.rpm | SHA-256: 23b98fd9d8bc1bf04039e794db366f49ca5592305cf8794eebcb55e84c221ffb |
i386 | |
dmraid-1.0.0.rc13-65.el5.i386.rpm | SHA-256: 9dad73f8b2641d7c155c0bc82fca73f54ce6f909fcc68f210390cfe7a6073947 |
dmraid-devel-1.0.0.rc13-65.el5.i386.rpm | SHA-256: f194a3a4bdd7545d78e61e9f40f6432744e7fd3f7d053c47ced4460cf8e892ed |
dmraid-events-1.0.0.rc13-65.el5.i386.rpm | SHA-256: 03d7a9d9b0f2998e561af1b9869fb0031c743100a712a2858d917573714eca3f |
dmraid-events-logwatch-1.0.0.rc13-65.el5.i386.rpm | SHA-256: c48ae568d73920ad864d07c11e3823c9d72851814c516b0b0de409dbea99b285 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-65.el5.src.rpm | SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f |
x86_64 | |
dmraid-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: 520373aa8101413857a1245c2c4c7a6fbedb7cb4d6008f6cbe784466cf1a0627 |
dmraid-devel-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: 8d7c63df298736913071d66053aac8e148518f50ba8e74bafc03eed4d3c0e2d1 |
dmraid-events-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: f413a8202d27bdeae0befac4ee9f3a76bda420d15a5be8a924a4feebdd741605 |
dmraid-events-logwatch-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: 785be2e67a46dad28d9f22779de35ea27561f4de601666993dfe36a1058bb55c |
i386 | |
dmraid-1.0.0.rc13-65.el5.i386.rpm | SHA-256: 9dad73f8b2641d7c155c0bc82fca73f54ce6f909fcc68f210390cfe7a6073947 |
dmraid-devel-1.0.0.rc13-65.el5.i386.rpm | SHA-256: f194a3a4bdd7545d78e61e9f40f6432744e7fd3f7d053c47ced4460cf8e892ed |
dmraid-events-1.0.0.rc13-65.el5.i386.rpm | SHA-256: 03d7a9d9b0f2998e561af1b9869fb0031c743100a712a2858d917573714eca3f |
dmraid-events-logwatch-1.0.0.rc13-65.el5.i386.rpm | SHA-256: c48ae568d73920ad864d07c11e3823c9d72851814c516b0b0de409dbea99b285 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-65.el5.src.rpm | SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f |
x86_64 | |
dmraid-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: 520373aa8101413857a1245c2c4c7a6fbedb7cb4d6008f6cbe784466cf1a0627 |
dmraid-events-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: f413a8202d27bdeae0befac4ee9f3a76bda420d15a5be8a924a4feebdd741605 |
dmraid-events-logwatch-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: 785be2e67a46dad28d9f22779de35ea27561f4de601666993dfe36a1058bb55c |
i386 | |
dmraid-1.0.0.rc13-65.el5.i386.rpm | SHA-256: 9dad73f8b2641d7c155c0bc82fca73f54ce6f909fcc68f210390cfe7a6073947 |
dmraid-events-1.0.0.rc13-65.el5.i386.rpm | SHA-256: 03d7a9d9b0f2998e561af1b9869fb0031c743100a712a2858d917573714eca3f |
dmraid-events-logwatch-1.0.0.rc13-65.el5.i386.rpm | SHA-256: c48ae568d73920ad864d07c11e3823c9d72851814c516b0b0de409dbea99b285 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-65.el5.src.rpm | SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f |
s390x | |
dmraid-1.0.0.rc13-65.el5.s390x.rpm | SHA-256: b7ee3a7393ffb6ae33a44f8ac5bd76ee5fb68c9dd696e02a69a88c8ea2de626b |
dmraid-devel-1.0.0.rc13-65.el5.s390x.rpm | SHA-256: 507f0da7354c6bb28259841ee08b12f2f28f9733485245aeac74fd4181e63ec8 |
dmraid-events-1.0.0.rc13-65.el5.s390x.rpm | SHA-256: df35bc9890706a6b29e8c22524f945dce64ff662d462fb4b8f375c74aedcba77 |
dmraid-events-logwatch-1.0.0.rc13-65.el5.s390x.rpm | SHA-256: 7f26d4ad747fa2cfcd6d41a32bd050bf17fc9805a3cffcb1fcb69a8fa366db43 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-65.el5.src.rpm | SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f |
ppc | |
dmraid-1.0.0.rc13-65.el5.ppc.rpm | SHA-256: 9549bd1df13b15796354c3edf0c489f5c0aaacd4049355102e980fb1805d4fe8 |
dmraid-devel-1.0.0.rc13-65.el5.ppc.rpm | SHA-256: e4d190ee51e24bac81df56858855851f4a21db40679df514b00b79e6403b3282 |
dmraid-events-1.0.0.rc13-65.el5.ppc.rpm | SHA-256: 5d2faa5a1c74a8dc384a9acbd247eeb757b500adc1fad7e33759c04f239dd75e |
dmraid-events-logwatch-1.0.0.rc13-65.el5.ppc.rpm | SHA-256: a974fd0544004bebc2687df757d2c7c3759c75d04e26cb570c3ca788ae9cdc8a |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
dmraid-1.0.0.rc13-65.el5.src.rpm | SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f |
x86_64 | |
dmraid-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: 520373aa8101413857a1245c2c4c7a6fbedb7cb4d6008f6cbe784466cf1a0627 |
dmraid-devel-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: 8d7c63df298736913071d66053aac8e148518f50ba8e74bafc03eed4d3c0e2d1 |
dmraid-events-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: f413a8202d27bdeae0befac4ee9f3a76bda420d15a5be8a924a4feebdd741605 |
dmraid-events-logwatch-1.0.0.rc13-65.el5.x86_64.rpm | SHA-256: 785be2e67a46dad28d9f22779de35ea27561f4de601666993dfe36a1058bb55c |
i386 | |
dmraid-1.0.0.rc13-65.el5.i386.rpm | SHA-256: 9dad73f8b2641d7c155c0bc82fca73f54ce6f909fcc68f210390cfe7a6073947 |
dmraid-devel-1.0.0.rc13-65.el5.i386.rpm | SHA-256: f194a3a4bdd7545d78e61e9f40f6432744e7fd3f7d053c47ced4460cf8e892ed |
dmraid-events-1.0.0.rc13-65.el5.i386.rpm | SHA-256: 03d7a9d9b0f2998e561af1b9869fb0031c743100a712a2858d917573714eca3f |
dmraid-events-logwatch-1.0.0.rc13-65.el5.i386.rpm | SHA-256: c48ae568d73920ad864d07c11e3823c9d72851814c516b0b0de409dbea99b285 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.