Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2013:1131 - Bug Fix Advisory
Issued:
2013-08-05
Updated:
2013-08-05

RHBA-2013:1131 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

cman bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated cman packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

Description

The Cluster Manager (cman) utility provides user-level services for managing a
Linux cluster.

This update fixes the following bug:

  • Due to incorrect detection of newline characters during an SSH connection, the

fence_drac5 agent could terminate the connection with a traceback error when
fencing a Red Hat Enterprise Linux cluster node. Only the first fencing action
completed successfully but the status of the node was not checked correctly.
Consequently, the fence agent failed to report successful fencing. When the
"reboot" operation was called, the node was only powered off. With this update,
the newline characters are correctly detected and fencing works as expected.
(BZ#986981)

Users of cman are advised to upgrade to these updated packages, which fix this
bug.

Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 ia64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9 i386
  • Red Hat Enterprise Linux Server from RHUI 5 i386
  • Red Hat Enterprise Linux Server - AUS 5.9 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.9 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server - AUS 5.9 ia64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 x86_64
  • Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9 i386

Fixes

(none)

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
cman-2.0.115-109.el5_9.4.src.rpm SHA-256: 98cdf474f049ad220d07f119e1e61246c8c873e3cdfedf8064a3fec955222e02
x86_64
cman-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: 8f74142e1b2b67ab6b11b604e1da0d0f5f03a4b96825150a7e0ee3cb3a162c0b
cman-debuginfo-2.0.115-109.el5_9.4.i386.rpm SHA-256: fcc1357f5bad684043fedbc16ef19fd296481aa4d4a6c7a62413569d499702b1
cman-debuginfo-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: 56c3a5a2f3957a7b703de078365fe1bbd3fc7ce3524865e6337b35ea76061066
cman-devel-2.0.115-109.el5_9.4.i386.rpm SHA-256: 9ad6ed69949eb61fae433bd08d418e435e4badac93a265a3770ecdee63264b91
cman-devel-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: c51dee7a97f8cd60cfed0a8b3f4eb285108dc450f0de7afdc7e3410c5944f7a7
ia64
cman-2.0.115-109.el5_9.4.ia64.rpm SHA-256: 4e787549419db4025cb3b2ba290ec1c530db33e553bfe4db30f1ad21a4eaf9bd
cman-debuginfo-2.0.115-109.el5_9.4.ia64.rpm SHA-256: 147b803966393bcb76939c67024f6cde9573830efe0ae98e016c47e857e024ea
cman-devel-2.0.115-109.el5_9.4.ia64.rpm SHA-256: eb421811823bcafe81fd5fbc865f43bc93b40a75e72530f2916470d03d04de02
i386
cman-2.0.115-109.el5_9.4.i386.rpm SHA-256: 440d1b674a362130f239b81c593ddefa749eb3cc10ba00a2da4e1879045a3b5e
cman-debuginfo-2.0.115-109.el5_9.4.i386.rpm SHA-256: fcc1357f5bad684043fedbc16ef19fd296481aa4d4a6c7a62413569d499702b1
cman-devel-2.0.115-109.el5_9.4.i386.rpm SHA-256: 9ad6ed69949eb61fae433bd08d418e435e4badac93a265a3770ecdee63264b91

Red Hat Enterprise Linux for x86_64 - Extended Update Support 5.9

SRPM
cman-2.0.115-109.el5_9.4.src.rpm SHA-256: 98cdf474f049ad220d07f119e1e61246c8c873e3cdfedf8064a3fec955222e02
x86_64
cman-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: 8f74142e1b2b67ab6b11b604e1da0d0f5f03a4b96825150a7e0ee3cb3a162c0b
cman-debuginfo-2.0.115-109.el5_9.4.i386.rpm SHA-256: fcc1357f5bad684043fedbc16ef19fd296481aa4d4a6c7a62413569d499702b1
cman-debuginfo-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: 56c3a5a2f3957a7b703de078365fe1bbd3fc7ce3524865e6337b35ea76061066
cman-devel-2.0.115-109.el5_9.4.i386.rpm SHA-256: 9ad6ed69949eb61fae433bd08d418e435e4badac93a265a3770ecdee63264b91
cman-devel-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: c51dee7a97f8cd60cfed0a8b3f4eb285108dc450f0de7afdc7e3410c5944f7a7
ia64
cman-2.0.115-109.el5_9.4.ia64.rpm SHA-256: 4e787549419db4025cb3b2ba290ec1c530db33e553bfe4db30f1ad21a4eaf9bd
cman-debuginfo-2.0.115-109.el5_9.4.ia64.rpm SHA-256: 147b803966393bcb76939c67024f6cde9573830efe0ae98e016c47e857e024ea
cman-devel-2.0.115-109.el5_9.4.ia64.rpm SHA-256: eb421811823bcafe81fd5fbc865f43bc93b40a75e72530f2916470d03d04de02
i386
cman-2.0.115-109.el5_9.4.i386.rpm SHA-256: 440d1b674a362130f239b81c593ddefa749eb3cc10ba00a2da4e1879045a3b5e
cman-debuginfo-2.0.115-109.el5_9.4.i386.rpm SHA-256: fcc1357f5bad684043fedbc16ef19fd296481aa4d4a6c7a62413569d499702b1
cman-devel-2.0.115-109.el5_9.4.i386.rpm SHA-256: 9ad6ed69949eb61fae433bd08d418e435e4badac93a265a3770ecdee63264b91

Red Hat Enterprise Linux Server from RHUI 5

SRPM
cman-2.0.115-109.el5_9.4.src.rpm SHA-256: 98cdf474f049ad220d07f119e1e61246c8c873e3cdfedf8064a3fec955222e02
x86_64
cman-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: 8f74142e1b2b67ab6b11b604e1da0d0f5f03a4b96825150a7e0ee3cb3a162c0b
cman-debuginfo-2.0.115-109.el5_9.4.i386.rpm SHA-256: fcc1357f5bad684043fedbc16ef19fd296481aa4d4a6c7a62413569d499702b1
cman-debuginfo-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: 56c3a5a2f3957a7b703de078365fe1bbd3fc7ce3524865e6337b35ea76061066
cman-devel-2.0.115-109.el5_9.4.i386.rpm SHA-256: 9ad6ed69949eb61fae433bd08d418e435e4badac93a265a3770ecdee63264b91
cman-devel-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: c51dee7a97f8cd60cfed0a8b3f4eb285108dc450f0de7afdc7e3410c5944f7a7
i386
cman-2.0.115-109.el5_9.4.i386.rpm SHA-256: 440d1b674a362130f239b81c593ddefa749eb3cc10ba00a2da4e1879045a3b5e
cman-debuginfo-2.0.115-109.el5_9.4.i386.rpm SHA-256: fcc1357f5bad684043fedbc16ef19fd296481aa4d4a6c7a62413569d499702b1
cman-devel-2.0.115-109.el5_9.4.i386.rpm SHA-256: 9ad6ed69949eb61fae433bd08d418e435e4badac93a265a3770ecdee63264b91

Red Hat Enterprise Linux Server - AUS 5.9

SRPM
cman-2.0.115-109.el5_9.4.src.rpm SHA-256: 98cdf474f049ad220d07f119e1e61246c8c873e3cdfedf8064a3fec955222e02
x86_64
cman-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: 8f74142e1b2b67ab6b11b604e1da0d0f5f03a4b96825150a7e0ee3cb3a162c0b
cman-debuginfo-2.0.115-109.el5_9.4.i386.rpm SHA-256: fcc1357f5bad684043fedbc16ef19fd296481aa4d4a6c7a62413569d499702b1
cman-debuginfo-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: 56c3a5a2f3957a7b703de078365fe1bbd3fc7ce3524865e6337b35ea76061066
cman-devel-2.0.115-109.el5_9.4.i386.rpm SHA-256: 9ad6ed69949eb61fae433bd08d418e435e4badac93a265a3770ecdee63264b91
cman-devel-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: c51dee7a97f8cd60cfed0a8b3f4eb285108dc450f0de7afdc7e3410c5944f7a7
ia64
cman-2.0.115-109.el5_9.4.ia64.rpm SHA-256: 4e787549419db4025cb3b2ba290ec1c530db33e553bfe4db30f1ad21a4eaf9bd
cman-debuginfo-2.0.115-109.el5_9.4.ia64.rpm SHA-256: 147b803966393bcb76939c67024f6cde9573830efe0ae98e016c47e857e024ea
cman-devel-2.0.115-109.el5_9.4.ia64.rpm SHA-256: eb421811823bcafe81fd5fbc865f43bc93b40a75e72530f2916470d03d04de02
i386
cman-2.0.115-109.el5_9.4.i386.rpm SHA-256: 440d1b674a362130f239b81c593ddefa749eb3cc10ba00a2da4e1879045a3b5e
cman-debuginfo-2.0.115-109.el5_9.4.i386.rpm SHA-256: fcc1357f5bad684043fedbc16ef19fd296481aa4d4a6c7a62413569d499702b1
cman-devel-2.0.115-109.el5_9.4.i386.rpm SHA-256: 9ad6ed69949eb61fae433bd08d418e435e4badac93a265a3770ecdee63264b91

Red Hat Enterprise Linux Workstation 5

SRPM
cman-2.0.115-109.el5_9.4.src.rpm SHA-256: 98cdf474f049ad220d07f119e1e61246c8c873e3cdfedf8064a3fec955222e02
x86_64
cman-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: 8f74142e1b2b67ab6b11b604e1da0d0f5f03a4b96825150a7e0ee3cb3a162c0b
cman-debuginfo-2.0.115-109.el5_9.4.i386.rpm SHA-256: fcc1357f5bad684043fedbc16ef19fd296481aa4d4a6c7a62413569d499702b1
cman-debuginfo-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: 56c3a5a2f3957a7b703de078365fe1bbd3fc7ce3524865e6337b35ea76061066
cman-devel-2.0.115-109.el5_9.4.i386.rpm SHA-256: 9ad6ed69949eb61fae433bd08d418e435e4badac93a265a3770ecdee63264b91
cman-devel-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: c51dee7a97f8cd60cfed0a8b3f4eb285108dc450f0de7afdc7e3410c5944f7a7
i386
cman-2.0.115-109.el5_9.4.i386.rpm SHA-256: 440d1b674a362130f239b81c593ddefa749eb3cc10ba00a2da4e1879045a3b5e
cman-debuginfo-2.0.115-109.el5_9.4.i386.rpm SHA-256: fcc1357f5bad684043fedbc16ef19fd296481aa4d4a6c7a62413569d499702b1
cman-devel-2.0.115-109.el5_9.4.i386.rpm SHA-256: 9ad6ed69949eb61fae433bd08d418e435e4badac93a265a3770ecdee63264b91

Red Hat Enterprise Linux for Power, big endian 5

SRPM
cman-2.0.115-109.el5_9.4.src.rpm SHA-256: 98cdf474f049ad220d07f119e1e61246c8c873e3cdfedf8064a3fec955222e02
ppc
cman-2.0.115-109.el5_9.4.ppc.rpm SHA-256: 39c1108e4c1741ead14b3530eaa5227fab387f384822c59ffa8934964ab3c220
cman-debuginfo-2.0.115-109.el5_9.4.ppc.rpm SHA-256: 2b36ac505c3838c938e9d3c29163deef13bc7bcd424f62d66e1cf981263152c1
cman-debuginfo-2.0.115-109.el5_9.4.ppc64.rpm SHA-256: 0681855fe49ea754012bb622115cbcc8b2af829a634853ba9c24e4cab9cea6a6
cman-devel-2.0.115-109.el5_9.4.ppc.rpm SHA-256: 731d5e9ac18de2cafab36a91f09906add7b8da565377249eb45b7a6c9c6c040d
cman-devel-2.0.115-109.el5_9.4.ppc64.rpm SHA-256: a20ef1135ea6035734d438347af439a9a6b93788debfe5db1f0d153aa506aab9

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 5.9

SRPM
cman-2.0.115-109.el5_9.4.src.rpm SHA-256: 98cdf474f049ad220d07f119e1e61246c8c873e3cdfedf8064a3fec955222e02
ppc
cman-2.0.115-109.el5_9.4.ppc.rpm SHA-256: 39c1108e4c1741ead14b3530eaa5227fab387f384822c59ffa8934964ab3c220
cman-debuginfo-2.0.115-109.el5_9.4.ppc.rpm SHA-256: 2b36ac505c3838c938e9d3c29163deef13bc7bcd424f62d66e1cf981263152c1
cman-debuginfo-2.0.115-109.el5_9.4.ppc64.rpm SHA-256: 0681855fe49ea754012bb622115cbcc8b2af829a634853ba9c24e4cab9cea6a6
cman-devel-2.0.115-109.el5_9.4.ppc.rpm SHA-256: 731d5e9ac18de2cafab36a91f09906add7b8da565377249eb45b7a6c9c6c040d
cman-devel-2.0.115-109.el5_9.4.ppc64.rpm SHA-256: a20ef1135ea6035734d438347af439a9a6b93788debfe5db1f0d153aa506aab9

Red Hat Enterprise Linux Server - Extended Update Support from RHUI 5.9

SRPM
cman-2.0.115-109.el5_9.4.src.rpm SHA-256: 98cdf474f049ad220d07f119e1e61246c8c873e3cdfedf8064a3fec955222e02
x86_64
cman-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: 8f74142e1b2b67ab6b11b604e1da0d0f5f03a4b96825150a7e0ee3cb3a162c0b
cman-debuginfo-2.0.115-109.el5_9.4.i386.rpm SHA-256: fcc1357f5bad684043fedbc16ef19fd296481aa4d4a6c7a62413569d499702b1
cman-debuginfo-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: 56c3a5a2f3957a7b703de078365fe1bbd3fc7ce3524865e6337b35ea76061066
cman-devel-2.0.115-109.el5_9.4.i386.rpm SHA-256: 9ad6ed69949eb61fae433bd08d418e435e4badac93a265a3770ecdee63264b91
cman-devel-2.0.115-109.el5_9.4.x86_64.rpm SHA-256: c51dee7a97f8cd60cfed0a8b3f4eb285108dc450f0de7afdc7e3410c5944f7a7
i386
cman-2.0.115-109.el5_9.4.i386.rpm SHA-256: 440d1b674a362130f239b81c593ddefa749eb3cc10ba00a2da4e1879045a3b5e
cman-debuginfo-2.0.115-109.el5_9.4.i386.rpm SHA-256: fcc1357f5bad684043fedbc16ef19fd296481aa4d4a6c7a62413569d499702b1
cman-devel-2.0.115-109.el5_9.4.i386.rpm SHA-256: 9ad6ed69949eb61fae433bd08d418e435e4badac93a265a3770ecdee63264b91

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility