Skip to navigation

Bug Fix Advisory lvm2 bug fix update

Advisory: RHBA-2012:0056-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-01-24
Last updated on: 2012-01-24
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated lvm2 package that fixes one bug is now available for Red Hat
Enterprise Linux 5.

The lvm2 package provides support for Logical Volume Management (LVM).

This update fixes the following bug:

* Due to an incorrect test condition in the underlying code, lvm operations
could enter an infinite loop if the system contained 4 or more volume groups
with duplicate names. With this update, the erroneous test condition has been
corrected and lvm commands now complete as expected in this scenario.
(BZ#773587)

All users of lvm2 are advised to upgrade to this updated package, which fixes
this bug.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
lvm2-2.02.84-6.el5_7.2.src.rpm
File outdated by:  RHBA-2013:1352
    MD5: 0314cbf5bf01a0d860c67d10fc886c3b
SHA-256: 99b20e880ef41206f8dd71b72ddd1df7171621cd68452dca2e631fe68040354c
 
IA-32:
lvm2-2.02.84-6.el5_7.2.i386.rpm
File outdated by:  RHBA-2013:1352
    MD5: a03c411aa336789e8fb0e840584a9392
SHA-256: 611b03e8ce83380c2dddb0ab1ee53b500a33ece09b4f8e1f78fd3f67097ef354
 
IA-64:
lvm2-2.02.84-6.el5_7.2.ia64.rpm
File outdated by:  RHBA-2013:1352
    MD5: 1a78077e32eb4bd7d26d49f3cbe957c7
SHA-256: 704d0379a7c5f0726c3f77b53427580cd0b9ea0a3218be9abcc14b6e6b70fa46
 
PPC:
lvm2-2.02.84-6.el5_7.2.ppc.rpm
File outdated by:  RHBA-2013:1352
    MD5: 1a29c55370d8491e1f551959a81926f7
SHA-256: 52cfb640d3cef4b96563ddf4005fdb44d5eda04f39b48b94e0292445276e8d8f
 
s390x:
lvm2-2.02.84-6.el5_7.2.s390x.rpm
File outdated by:  RHBA-2013:1352
    MD5: 113a7893cab0dfc95007f2b1e03fe755
SHA-256: 9edd40e7704122dd1f3bc493fe7ea05e1a0d1f3b289587c61f2fdefa7a4a8215
 
x86_64:
lvm2-2.02.84-6.el5_7.2.x86_64.rpm
File outdated by:  RHBA-2013:1352
    MD5: a3039e0c9dd37ad210510ae8bc67e295
SHA-256: 8e0ecb117c8a523cbdef8ea4ea9281158d0444c2b4cbd3907a383858cebaf7cc
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
lvm2-2.02.84-6.el5_7.2.src.rpm
File outdated by:  RHBA-2013:1352
    MD5: 0314cbf5bf01a0d860c67d10fc886c3b
SHA-256: 99b20e880ef41206f8dd71b72ddd1df7171621cd68452dca2e631fe68040354c
 
IA-32:
lvm2-2.02.84-6.el5_7.2.i386.rpm
File outdated by:  RHBA-2013:1352
    MD5: a03c411aa336789e8fb0e840584a9392
SHA-256: 611b03e8ce83380c2dddb0ab1ee53b500a33ece09b4f8e1f78fd3f67097ef354
 
x86_64:
lvm2-2.02.84-6.el5_7.2.x86_64.rpm
File outdated by:  RHBA-2013:1352
    MD5: a3039e0c9dd37ad210510ae8bc67e295
SHA-256: 8e0ecb117c8a523cbdef8ea4ea9281158d0444c2b4cbd3907a383858cebaf7cc
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/