Skip to navigation

Bug Fix Advisory openais bug fix update

Advisory: RHBA-2013:0013-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)

Details

Updated openais packages that fix multiple bugs are now available for Red Hat
Enterprise Linux 5.

The Application Interface Specification (AIS) is an API and a set of policies
for developing applications that maintain services during faults. The OpenAIS
Standards Based Cluster Framework is an OSI-certified implementation of the
Service Availability Forum AIS. The openais package contains the openais
executable, OpenAIS service handlers, default configuration files and an init
script.

This update fixes the following bugs:

* The FAIL_TO_RECV_CONST constant specifies how many rotations of a token should
be received without receiving any messages before a new configuration is formed.
Previously, this constant was set to 50, which is low for most modern switch
hardware. This could cause processes, such as corosync, to terminate
unexpectedly. The FAIL_TO_RECV_CONST constant is now set to 2500, which prevents
processes from crashing in this scenario. (BZ#671575)

* The syslog utility prints data to standard output as a function with a dynamic
number of arguments. Previously, a logged string was passed directly as a format
string, and if formatting characters were included, stack overflow or underflow
could occur. This consequently caused the aisexec process to terminate
unexpectedly with a segmentation fault. The underlying source code has been
modified so that aisexec no longer crashes in this scenario. (BZ#794837)

* Previously, the range condition for the update_aru() function could cause
incorrect check of message IDs. Due to this, in rare cases, the corosync utility
entered the "FAILED TO RECEIVE" state, and so failed to receive multicast
packets. With this update, the range value in the update_aru() function is no
longer checked for; the fail_to_recv_const constant performs such checks. Now,
corosync does not fail to receive packets. (BZ#806901)

* This update adds support for cluster hearbeat configuration through VLAN
network interfaces. (BZ#810250)

All users of openais are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
openais-0.80.6-37.el5.src.rpm     MD5: dc95f2e1604488a07d64e9d3c462b7f0
SHA-256: 72f53276b70da7f95ace80841da422b9eaba3a4e24b6461b1fc6ac4094b6695b
 
IA-32:
openais-0.80.6-37.el5.i386.rpm     MD5: 6ab52cfc3f77aeb6a493c3e4d011a0ef
SHA-256: e104d042939b09c015766a09168b52870d41e1f9b8d4ca43e228ab1bc0e812ac
openais-debuginfo-0.80.6-37.el5.i386.rpm     MD5: f270e38e76f7f3eb933a23742d9343a2
SHA-256: 1704e96054819b53e327231c61b0418d3bc38e7eeb415a3ccebf3da674f60937
openais-devel-0.80.6-37.el5.i386.rpm     MD5: 684b8eb8103daad144e87f7b1c5a71cb
SHA-256: 079cc7c8457fd8b155ca4e228252def95a4b6ac7f367aafed0ab4b8bbad8ef26
 
x86_64:
openais-0.80.6-37.el5.x86_64.rpm     MD5: 1aae688cd03ac39dae40802cee30409e
SHA-256: ea07ba5b96a35a5194f5f2ac65b48bfacabca23485487a048dd0d45009b1cfea
openais-debuginfo-0.80.6-37.el5.i386.rpm     MD5: f270e38e76f7f3eb933a23742d9343a2
SHA-256: 1704e96054819b53e327231c61b0418d3bc38e7eeb415a3ccebf3da674f60937
openais-debuginfo-0.80.6-37.el5.x86_64.rpm     MD5: d2f47a089489fb94787abed663aebaea
SHA-256: 3b45b2767a498632a346a8823eb4c6a33b82f719b592cb24674d490b4f848194
openais-devel-0.80.6-37.el5.i386.rpm     MD5: 684b8eb8103daad144e87f7b1c5a71cb
SHA-256: 079cc7c8457fd8b155ca4e228252def95a4b6ac7f367aafed0ab4b8bbad8ef26
openais-devel-0.80.6-37.el5.x86_64.rpm     MD5: 9038227e2240db7c81314c36a2b0cee0
SHA-256: 622b4baf5458a0353b7f6c0ac2e2b37e0fce8e2862e76d95383138b17777addd
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
openais-0.80.6-37.el5.src.rpm     MD5: dc95f2e1604488a07d64e9d3c462b7f0
SHA-256: 72f53276b70da7f95ace80841da422b9eaba3a4e24b6461b1fc6ac4094b6695b
 
IA-32:
openais-0.80.6-37.el5.i386.rpm     MD5: 6ab52cfc3f77aeb6a493c3e4d011a0ef
SHA-256: e104d042939b09c015766a09168b52870d41e1f9b8d4ca43e228ab1bc0e812ac
openais-debuginfo-0.80.6-37.el5.i386.rpm     MD5: f270e38e76f7f3eb933a23742d9343a2
SHA-256: 1704e96054819b53e327231c61b0418d3bc38e7eeb415a3ccebf3da674f60937
openais-devel-0.80.6-37.el5.i386.rpm     MD5: 684b8eb8103daad144e87f7b1c5a71cb
SHA-256: 079cc7c8457fd8b155ca4e228252def95a4b6ac7f367aafed0ab4b8bbad8ef26
 
IA-64:
openais-0.80.6-37.el5.ia64.rpm     MD5: ae522f485741f77c68974a96456243f3
SHA-256: 4840466a3da23702083ff53c8c047f21654469fd883d46562db22b022834daff
openais-debuginfo-0.80.6-37.el5.ia64.rpm     MD5: 4672a1055bfafd26ca6f6519f772cf40
SHA-256: aa4fd5e31b12fcd9800792b3ec764c1ab10b9010dc1b4ae0176f54ace6f9f020
openais-devel-0.80.6-37.el5.ia64.rpm     MD5: e99a2a6b80d0d200b1ef5d1d47122577
SHA-256: 2fcf9b396ee327992fa2768d46725f2588f33df5feb85bc4ca4e4095bbcdfaa6
 
PPC:
openais-0.80.6-37.el5.ppc.rpm     MD5: 0a0c7c0fe7a2e3fea6d28d9df354b64c
SHA-256: c81aa6e3d0fe9aca7d31c04c38a1c14e3bfdd5cc843a18f67ba373d8035899f6
openais-debuginfo-0.80.6-37.el5.ppc.rpm     MD5: aedda4d20fa9e6fede8e23c723445e54
SHA-256: 9b511a5c1a1df67eba8143e9c733aaea4479d82863eba11ca100ef4cb267603e
openais-debuginfo-0.80.6-37.el5.ppc64.rpm     MD5: 8b2ac68f3111ec8b4482104a77510098
SHA-256: 1a3f0ba7aed1aba7d78dfde073356050f58888ebeb44b843599ef382c10e8793
openais-devel-0.80.6-37.el5.ppc.rpm     MD5: 733b3b7b40c43032e3ed913d518a8273
SHA-256: 1626b9cc5906fd27cc9f481a7ae1ac7665e4f8129bfced5e16d9fe563fe2b778
openais-devel-0.80.6-37.el5.ppc64.rpm     MD5: 29407583535a1a7999a8023553b1633e
SHA-256: 016f90c2344c5ce84ad748cca3d05c3f3cab742e4d957918cfe9f129f2d639ed
 
x86_64:
openais-0.80.6-37.el5.x86_64.rpm     MD5: 1aae688cd03ac39dae40802cee30409e
SHA-256: ea07ba5b96a35a5194f5f2ac65b48bfacabca23485487a048dd0d45009b1cfea
openais-debuginfo-0.80.6-37.el5.i386.rpm     MD5: f270e38e76f7f3eb933a23742d9343a2
SHA-256: 1704e96054819b53e327231c61b0418d3bc38e7eeb415a3ccebf3da674f60937
openais-debuginfo-0.80.6-37.el5.x86_64.rpm     MD5: d2f47a089489fb94787abed663aebaea
SHA-256: 3b45b2767a498632a346a8823eb4c6a33b82f719b592cb24674d490b4f848194
openais-devel-0.80.6-37.el5.i386.rpm     MD5: 684b8eb8103daad144e87f7b1c5a71cb
SHA-256: 079cc7c8457fd8b155ca4e228252def95a4b6ac7f367aafed0ab4b8bbad8ef26
openais-devel-0.80.6-37.el5.x86_64.rpm     MD5: 9038227e2240db7c81314c36a2b0cee0
SHA-256: 622b4baf5458a0353b7f6c0ac2e2b37e0fce8e2862e76d95383138b17777addd
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

671575 - [TOTEM] FAILED TO RECEIVE + aisexec crash
806901 - A rare condition can lead to fail to recv



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/