- Issued:
- 2016-08-23
- Updated:
- 2016-08-23
RHBA-2016:1658 - Bug Fix Advisory
Synopsis
cman bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated cman packages that fix one bug are now available for Red Hat Enterprise
Linux 5.
Description
The Cluster Manager (cman) utility provides user-level services for managing a
Linux cluster.
This update fixes the following bug:
- Due to security concerns, the Secure Sockets Layer version 3 (SSLv3)
has been deprecated on the Cisco Unified Computing System (UCS) hardware
with the UCS firmware. However, the prior version of the fence_cisco_ucs fence
agent did not allow the Transport Layer Security version 1 (TLSv1) protocol
version to be used instead. As a consequence, fence_cisco_ucs did not work with
Cisco UCS devices running the latest firmware, which could cause security
issues. The underlying code has been fixed so that fence_cisco_ucs now uses
TLSv1.3 instead of SSLv3. Now, fence_cisco_ucs works as expected with Cisco UCS
hardware running the latest firmware. (BZ#1321592)
- Fence agents that connected using the SSH protocol previously failed to log in
if an identity file was used as the method of authentication. The bug has been
fixed, and the aforementioned fence agents now successfully authenticate through
an identity file. (BZ#1206604)
Users of cman are advised to upgrade to these updated packages, which fix this
bug.
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux for Power, big endian 5 ppc
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
cman-2.0.115-124.el5_11.4.src.rpm | SHA-256: ab843c608e31717612603dffc446f902b9a008096dfd0ecdbdb8414be5fc74ea |
x86_64 | |
cman-2.0.115-124.el5_11.4.x86_64.rpm | SHA-256: 1bf7cc78d8e79792d6d7fe7d04b1e898cda72b68171678e7fe7254ea43fae7db |
cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm | SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae |
cman-debuginfo-2.0.115-124.el5_11.4.x86_64.rpm | SHA-256: eb60e793cf5750ebf204fe4f4841f1081319662d9cf1267b32a8ec92c8bd8811 |
cman-devel-2.0.115-124.el5_11.4.i386.rpm | SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9 |
cman-devel-2.0.115-124.el5_11.4.x86_64.rpm | SHA-256: 3e5e7c3d276293462924c7159664aaba6f6e98a63f0b48d526ca0823917e2f90 |
ia64 | |
cman-2.0.115-124.el5_11.4.ia64.rpm | SHA-256: 432b80f6b44906b4a0741a23187b3bc924a14bf5002d2d2f7257bca5d85a3ffc |
cman-debuginfo-2.0.115-124.el5_11.4.ia64.rpm | SHA-256: 4fece127b75939db425a2b587a69141a2b155660a48188956f36372a72f9df8f |
cman-devel-2.0.115-124.el5_11.4.ia64.rpm | SHA-256: 241ee0a0e1a08e0660e7e283a34a7346f3c247f724c4e481e9afd99213a337c0 |
i386 | |
cman-2.0.115-124.el5_11.4.i386.rpm | SHA-256: 05cd28f8443ef67c1d422c45a3821c8db2b7957fdb9af70dc488b69aede81355 |
cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm | SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae |
cman-devel-2.0.115-124.el5_11.4.i386.rpm | SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
cman-2.0.115-124.el5_11.4.src.rpm | SHA-256: ab843c608e31717612603dffc446f902b9a008096dfd0ecdbdb8414be5fc74ea |
x86_64 | |
cman-2.0.115-124.el5_11.4.x86_64.rpm | SHA-256: 1bf7cc78d8e79792d6d7fe7d04b1e898cda72b68171678e7fe7254ea43fae7db |
cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm | SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae |
cman-debuginfo-2.0.115-124.el5_11.4.x86_64.rpm | SHA-256: eb60e793cf5750ebf204fe4f4841f1081319662d9cf1267b32a8ec92c8bd8811 |
cman-devel-2.0.115-124.el5_11.4.i386.rpm | SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9 |
cman-devel-2.0.115-124.el5_11.4.x86_64.rpm | SHA-256: 3e5e7c3d276293462924c7159664aaba6f6e98a63f0b48d526ca0823917e2f90 |
i386 | |
cman-2.0.115-124.el5_11.4.i386.rpm | SHA-256: 05cd28f8443ef67c1d422c45a3821c8db2b7957fdb9af70dc488b69aede81355 |
cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm | SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae |
cman-devel-2.0.115-124.el5_11.4.i386.rpm | SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
cman-2.0.115-124.el5_11.4.src.rpm | SHA-256: ab843c608e31717612603dffc446f902b9a008096dfd0ecdbdb8414be5fc74ea |
ppc | |
cman-2.0.115-124.el5_11.4.ppc.rpm | SHA-256: 20df42c3fb5d9b815bef9f8b7fc43236b2fe39c7def1d2665c5594b8b7f9c513 |
cman-debuginfo-2.0.115-124.el5_11.4.ppc.rpm | SHA-256: 9d2a0baf2c4253b1a007d2be7ab374fa02c88d274520b64154d2855ff06d7cc5 |
cman-debuginfo-2.0.115-124.el5_11.4.ppc64.rpm | SHA-256: e497cb246dc08184858a5a183731c84df96fa76e2c9c8b3235129987f4b67dcd |
cman-devel-2.0.115-124.el5_11.4.ppc.rpm | SHA-256: 61961739df2cdc9ef4e91cadb55e439f4261580b1074f6d0746c280729395936 |
cman-devel-2.0.115-124.el5_11.4.ppc64.rpm | SHA-256: 7bdaf482f4c1189bc7fba60f37cd9ee5993c1484e8782159d81bde0aa4ae36a3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.