- Issued:
- 2010-06-16
- Updated:
- 2010-06-16
RHBA-2010:0486 - Bug Fix Advisory
Synopsis
openais bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated openais package that fixes various bugs is now available.
Description
The Application Interface Specification (AIS) is an API and set of policies for
developing applications that maintain service during faults. The OpenAIS
Standards Based Cluster Framework is an OSI-certified implementation of the
Service Availability Forum AIS. The openais packages contain the openais
executable, OpenAIS service handlers, default configuration files and init
script.
This updated openais package provides fixes for the following bugs:
- due to the very low queue limit, openais could receive a SIGABRT signal when
the 500 messages threshold was reached on high loss networks, resulting in the
termination of some nodes. With this update, the limit has been increased to a
maximum of 16384 messages to avoid receiving the abort signal. (BZ#588627)
- on high loss networks, entering the "gather" state could interrupt the
recovery and cause an improper message delivery or even a segmentation fault.
This update ensures that the internal data element is being restored properly,
so that the sync process is no longer affected. (BZ#588628)
- on high loss networks, an unexpected stack corruption could cause stack
protector to send a SIGABRT signal and terminate the node. This update fixes
this error and the stack corruption no longer occurs. (BZ#588895)
- the use of an incorrect data type could lead to an internal data corruption.
This error has been fixed and the data type is now set properly. (BZ#588897)
All users of openais are advised to upgrade to this updated package, which
resolves these issues.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 588627 - if a node originates more then 512 messages in recovery it will sigabort (assert)
- BZ - 588628 - openais gather interrupting recovery causing lockup of sync process
- BZ - 588895 - memmove causes stack corruption on lossy network
- BZ - 588897 - use proper typing with retransmit buffer
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
openais-0.80.6-16.el5_5.2.src.rpm | SHA-256: d4e2b63facc897a8587edb13b997e7c338905d260ed1bae6a124886925db2a68 |
x86_64 | |
openais-0.80.6-16.el5_5.2.x86_64.rpm | SHA-256: 0157c3b3300940c7e196a44bc3d40e9f128c6eabb052fe91325037ab2a0451f9 |
openais-devel-0.80.6-16.el5_5.2.i386.rpm | SHA-256: 5aa0da36e5cd087dd58dbd2632b24e967ed113b40ba98a80b00c1c99feeeb4d4 |
openais-devel-0.80.6-16.el5_5.2.x86_64.rpm | SHA-256: e3d6fea96e4f7a68474c4d943c391942d0e93170707be10c05330083d9fe27e3 |
ia64 | |
openais-0.80.6-16.el5_5.2.ia64.rpm | SHA-256: 28cf950c853621eda65271bb43734e4b30b1071b04b5dbc0bca6f13f1646dc0f |
openais-devel-0.80.6-16.el5_5.2.ia64.rpm | SHA-256: b900e13ca54b64f25f7f28edfb6bfacaef7dda65aa0038a4d73688a8347f9611 |
i386 | |
openais-0.80.6-16.el5_5.2.i386.rpm | SHA-256: cdeb2dd8bfe98a174fc453e9aa22559b54f7d48ad783d3d0378e5450597a843f |
openais-devel-0.80.6-16.el5_5.2.i386.rpm | SHA-256: 5aa0da36e5cd087dd58dbd2632b24e967ed113b40ba98a80b00c1c99feeeb4d4 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
openais-0.80.6-16.el5_5.2.src.rpm | SHA-256: d4e2b63facc897a8587edb13b997e7c338905d260ed1bae6a124886925db2a68 |
x86_64 | |
openais-0.80.6-16.el5_5.2.x86_64.rpm | SHA-256: 0157c3b3300940c7e196a44bc3d40e9f128c6eabb052fe91325037ab2a0451f9 |
openais-devel-0.80.6-16.el5_5.2.i386.rpm | SHA-256: 5aa0da36e5cd087dd58dbd2632b24e967ed113b40ba98a80b00c1c99feeeb4d4 |
openais-devel-0.80.6-16.el5_5.2.x86_64.rpm | SHA-256: e3d6fea96e4f7a68474c4d943c391942d0e93170707be10c05330083d9fe27e3 |
i386 | |
openais-0.80.6-16.el5_5.2.i386.rpm | SHA-256: cdeb2dd8bfe98a174fc453e9aa22559b54f7d48ad783d3d0378e5450597a843f |
openais-devel-0.80.6-16.el5_5.2.i386.rpm | SHA-256: 5aa0da36e5cd087dd58dbd2632b24e967ed113b40ba98a80b00c1c99feeeb4d4 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
i386 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
openais-0.80.6-16.el5_5.2.src.rpm | SHA-256: d4e2b63facc897a8587edb13b997e7c338905d260ed1bae6a124886925db2a68 |
ppc | |
openais-0.80.6-16.el5_5.2.ppc.rpm | SHA-256: b3dbefc062d6bda8a2ff8793aef667f1d68b8432822323dbd9773be3019aa5c5 |
openais-devel-0.80.6-16.el5_5.2.ppc.rpm | SHA-256: 4234c8325f6f93be0a4de74d5d256ca1bf45ba207857256e731648c635745620 |
openais-devel-0.80.6-16.el5_5.2.ppc64.rpm | SHA-256: 31f1a4be224e469d21177eef703c00f8615662a166a2bc0e64516456ddac6871 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
openais-0.80.6-16.el5_5.2.src.rpm | SHA-256: d4e2b63facc897a8587edb13b997e7c338905d260ed1bae6a124886925db2a68 |
x86_64 | |
openais-0.80.6-16.el5_5.2.x86_64.rpm | SHA-256: 0157c3b3300940c7e196a44bc3d40e9f128c6eabb052fe91325037ab2a0451f9 |
openais-devel-0.80.6-16.el5_5.2.i386.rpm | SHA-256: 5aa0da36e5cd087dd58dbd2632b24e967ed113b40ba98a80b00c1c99feeeb4d4 |
openais-devel-0.80.6-16.el5_5.2.x86_64.rpm | SHA-256: e3d6fea96e4f7a68474c4d943c391942d0e93170707be10c05330083d9fe27e3 |
i386 | |
openais-0.80.6-16.el5_5.2.i386.rpm | SHA-256: cdeb2dd8bfe98a174fc453e9aa22559b54f7d48ad783d3d0378e5450597a843f |
openais-devel-0.80.6-16.el5_5.2.i386.rpm | SHA-256: 5aa0da36e5cd087dd58dbd2632b24e967ed113b40ba98a80b00c1c99feeeb4d4 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.