Bug Fix Advisory clustermon bug fix update

Advisory: RHBA-2013:1602-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-11-20
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux High Availability (v. 6)
Red Hat Enterprise Linux Resilient Storage (v. 6)

Details

Updated clustermon packages that fix several bugs are now available for Red Hat
Enterprise Linux 6.

The clustermon packages are used for remote cluster management. The modclusterd
service provides an abstraction of cluster status used by conga and by the
Simple Network Management (SNMP) and Common Information Model (CIM) modules of
clustermon.

This update fixes the following bugs:

* Prior to this update, the modclusterd service made an improper CMAN API call
when attempting to associate the local machine's address with a particular
cluster node entry, but with no success. Consequently, modclusterd returned log
messages every five seconds. In addition, when logging for CMAN was enabled,
membership messages included, messages arising from the CMAN API misuse were
emitted. Now, the CMAN API call is used properly, which corrects the
aforementioned consequences. (BZ#951470)

* Previously, the modclusterd service terminated unexpectedly in IPv4-only
environments when stopped due to accessing unitialized memory only used when
IPv6 was available. With this update, modclusterd no longer crashes in IPv4-only
environments. (BZ#908728)

* Previously, the SNMP (Simple Network Management Protocol) agent exposing the
cluster status and shipped as cluster-snmp caused the SNMP server (snmpd) to
terminate unexpectedly with a segmentation fault when this module was loaded,
and the containing server was instructed to reload. This was caused by an
improper disposal of the resources facilitated by this server, alarms in
particular. Now, the module properly cleans up such resources when being
unloaded, preventing the crash on reload. (BZ#888543)

Users of clustermon are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux High Availability (v. 6)

SRPMS:
clustermon-0.16.2-28.el6.src.rpm
File outdated by:  RHBA-2016:0963
    MD5: bed2b740b2c00cc63fdb4e0e8467e551
SHA-256: 992ff3bae736c651af14b180a63ce7ebc67b154c84be454b5b0ba1c44205adec
 
IA-32:
cluster-cim-0.16.2-28.el6.i686.rpm
File outdated by:  RHBA-2016:0963
    MD5: d6bd43012cb9efb6703d1a766ff9e816
SHA-256: d99d3e307c04ce96d2497976d6076388e3c1bdf8aa03fb0135899716319f5181
cluster-snmp-0.16.2-28.el6.i686.rpm
File outdated by:  RHBA-2016:0963
    MD5: 5a576b059cc4c83cc0a2af91a6d90c24
SHA-256: 55f368ddbf43d8221f25c54096e4fe53cd490d4c96b78be8971a0917c6bdf74a
clustermon-debuginfo-0.16.2-28.el6.i686.rpm
File outdated by:  RHBA-2016:0963
    MD5: feb31a24692c5e4853b1a89c86a904f9
SHA-256: 92f1ed76c45bf364b6ca0f1e21cbf63c29f1abef7dbe6b7e596cbe1522652688
modcluster-0.16.2-28.el6.i686.rpm
File outdated by:  RHBA-2016:0963
    MD5: 2d455d990f9dabd9144df52e87a91775
SHA-256: 3f2728c0b68c707aa7b9a2142e77f71c05410070fa709ea6a4837b77ca6ba750
 
x86_64:
cluster-cim-0.16.2-28.el6.x86_64.rpm
File outdated by:  RHBA-2016:0963
    MD5: cd807d9b743a285dcbcb142d9f882eea
SHA-256: ff00ada4e1d9e29d8e8af1bd5244f3af4f9cd40a075adb0e2562bcc64dd7c0b2
cluster-snmp-0.16.2-28.el6.x86_64.rpm
File outdated by:  RHBA-2016:0963
    MD5: 5ed577c78e7af48277f2a36c0ba4b5ba
SHA-256: dc9dff1df5287b005c64257eb5616e18263759a8aaa047de9b74253fbd4a8230
clustermon-debuginfo-0.16.2-28.el6.x86_64.rpm
File outdated by:  RHBA-2016:0963
    MD5: 8e4d8b4364a995e37d11672a5b68261b
SHA-256: 84663717d78fb1f8aaf63862109c41b6bdceeec963fb0b68eaea20d09f44ddbf
modcluster-0.16.2-28.el6.x86_64.rpm
File outdated by:  RHBA-2016:0963
    MD5: a6b57b3a08afeb43a048dad0c9234f23
SHA-256: f9219410cf3fc98b5119a356545ff0d36870c87bf63117707e075d87ec0c4adf
 
Red Hat Enterprise Linux Resilient Storage (v. 6)

SRPMS:
clustermon-0.16.2-28.el6.src.rpm
File outdated by:  RHBA-2016:0963
    MD5: bed2b740b2c00cc63fdb4e0e8467e551
SHA-256: 992ff3bae736c651af14b180a63ce7ebc67b154c84be454b5b0ba1c44205adec
 
IA-32:
cluster-cim-0.16.2-28.el6.i686.rpm
File outdated by:  RHBA-2016:0963
    MD5: d6bd43012cb9efb6703d1a766ff9e816
SHA-256: d99d3e307c04ce96d2497976d6076388e3c1bdf8aa03fb0135899716319f5181
cluster-snmp-0.16.2-28.el6.i686.rpm
File outdated by:  RHBA-2016:0963
    MD5: 5a576b059cc4c83cc0a2af91a6d90c24
SHA-256: 55f368ddbf43d8221f25c54096e4fe53cd490d4c96b78be8971a0917c6bdf74a
clustermon-debuginfo-0.16.2-28.el6.i686.rpm
File outdated by:  RHBA-2016:0963
    MD5: feb31a24692c5e4853b1a89c86a904f9
SHA-256: 92f1ed76c45bf364b6ca0f1e21cbf63c29f1abef7dbe6b7e596cbe1522652688
modcluster-0.16.2-28.el6.i686.rpm
File outdated by:  RHBA-2016:0963
    MD5: 2d455d990f9dabd9144df52e87a91775
SHA-256: 3f2728c0b68c707aa7b9a2142e77f71c05410070fa709ea6a4837b77ca6ba750
 
x86_64:
cluster-cim-0.16.2-28.el6.x86_64.rpm
File outdated by:  RHBA-2016:0963
    MD5: cd807d9b743a285dcbcb142d9f882eea
SHA-256: ff00ada4e1d9e29d8e8af1bd5244f3af4f9cd40a075adb0e2562bcc64dd7c0b2
cluster-snmp-0.16.2-28.el6.x86_64.rpm
File outdated by:  RHBA-2016:0963
    MD5: 5ed577c78e7af48277f2a36c0ba4b5ba
SHA-256: dc9dff1df5287b005c64257eb5616e18263759a8aaa047de9b74253fbd4a8230
clustermon-debuginfo-0.16.2-28.el6.x86_64.rpm
File outdated by:  RHBA-2016:0963
    MD5: 8e4d8b4364a995e37d11672a5b68261b
SHA-256: 84663717d78fb1f8aaf63862109c41b6bdceeec963fb0b68eaea20d09f44ddbf
modcluster-0.16.2-28.el6.x86_64.rpm
File outdated by:  RHBA-2016:0963
    MD5: a6b57b3a08afeb43a048dad0c9234f23
SHA-256: f9219410cf3fc98b5119a356545ff0d36870c87bf63117707e075d87ec0c4adf
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/