- Issued:
- 2011-07-21
- Updated:
- 2011-07-21
RHBA-2011:1001 - Bug Fix Advisory
Synopsis
cman bug-fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated cman package that fixes bugs and adds enhancements is now available for
Red Hat Enterprise Linux 5.
Description
The Cluster Manager (cman) utility provides user-level services for
managing a Linux cluster.
This update applies fixes for the following bugs:
- It is now possible to make ccs_tool use different ports. (BZ#656427)
- The fence_cisco_ucs agent now supports sub organizations. (BZ#678902)
- "cman_tool nodes -F id,type,name,addr" no longer crashes when qdisk is
enabled. (BZ#654894)
- cman_tool now displays node votes. (BZ#653508)
- Manual pages for fencing agents have been brought up to date. (BZ#488959,
BZ#573990, BZ#663808, BZ#671089)
- fence_wti now works with larger (>16) port switches. (BZ#679160)
- A timing issue causing erratic qdiskd heuristic behavior has been fixed.
(BZ#679274)
- A traceback in fence_rsa has been fixed. (BZ#678018)
In addition, this update adds the following enhancements:
- There is now a "diag" option to fence_ipmilan to support ipmi chassis power
diag. (BZ#678061)
- The fence_rhevm agent has been updated to match the current REST API.
(BZ#681670, BZ#681676)
- The fence_vmware agent has been rewritten to use the VMWare SOAP API.
(BZ#634567)
- cman_tool no longer reports an incorrect node count. (BZ#649533)
- The man page documentation for the "expected" option to cman_tool has been
improved. (BZ#688701)
- The --ssl option now works with fence_cisco_ucs. (BZ#693395)
- "fence_ipmilan -o monitor" now returns the correct status if the chassis is
powered off. (BZ#693427)
All cman users are advised to upgrade to this updated package, which fixes these
issues and add these enhancements.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 488959 - Manual pages are not in sync with fence agents
- BZ - 573990 - fence agents man pages inconsistency
- BZ - 610942 - Full support for RHEL HA on VMware ESX/VirtualCenter deployments
- BZ - 634567 - Rework fence_vmware fence agent to use SOAP API to connect to Virtual Center instead of VMware Perl API
- BZ - 649533 - cman_tool reports incorrect node count
- BZ - 653508 - cman_tool does not display node votes
- BZ - 654894 - The command "cman_tool nodes -F id,type,name,addr" segfaults when qdisk is enabled.
- BZ - 656427 - ccs_tool will fail if different ports are used
- BZ - 663808 - missing man pages: fence_cisco_ucs, fence_rhevm, fence_ifmib
- BZ - 671089 - Fix manual page to describe usage of fence_ipmi with ilo3
- BZ - 678061 - [RFE] Add "diag" option to fence_ipmilan to support ipmi chassis power diag option
- BZ - 678682 - Test cman broadcast mode on bonded networks with mode=1 (active/passive)
- BZ - 678902 - RFE: fence_cisco_ucs needs to support sub-organizations
- BZ - 679160 - fence_wti: Unable to parse output when splitted into several screens
- BZ - 681652 - Provide fence-rhev agent that uses the RHEV REST API
- BZ - 681670 - fence_rhevm needs to change "RUNNING" status to "UP" status as the REST-API has changed.
- BZ - 681676 - fence_rhevm REST-API URL needs to be updated to "/rhevm-api/".
- BZ - 688384 - Support RHEL HA on VMware with iSCSI based storage + fence_scsi
- BZ - 688385 - Support RHEL HA on VMware with iSCSI based storage + fence_vmware
- BZ - 688386 - Support RHEL HA on VMware with raw disk based storage + fence_scsi
- BZ - 688387 - Support RHEL HA on VMware with raw disk based storage + fence_vmware
- BZ - 688388 - Support RHEL HA on VMware with raw device mapping (physical mapping) based storage + fence_scsi
- BZ - 688389 - Support RHEL HA on VMware with raw device mapping (physical mapping) based storage + fence_vmware
- BZ - 688390 - Support RHEL HA on VMware with raw device mapping (virtual mapping) based storage + fence_vmware
- BZ - 688403 - Support RHEL HA on RHEV 2.2 with iSCSI based storage + fence_scsi
- BZ - 688701 - DOCS: cman_tool "expected" option is to vague
- BZ - 690321 - Use of qdiskd as a monitoring-only tool instead of a quorum determinant
- BZ - 693395 - RHEL5.6 [Fence-Agents] : fence_cisco_ucs command fails when adding '--ssl' flag.
- BZ - 693427 - fence_ipmilan returns incorrect status on monitor op if chassis is powered off
- BZ - 717372 - Fence_VMWare_SOAP library path incorrect for x86_64
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
cman-2.0.115-85.el5.src.rpm | SHA-256: c93600d6334d79d2f18eb57cc502c0837cde0e45864b1a9a88e6c656c1f4898e |
x86_64 | |
cman-2.0.115-85.el5.x86_64.rpm | SHA-256: 2e3110fc53ec66cd470589fe2c3f1d08c4668a1a1bb82cc9a54160b441da6a60 |
cman-devel-2.0.115-85.el5.i386.rpm | SHA-256: 16a9d4136842ada5fd72c6a079f683c32e3a98f587c1bb3dc328dde05a3cd3fe |
cman-devel-2.0.115-85.el5.x86_64.rpm | SHA-256: e08d203ac9b4f75fd16e15755c32913d0ba44c7338f54c46ece67941cdca6dd3 |
ia64 | |
cman-2.0.115-85.el5.ia64.rpm | SHA-256: 8ebea5e3356d5300b7e05f9c26aa426a36f46c65b3b52d3b39e79af5d6ef5e6b |
cman-devel-2.0.115-85.el5.ia64.rpm | SHA-256: c5da2b094b2aae776ab5aa03b2dfeaf5b5fa514168302d746caeb007d4cc1074 |
i386 | |
cman-2.0.115-85.el5.i386.rpm | SHA-256: a9a999056290f34f5dd7f6191bea04ebead4e5da461fd21be198d28bc7564981 |
cman-devel-2.0.115-85.el5.i386.rpm | SHA-256: 16a9d4136842ada5fd72c6a079f683c32e3a98f587c1bb3dc328dde05a3cd3fe |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
cman-2.0.115-85.el5.src.rpm | SHA-256: c93600d6334d79d2f18eb57cc502c0837cde0e45864b1a9a88e6c656c1f4898e |
x86_64 | |
cman-2.0.115-85.el5.x86_64.rpm | SHA-256: 2e3110fc53ec66cd470589fe2c3f1d08c4668a1a1bb82cc9a54160b441da6a60 |
cman-devel-2.0.115-85.el5.i386.rpm | SHA-256: 16a9d4136842ada5fd72c6a079f683c32e3a98f587c1bb3dc328dde05a3cd3fe |
cman-devel-2.0.115-85.el5.x86_64.rpm | SHA-256: e08d203ac9b4f75fd16e15755c32913d0ba44c7338f54c46ece67941cdca6dd3 |
i386 | |
cman-2.0.115-85.el5.i386.rpm | SHA-256: a9a999056290f34f5dd7f6191bea04ebead4e5da461fd21be198d28bc7564981 |
cman-devel-2.0.115-85.el5.i386.rpm | SHA-256: 16a9d4136842ada5fd72c6a079f683c32e3a98f587c1bb3dc328dde05a3cd3fe |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
cman-2.0.115-85.el5.src.rpm | SHA-256: c93600d6334d79d2f18eb57cc502c0837cde0e45864b1a9a88e6c656c1f4898e |
ppc | |
cman-2.0.115-85.el5.ppc.rpm | SHA-256: 68515c3483850ca635b1aa891f1ec213b58aa64907515e239493ec20e67017aa |
cman-devel-2.0.115-85.el5.ppc.rpm | SHA-256: d7ba1bf4771d77ebca4e575f881f87ef0dcace32d641227dc029afaaf4bc829f |
cman-devel-2.0.115-85.el5.ppc64.rpm | SHA-256: ea8d2593b9be0b45b3ab2f4975fa670a42b0b4bba247cfbfca9372060bbcb5ed |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
cman-2.0.115-85.el5.src.rpm | SHA-256: c93600d6334d79d2f18eb57cc502c0837cde0e45864b1a9a88e6c656c1f4898e |
x86_64 | |
cman-2.0.115-85.el5.x86_64.rpm | SHA-256: 2e3110fc53ec66cd470589fe2c3f1d08c4668a1a1bb82cc9a54160b441da6a60 |
cman-devel-2.0.115-85.el5.i386.rpm | SHA-256: 16a9d4136842ada5fd72c6a079f683c32e3a98f587c1bb3dc328dde05a3cd3fe |
cman-devel-2.0.115-85.el5.x86_64.rpm | SHA-256: e08d203ac9b4f75fd16e15755c32913d0ba44c7338f54c46ece67941cdca6dd3 |
i386 | |
cman-2.0.115-85.el5.i386.rpm | SHA-256: a9a999056290f34f5dd7f6191bea04ebead4e5da461fd21be198d28bc7564981 |
cman-devel-2.0.115-85.el5.i386.rpm | SHA-256: 16a9d4136842ada5fd72c6a079f683c32e3a98f587c1bb3dc328dde05a3cd3fe |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.