Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2011:1020 - Bug Fix Advisory
Issued:
2011-07-21
Updated:
2011-07-21

RHBA-2011:1020 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

dmraid bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated dmraid packages that fix multiple bugs are now available for Red Hat
Enterprise Linux 5.

Description

The dmraid packages provide the ATARAID/DDF1 activation tool. The tool supports
RAID device discovery and RAID set activation. It also displays properties for
ATARAID/DDF1-formatted RAID sets on Linux kernels using the device-mapper
utility.

This update fixes the following bugs:

  • Prior to this update, the dmeventd-logwatch crontab file was not able to

specify the user that the logwatch process should be executed by. Due to this
problem, the dmraid logwatch created an incomplete crontab entry. As a
workaround, users can now change the functional portion of this crontab to: "* *

  • * * root /usr/sbin/logwatch --service dmeventd --range today --detail med".

(BZ#516892)

  • Prior to this update, the operating system did not boot from the RAID volume

after an interrupted rebuild operation. Due to this problem, a kernel panic
happened during the rebuild process. With this update, the operating system is
fully operational after the rebuild. (BZ#626417)

  • Prior to this update, Intel ISW RAID was not correctly rebuilt when a fresh

disk was replaced in the array set. Due to this behavior, data could become
corrupted. With this update, the code is modified so that it inquires the ISW
metadata for rebuilding the drive. (BZ#635995)

  • Prior to this update, a code path incorrectly dereferenced already known NULL

pointers. Due to this problem, dmraid ended with an application coredump. This
update adds a check against NULL before the pointer dereference. Now, known NULL
pointers are no longer dereferenced. (BZ#696528)

All dmraid users are advised to upgrade to these updated packages, which fix
these bugs.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259/

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 626417 - [Intel 5.7 Bug] Kernel panic when rebuilding and reboot occurs on IMSM RAID5 volume.
  • BZ - 696528 - libdmraid-events-isw.c: Dereferencing null variable

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
dmraid-1.0.0.rc13-65.el5.src.rpm SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f
x86_64
dmraid-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: 520373aa8101413857a1245c2c4c7a6fbedb7cb4d6008f6cbe784466cf1a0627
dmraid-devel-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: 8d7c63df298736913071d66053aac8e148518f50ba8e74bafc03eed4d3c0e2d1
dmraid-events-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: f413a8202d27bdeae0befac4ee9f3a76bda420d15a5be8a924a4feebdd741605
dmraid-events-logwatch-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: 785be2e67a46dad28d9f22779de35ea27561f4de601666993dfe36a1058bb55c
ia64
dmraid-1.0.0.rc13-65.el5.ia64.rpm SHA-256: 985f619ed4e51f6571bbedaf77f9ed063d3a21004047528d9e3600031c8102bb
dmraid-devel-1.0.0.rc13-65.el5.ia64.rpm SHA-256: 6ed1ec4b2640b36de362e30c145edd8cdb366aa3e65fd1010d367adb10ab3648
dmraid-events-1.0.0.rc13-65.el5.ia64.rpm SHA-256: c014979a81ec856909eed455b30157ef6911b7d0b9109d0da5562f6a9212f0a9
dmraid-events-logwatch-1.0.0.rc13-65.el5.ia64.rpm SHA-256: 23b98fd9d8bc1bf04039e794db366f49ca5592305cf8794eebcb55e84c221ffb
i386
dmraid-1.0.0.rc13-65.el5.i386.rpm SHA-256: 9dad73f8b2641d7c155c0bc82fca73f54ce6f909fcc68f210390cfe7a6073947
dmraid-devel-1.0.0.rc13-65.el5.i386.rpm SHA-256: f194a3a4bdd7545d78e61e9f40f6432744e7fd3f7d053c47ced4460cf8e892ed
dmraid-events-1.0.0.rc13-65.el5.i386.rpm SHA-256: 03d7a9d9b0f2998e561af1b9869fb0031c743100a712a2858d917573714eca3f
dmraid-events-logwatch-1.0.0.rc13-65.el5.i386.rpm SHA-256: c48ae568d73920ad864d07c11e3823c9d72851814c516b0b0de409dbea99b285

Red Hat Enterprise Linux Workstation 5

SRPM
dmraid-1.0.0.rc13-65.el5.src.rpm SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f
x86_64
dmraid-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: 520373aa8101413857a1245c2c4c7a6fbedb7cb4d6008f6cbe784466cf1a0627
dmraid-devel-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: 8d7c63df298736913071d66053aac8e148518f50ba8e74bafc03eed4d3c0e2d1
dmraid-events-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: f413a8202d27bdeae0befac4ee9f3a76bda420d15a5be8a924a4feebdd741605
dmraid-events-logwatch-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: 785be2e67a46dad28d9f22779de35ea27561f4de601666993dfe36a1058bb55c
i386
dmraid-1.0.0.rc13-65.el5.i386.rpm SHA-256: 9dad73f8b2641d7c155c0bc82fca73f54ce6f909fcc68f210390cfe7a6073947
dmraid-devel-1.0.0.rc13-65.el5.i386.rpm SHA-256: f194a3a4bdd7545d78e61e9f40f6432744e7fd3f7d053c47ced4460cf8e892ed
dmraid-events-1.0.0.rc13-65.el5.i386.rpm SHA-256: 03d7a9d9b0f2998e561af1b9869fb0031c743100a712a2858d917573714eca3f
dmraid-events-logwatch-1.0.0.rc13-65.el5.i386.rpm SHA-256: c48ae568d73920ad864d07c11e3823c9d72851814c516b0b0de409dbea99b285

Red Hat Enterprise Linux Desktop 5

SRPM
dmraid-1.0.0.rc13-65.el5.src.rpm SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f
x86_64
dmraid-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: 520373aa8101413857a1245c2c4c7a6fbedb7cb4d6008f6cbe784466cf1a0627
dmraid-events-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: f413a8202d27bdeae0befac4ee9f3a76bda420d15a5be8a924a4feebdd741605
dmraid-events-logwatch-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: 785be2e67a46dad28d9f22779de35ea27561f4de601666993dfe36a1058bb55c
i386
dmraid-1.0.0.rc13-65.el5.i386.rpm SHA-256: 9dad73f8b2641d7c155c0bc82fca73f54ce6f909fcc68f210390cfe7a6073947
dmraid-events-1.0.0.rc13-65.el5.i386.rpm SHA-256: 03d7a9d9b0f2998e561af1b9869fb0031c743100a712a2858d917573714eca3f
dmraid-events-logwatch-1.0.0.rc13-65.el5.i386.rpm SHA-256: c48ae568d73920ad864d07c11e3823c9d72851814c516b0b0de409dbea99b285

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
dmraid-1.0.0.rc13-65.el5.src.rpm SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f
s390x
dmraid-1.0.0.rc13-65.el5.s390x.rpm SHA-256: b7ee3a7393ffb6ae33a44f8ac5bd76ee5fb68c9dd696e02a69a88c8ea2de626b
dmraid-devel-1.0.0.rc13-65.el5.s390x.rpm SHA-256: 507f0da7354c6bb28259841ee08b12f2f28f9733485245aeac74fd4181e63ec8
dmraid-events-1.0.0.rc13-65.el5.s390x.rpm SHA-256: df35bc9890706a6b29e8c22524f945dce64ff662d462fb4b8f375c74aedcba77
dmraid-events-logwatch-1.0.0.rc13-65.el5.s390x.rpm SHA-256: 7f26d4ad747fa2cfcd6d41a32bd050bf17fc9805a3cffcb1fcb69a8fa366db43

Red Hat Enterprise Linux for Power, big endian 5

SRPM
dmraid-1.0.0.rc13-65.el5.src.rpm SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f
ppc
dmraid-1.0.0.rc13-65.el5.ppc.rpm SHA-256: 9549bd1df13b15796354c3edf0c489f5c0aaacd4049355102e980fb1805d4fe8
dmraid-devel-1.0.0.rc13-65.el5.ppc.rpm SHA-256: e4d190ee51e24bac81df56858855851f4a21db40679df514b00b79e6403b3282
dmraid-events-1.0.0.rc13-65.el5.ppc.rpm SHA-256: 5d2faa5a1c74a8dc384a9acbd247eeb757b500adc1fad7e33759c04f239dd75e
dmraid-events-logwatch-1.0.0.rc13-65.el5.ppc.rpm SHA-256: a974fd0544004bebc2687df757d2c7c3759c75d04e26cb570c3ca788ae9cdc8a

Red Hat Enterprise Linux Server from RHUI 5

SRPM
dmraid-1.0.0.rc13-65.el5.src.rpm SHA-256: 367f7966055cae637a003ad961f463c8f46b044b4566521f2b9cf475c151d80f
x86_64
dmraid-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: 520373aa8101413857a1245c2c4c7a6fbedb7cb4d6008f6cbe784466cf1a0627
dmraid-devel-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: 8d7c63df298736913071d66053aac8e148518f50ba8e74bafc03eed4d3c0e2d1
dmraid-events-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: f413a8202d27bdeae0befac4ee9f3a76bda420d15a5be8a924a4feebdd741605
dmraid-events-logwatch-1.0.0.rc13-65.el5.x86_64.rpm SHA-256: 785be2e67a46dad28d9f22779de35ea27561f4de601666993dfe36a1058bb55c
i386
dmraid-1.0.0.rc13-65.el5.i386.rpm SHA-256: 9dad73f8b2641d7c155c0bc82fca73f54ce6f909fcc68f210390cfe7a6073947
dmraid-devel-1.0.0.rc13-65.el5.i386.rpm SHA-256: f194a3a4bdd7545d78e61e9f40f6432744e7fd3f7d053c47ced4460cf8e892ed
dmraid-events-1.0.0.rc13-65.el5.i386.rpm SHA-256: 03d7a9d9b0f2998e561af1b9869fb0031c743100a712a2858d917573714eca3f
dmraid-events-logwatch-1.0.0.rc13-65.el5.i386.rpm SHA-256: c48ae568d73920ad864d07c11e3823c9d72851814c516b0b0de409dbea99b285

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility