Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2010:0180 - Bug Fix Advisory
Issued:
2010-03-30
Updated:
2010-03-30

RHBA-2010:0180 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

openais bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated openais packages that fix several defects are now available for
Red Hat Enterprise Linux 5.5.

Description

The Open Application Interface Specification (OpenAIS) is an API and a set
of policies for developing applications that maintain service during
faults. The OpenAIS Standards-Based Cluster Framework is an OSI-certified
implementation of the Service Availability Forum AIS. The openais packages
contain the openais executive, openais service handlers, default
configuration files, and init script.

This update addresses the following issues:

  • Resolve a segfault if the ais group doesn't exist. Note the ais group is

installed by the package but may be removed by the user later. This
resolution prints an error in that condition. (BZ#509180)

  • Properly shut down service engines when the INTR signal or QUIT signal is

sent to the aisexec process. (BZ#526069)

  • Resolve a race condition in the cpg service which could result in

failures during recovery of cpg services. (BZ#474400)

  • A random error code was returned by saCkptCheckpointOpen if the internal

IPC operation failed. Now the proper SA_AIS_ERR_LIBRARY error code is
returned in this condition. (BZ#520164)

  • An invalid assertion caused MTUs of 9000 bytes to generate a SIGABRT

signal and dump core when inside totem running heavy loads. With this
update, the assertion has been corrected (and the MTU increased to 10000
bytes). (BZ#520012)

  • Resolve a problem where checkpoint iteration and discovery can happen

during synchronization of new data structures. This results in the GFS
POSIX locking feature appearing to leave leftover locks on nodes that no
longer exist. (BZ#515159)

  • Resolve a stack overflow that results in a stack protector assertion.

(BZ#525280)

  • Resolve a defect when calling saClmTrackStart more then one time can

trigger a segfault in library clients to the clm service. (BZ#529054)

  • Resolve a defect where cpg can use a variable after it has been freed.

(BZ#540267)

  • Resolve a defect where the bindnetaddr does not follow the specifications

outlined by the man pages for operation because it uses the interface's
broadcast address instead of its local address for binding. (BZ#540490)

  • Resolve a defect where originating 206 messages in the recovery phase

triggers totem to block until a processor is stopped or started.
(BZ#544680)

  • Resolve a defect where a buffer overflow can occur in a string buffer

used when the "debug: on" option is used in the configuration. (BZ#544682)

  • Resolve a defect where an internal totem operating flag is not set

properly. (BZ#545151)

  • Resolve a defect where an invalid assertion in single-node operation can

trigger an assertion. (BZ#547828)

  • Resolve a defect where the IPC limit was 477k instead of 1MB as it should

be. (BZ#515590)

  • Resolve a defect where IPC would indicate the outbound ipc queue was

empty when the IPC queue is fully consumed by data. (BZ#560313)

  • Resolve a defect where errant code calls pthread_cond_wait in an atexit()

handler, resulting in lockup of the aisexec daemon 1% of the time on
shutdown. (BZ#566467)

All openais users should install this update, which fixes these bugs.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 474400 - groupd missing cpg confchg
  • BZ - 509180 - Openais segfaults at startup when the user ais does not exist.
  • BZ - 515590 - openais has limit of 477000 bytes for an IPC request.
  • BZ - 519159 - gfs lock is reported on 2 out of 4 nodes in cluster.
  • BZ - 520164 - saCkptCheckpointOpen ipc failure results in random error
  • BZ - 525280 - Occasionally a node within a 5-node RHEL 5.3 cluster is fenced for no apparent reason resulting in a core dump of aisexec.
  • BZ - 526069 - SIGQUIT doesn't shut down service engines
  • BZ - 529054 - calling saClmTrackStart more then one time may result in segfault.
  • BZ - 540267 - cpg can use a variable after it has been freed
  • BZ - 540490 - OpenAIS and bindnetaddr doesn't work with netmasks
  • BZ - 544680 - originating 206 or more messages in recovery causes totem to block
  • BZ - 544682 - Two string buffers can be overflowed if enough messages are originated or not originated in RECOVERY
  • BZ - 545151 - recovery protocol doesn't properly reset a variable if the token->recieved_flg is set to 0
  • BZ - 547828 - There is an invalid assertion in totemsrp which can cause a sigabort.
  • BZ - 566467 - aisexec still running after "service cman stop"

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
openais-0.80.6-16.el5.src.rpm SHA-256: 34d40005aaf2546f1de5bf0d0253f3d5352ea67740f00fc982d72072f1efd83c
x86_64
openais-0.80.6-16.el5.x86_64.rpm SHA-256: dceb836b1fa39fb2f75b0051cacc140494be2a260c275daf919ec0359b0edd17
openais-devel-0.80.6-16.el5.i386.rpm SHA-256: 383e777a0f12db91eb4576ff46cc7fcb76e28fb9bebe57f8fa7c71f28380c3dc
openais-devel-0.80.6-16.el5.x86_64.rpm SHA-256: dd2e1ad2947b919a09b1dbfb0434e3b7eb5bf1083d301c4010d6a1224630c76b
ia64
openais-0.80.6-16.el5.ia64.rpm SHA-256: 2f0ccb02fa174b799a8a531108f1f7f71994bd89b8b3bc3cd93c79dfe8232f38
openais-devel-0.80.6-16.el5.ia64.rpm SHA-256: 934d5db009d3453946d17e19c9bf8498487c79bc4a8cbbffbbe37f385f71e0e1
i386
openais-0.80.6-16.el5.i386.rpm SHA-256: d36f8140c55ee826de0919d60cfa226b8730dd8ba2b494c0f306518a44ca5cfd
openais-devel-0.80.6-16.el5.i386.rpm SHA-256: 383e777a0f12db91eb4576ff46cc7fcb76e28fb9bebe57f8fa7c71f28380c3dc

Red Hat Enterprise Linux Workstation 5

SRPM
openais-0.80.6-16.el5.src.rpm SHA-256: 34d40005aaf2546f1de5bf0d0253f3d5352ea67740f00fc982d72072f1efd83c
x86_64
openais-0.80.6-16.el5.x86_64.rpm SHA-256: dceb836b1fa39fb2f75b0051cacc140494be2a260c275daf919ec0359b0edd17
openais-devel-0.80.6-16.el5.i386.rpm SHA-256: 383e777a0f12db91eb4576ff46cc7fcb76e28fb9bebe57f8fa7c71f28380c3dc
openais-devel-0.80.6-16.el5.x86_64.rpm SHA-256: dd2e1ad2947b919a09b1dbfb0434e3b7eb5bf1083d301c4010d6a1224630c76b
i386
openais-0.80.6-16.el5.i386.rpm SHA-256: d36f8140c55ee826de0919d60cfa226b8730dd8ba2b494c0f306518a44ca5cfd
openais-devel-0.80.6-16.el5.i386.rpm SHA-256: 383e777a0f12db91eb4576ff46cc7fcb76e28fb9bebe57f8fa7c71f28380c3dc

Red Hat Enterprise Linux for Power, big endian 5

SRPM
openais-0.80.6-16.el5.src.rpm SHA-256: 34d40005aaf2546f1de5bf0d0253f3d5352ea67740f00fc982d72072f1efd83c
ppc
openais-0.80.6-16.el5.ppc.rpm SHA-256: 347a22fd177dc9c28cf89fbe1d7e0171a76022743ae9c1724122e3ba02ce7ea8
openais-devel-0.80.6-16.el5.ppc.rpm SHA-256: 52e5541c5e71a76752c4ba1f81dd32d832ec410a3d33534a5a2913989fd2e8db
openais-devel-0.80.6-16.el5.ppc64.rpm SHA-256: 3757eae2716da870378e25cf07ccfda0fe491131d71817a3061d2da748f84dcb

Red Hat Enterprise Linux Server from RHUI 5

SRPM
openais-0.80.6-16.el5.src.rpm SHA-256: 34d40005aaf2546f1de5bf0d0253f3d5352ea67740f00fc982d72072f1efd83c
x86_64
openais-0.80.6-16.el5.x86_64.rpm SHA-256: dceb836b1fa39fb2f75b0051cacc140494be2a260c275daf919ec0359b0edd17
openais-devel-0.80.6-16.el5.i386.rpm SHA-256: 383e777a0f12db91eb4576ff46cc7fcb76e28fb9bebe57f8fa7c71f28380c3dc
openais-devel-0.80.6-16.el5.x86_64.rpm SHA-256: dd2e1ad2947b919a09b1dbfb0434e3b7eb5bf1083d301c4010d6a1224630c76b
i386
openais-0.80.6-16.el5.i386.rpm SHA-256: d36f8140c55ee826de0919d60cfa226b8730dd8ba2b494c0f306518a44ca5cfd
openais-devel-0.80.6-16.el5.i386.rpm SHA-256: 383e777a0f12db91eb4576ff46cc7fcb76e28fb9bebe57f8fa7c71f28380c3dc

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility