Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:1366 - Bug Fix Advisory
Issued:
2009-09-02
Updated:
2009-09-02

RHBA-2009:1366 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

openais bug-fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated openais packages that fix various bugs and add enhancements are now
available.

Description

The openais packages provide the core infrastructure used by Red Hat
Cluster Suite and GFS.

This update fixes the following bugs:

  • The CPG service, which is used throughout the cluster software, sometimes

segfaulted under certain loads. (BZ#261381)

  • On PowerPC architectures, the IPC system could segfault because of how

va_args and unions operate on these platforms. (BZ#499767)

  • The totempg subsystem in openais could sometimes throw away a message,

which could result in cluster failure. (BZ#497419)

  • The IPC system contained a regression with the CPG service, which caused

the wrong error code to be returned when the library user has insufficient
permissions. (BZ#494347)

  • The redundant ring feature cannot be re-enabled after a failure, because

of defects in libcfg. (BZ#494035)

  • The CPG service failed to synchronize properly with nodeids greater then

0xffffff. This resulted in CPG not working when automatic node id
generation was used. (BZ#489451)

  • Certain message types were ignored, resulting in improper

synchronization. (BZ#480684)

  • The checkpoint service incorrectly calculated reference counts on

checkpoints opened by an exiting node, resulting in checkpoint leak.
(BZ#490099)

  • Under heavy ipc connection/disconnection in the cpg service, the cpg

service would segfault. (BZ#497420).

  • The cpg service would segfault when cpg_join and cpg_leave were issued by

multiple nodes on the same cpg group name as a result of race condition.
(BZ#501561)

  • The totem free queue was calculated improperly resulting in aborts under

heavy cpg load. (BZ#488095)

  • Under certain conditions, a race condition resulted in a double list

delete in the cpg service causing segfault. (BZ#491459)

  • A regression in the openais build process resulted in cmirror

regressions. (BZ#496985)

  • A regression in the CPG service where a race condition would occur in the

delivery of configuration changes with 3+ nodes. (BZ#490098)

  • A regression in the CPG service where nodes would see out-of-order

configuration changes after a node was started with existing CPG groups.
(BZ#504195)

  • A regression in the confdb service where the shared object elf header was

not properly set. (BZ#504832)

  • A regression where semaphores and shared memory was leaked if service

cman stop was executed. (BZ#506778)

  • A regression, if aisexec was killed while transmitting, and later

restarted, the cluster returned ERR_TRY_AGAIN on all API calls. (BZ#506119)

This update adds the following enhancements:

  • Feature to allow rolling upgrades of the crypto stack. (BZ#497480)
  • Feature to set broadcast mode instead of using multicast. (BZ#492808)
  • Feature to allow uidgid files to be placed on the system to allow

configurable ipc security of third party applications. (BZ#501337)

Users should upgrade to these updated packages, which resolve these issues
and add these enhancements.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 261381 - openais segfault while attempting to start cman during revolver testing
  • BZ - 474277 - aisexec core dumps under load
  • BZ - 477243 - cpg flow control not working, causes aisexec hang.
  • BZ - 480684 - certain types of messages can be ignored
  • BZ - 487214 - upgrade node to 5.3, openais dies after trying to join 5.2 cluster
  • BZ - 488095 - aisexec assertion in message_handler_req_lib_cpg_mcast
  • BZ - 489451 - cpg fails to sync properly if nodeid > 0xffffff
  • BZ - 490098 - IPC race condition allows multiple ipc threads within service engine at same time
  • BZ - 490099 - Checkpoint service incorrectly calculates reference counts on checkpoints from leaving node
  • BZ - 491459 - cpg segfaults under certain test cases
  • BZ - 492808 - RFE: Request alternate cman network communication option (broadcast instead of multicast)
  • BZ - 494347 - cpg_init return wrong error code for bad group ID
  • BZ - 496985 - OpenAIS is the likely candidate for cluster mirror regression
  • BZ - 497419 - first message of totem stream thrown away - 5.3z stream regression
  • BZ - 497420 - ipc connect/disconnect in cpg service causes cpg to segfault
  • BZ - 497480 - [RFE] Need patch merged to support rolling crytpo upgrades to RHEL6
  • BZ - 499767 - groupd segfaults on start
  • BZ - 501337 - RFE: Provide configurable uid based aisexec access
  • BZ - 501561 - gfs_controld segfault during simultaneous gfs mounts
  • BZ - 504195 - cpg confchg's delivered in different order
  • BZ - 504832 - libcfg is linked improperly to libconfdb
  • BZ - 506119 - [EVT ] Evt config msg from nodeid r(0) ip(10.15.89.14) , but not in membership change
  • BZ - 506778 - semaphore leak during cluster startup/shutdown cycle

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
openais-0.80.6-8.el5.src.rpm SHA-256: e55abad9275facbf6c41b61611c43befef958bea5507897fa238807e89cfe0f0
x86_64
openais-0.80.6-8.el5.x86_64.rpm SHA-256: a65cd4065a36d738e58b697a5c2702a83f8777e93a2a27f398e815a6fac53c26
openais-devel-0.80.6-8.el5.i386.rpm SHA-256: b5751c8f63045901e0da1c857968a7b27318c6c2d4bb3068291436a5a51d8522
openais-devel-0.80.6-8.el5.x86_64.rpm SHA-256: 5c5371376ce27013b7c79d1bd32f2e443a8e6e367a971bd8e46529a8103fd3a3
ia64
openais-0.80.6-8.el5.ia64.rpm SHA-256: 67add0eca2d8c97f4709319dd9735e2f5fd90d1805960abaab8d3b2876cf0a2d
openais-devel-0.80.6-8.el5.ia64.rpm SHA-256: 0217cbe9d0080e73813cd055c3c67ca8b217d7965183a11ed8635ea2dbc93a20
i386
openais-0.80.6-8.el5.i386.rpm SHA-256: 7bc1d6e3ac7c73ce63403c6e8aec8fa54b8e15b527db5d28ebd22a34ad2e5281
openais-devel-0.80.6-8.el5.i386.rpm SHA-256: b5751c8f63045901e0da1c857968a7b27318c6c2d4bb3068291436a5a51d8522

Red Hat Enterprise Linux Workstation 5

SRPM
openais-0.80.6-8.el5.src.rpm SHA-256: e55abad9275facbf6c41b61611c43befef958bea5507897fa238807e89cfe0f0
x86_64
openais-0.80.6-8.el5.x86_64.rpm SHA-256: a65cd4065a36d738e58b697a5c2702a83f8777e93a2a27f398e815a6fac53c26
openais-devel-0.80.6-8.el5.i386.rpm SHA-256: b5751c8f63045901e0da1c857968a7b27318c6c2d4bb3068291436a5a51d8522
openais-devel-0.80.6-8.el5.x86_64.rpm SHA-256: 5c5371376ce27013b7c79d1bd32f2e443a8e6e367a971bd8e46529a8103fd3a3
i386
openais-0.80.6-8.el5.i386.rpm SHA-256: 7bc1d6e3ac7c73ce63403c6e8aec8fa54b8e15b527db5d28ebd22a34ad2e5281
openais-devel-0.80.6-8.el5.i386.rpm SHA-256: b5751c8f63045901e0da1c857968a7b27318c6c2d4bb3068291436a5a51d8522

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
openais-0.80.6-8.el5.src.rpm SHA-256: e55abad9275facbf6c41b61611c43befef958bea5507897fa238807e89cfe0f0
s390x
openais-0.80.6-8.el5.s390x.rpm SHA-256: 7c466ae702ce56d8287d9d9eb554aee3aa36785b16ac1d502709b8b924eca7a7
openais-devel-0.80.6-8.el5.s390.rpm SHA-256: ca49517aac4b425d514af42519586ad972ea96b640f171be3fd475f64d020bda
openais-devel-0.80.6-8.el5.s390x.rpm SHA-256: 8b53cc08e6789a508b627ca4267d26e4dbea05e97f5432463437beb08f4d87d2

Red Hat Enterprise Linux for Power, big endian 5

SRPM
openais-0.80.6-8.el5.src.rpm SHA-256: e55abad9275facbf6c41b61611c43befef958bea5507897fa238807e89cfe0f0
ppc
openais-0.80.6-8.el5.ppc.rpm SHA-256: 5f2c6f28c1999e7ee30fb5966e8ff5174001e0437fae332c234e80439cff6a07
openais-devel-0.80.6-8.el5.ppc.rpm SHA-256: de086c263c62c11d08001e94a9ee1416022b2600a2d6348cfc7d073ca2bf8f93
openais-devel-0.80.6-8.el5.ppc64.rpm SHA-256: c6f9597833701b8021d6991bbd06bd6ee695e4a5f8348a6ac801240e711dc6e2

Red Hat Enterprise Linux Server from RHUI 5

SRPM
openais-0.80.6-8.el5.src.rpm SHA-256: e55abad9275facbf6c41b61611c43befef958bea5507897fa238807e89cfe0f0
x86_64
openais-0.80.6-8.el5.x86_64.rpm SHA-256: a65cd4065a36d738e58b697a5c2702a83f8777e93a2a27f398e815a6fac53c26
openais-devel-0.80.6-8.el5.i386.rpm SHA-256: b5751c8f63045901e0da1c857968a7b27318c6c2d4bb3068291436a5a51d8522
openais-devel-0.80.6-8.el5.x86_64.rpm SHA-256: 5c5371376ce27013b7c79d1bd32f2e443a8e6e367a971bd8e46529a8103fd3a3
i386
openais-0.80.6-8.el5.i386.rpm SHA-256: 7bc1d6e3ac7c73ce63403c6e8aec8fa54b8e15b527db5d28ebd22a34ad2e5281
openais-devel-0.80.6-8.el5.i386.rpm SHA-256: b5751c8f63045901e0da1c857968a7b27318c6c2d4bb3068291436a5a51d8522

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility