Bug Fix Advisory cmirror bug fix update

Advisory: RHBA-2012:0554-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-05-10
Last updated on: 2012-05-10
Affected Products: RHEL Cluster-Storage (v. 5 server)


Updated cmirror packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

The cmirror packages provide user-level tools for managing cluster mirroring.
Cmirror is needed for LVM-based mirroring (RAID1) in a cluster environment.

This update fixes the following bug:

* The cluster mirror daemon sends information between cluster nodes to keep the
mirror log state consistent. Information about the state and health of the
mirror and its devices is gathered as needed from the daemon. Some of the
information does not change after the device has reached a certain state, for
example when the mirror becomes "in-sync", while other information can change,
for example the health of the log device in response to a failure. To limit the
amount of such requests and reduce the load on the network, processing of
information which cannot change is done locally. Previously, also requests for
information regarding the health of the log device - which ultimately controls
the fault handling behavior of the mirror - were processed locally, which caused
the daemon to miss the failure of the log device on a remote machine. With this
update, the information is requested from the cluster so that log device
failures are detected and processed as expected. (BZ#816973)

All users of cmirror are advised to upgrade to these updated packages, which fix
this bug.


Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at

Updated packages

RHEL Cluster-Storage (v. 5 server)

File outdated by:  RHBA-2013:0017
    MD5: b45a10b137d189127287f4b7fbdfb9ed
SHA-256: fc04848add23c3b721f60a80ab87bc2ed3e7736999a33b1153097d210b4f5d2b
File outdated by:  RHBA-2013:0017
    MD5: d3087aa8b6d2fb3a68eb73ccdbf489ad
SHA-256: d2e9a144eceb852591ed71c26b719b6531829f7b9284880f3e38ad7c1a326cf2
File outdated by:  RHBA-2013:0017
    MD5: 0cc26889fce5eefee38c6869a4757b5e
SHA-256: 515f04a48ee315e9ceab82fbe4db26f0c70d197eb3011e5f8973c8b0e2aa23bc
File outdated by:  RHBA-2013:0017
    MD5: 3e1a55d2dd113a61b53c672173139d5d
SHA-256: 82661445664cadb169ea0998d2017722b2f86c1e9a8599aa3bec3ef0fbf741e6
File outdated by:  RHBA-2013:0017
    MD5: 9fc91409e5cb365e9a3daaad7895b823
SHA-256: 6980b165ee41615e4729ee93242b639b7e63fe38043cc1dda69ed0ed5a3e7c20
(The unlinked packages above are only available from the Red Hat Network)

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/