- Issued:
- 2014-09-16
- Updated:
- 2014-09-16
RHBA-2014:1211 - Bug Fix Advisory
Synopsis
cman bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated cman packages that fix several bugs and add one enhancement are now
available for Red Hat Enterprise Linux 5.
Description
The Cluster Manager (cman) utility provides user-level services for managing a
Linux cluster.
This update fixes the following bugs:
- Due to incorrect quorum disk configuration, some cluster nodes could display
an incorrect "Member status" value if the cluster was restarted by the qdisk
quorum daemon. This update amends the quorum disk configuration and cluster
nodes now display the correct status in the scenario described.
(BZ#994187)
- Previously, the fence_cisco_ucs fence agent did not respect the "delay"
attribute, which could lead to a situation in which two nodes fenced each other.
This bug has been fixed and fence_cisco_ucs now waits for the given amount of
time as expected. (BZ#994228)
- A node on a two-node cluster could, under some circumstances, fail to unlink a
checkpoint. As a consequence, both cluster nodes on the cluster could
simultaneously be granted a lock on the same file located on a GFS2 file system.
With this update, checkpoints on two-node clusters are unlinked as intended, and
only one cluster can now hold a lock to a file at a time. (BZ#1017916)
- Due to a configuration error, qdisk in some situations used an
incorrect tko parameter for its wait period when initializing. Consequently,
qdisk initialization could be significantly delayed and, under some
circumstances, it failed entirely. With this update, the cluster configuration
file has been amended and qdisk initialization now proceeds as expected.
(BZ#1029191)
- Due to errors in the login code for the fencing.py file, the fence_bladecenter
fence agent was not able to log into fence devices. The login code for
fencing.py has been fixed, and fence_bladecenter now logs into fence devices as
expected. (BZ#1040099)
- Prior to this update, fence agents that connected using the SSH protocol
failed on login if an identity file was used as the method of authentication.
The bug has been fixed and these fence agents now successfully authenticate
using an identity file. (BZ#1075691)
In addition, this update adds the following enhancement:
- The support for the "--delay" option has been added to the fence_vmware_soap
fencing agent. This option allows the user to avoid fence races, and thus
prevents nodes from potentially fencing each other. (BZ#1072605)
Users of cman are advised to upgrade to these updated packages, which fix these
bugs and add this enhancement.
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 1075691 - Fence-agent (ssh) fails on login if identity file was used
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
cman-2.0.115-124.el5.src.rpm | SHA-256: 836120c3277e73090900ab187b55cab751a3eafcd7c959d3a55739b39212def4 |
x86_64 | |
cman-2.0.115-124.el5.x86_64.rpm | SHA-256: 034c9ca90acc3260a2cbafd9f13caff515c434d8bb239d75aba793ffaf0470c1 |
cman-debuginfo-2.0.115-124.el5.i386.rpm | SHA-256: ff4e4e86f3bc504e6d40ee7dde18ee436c48ea2fb3cef66f4d393b83a9c1add6 |
cman-debuginfo-2.0.115-124.el5.x86_64.rpm | SHA-256: d1316233c3df49279ec4d4d6c6713028e979c04ce373f1afc09d66123ef651dc |
cman-devel-2.0.115-124.el5.i386.rpm | SHA-256: b820336cade81756b2def7d120b7b1dbf6635dfbd79f515534825a28ee65030b |
cman-devel-2.0.115-124.el5.x86_64.rpm | SHA-256: 315d6668dc6d57199f54338e11e2650fd79a0a08295a6a97ba36e4d7c7ff8e4c |
ia64 | |
cman-2.0.115-124.el5.ia64.rpm | SHA-256: 06bf1509c850e4d54550f79a7e436a3dece4c00fab5259f71baa6e1d3f4961fb |
cman-debuginfo-2.0.115-124.el5.ia64.rpm | SHA-256: 951665c84e886ccc467d82300d475bb8a8a84ffbd7d984e3813c2a7ca01e83db |
cman-devel-2.0.115-124.el5.ia64.rpm | SHA-256: 8708b1c388559f9b35b0554bb49831b0a1d96db8d8e44522e6f369fd3e701afa |
i386 | |
cman-2.0.115-124.el5.i386.rpm | SHA-256: 7c299ca992304418ce3b7be7d76017ec611287a2070c07a2b6eb50b2e9829d22 |
cman-debuginfo-2.0.115-124.el5.i386.rpm | SHA-256: ff4e4e86f3bc504e6d40ee7dde18ee436c48ea2fb3cef66f4d393b83a9c1add6 |
cman-devel-2.0.115-124.el5.i386.rpm | SHA-256: b820336cade81756b2def7d120b7b1dbf6635dfbd79f515534825a28ee65030b |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
cman-2.0.115-124.el5.src.rpm | SHA-256: 836120c3277e73090900ab187b55cab751a3eafcd7c959d3a55739b39212def4 |
x86_64 | |
cman-2.0.115-124.el5.x86_64.rpm | SHA-256: 034c9ca90acc3260a2cbafd9f13caff515c434d8bb239d75aba793ffaf0470c1 |
cman-debuginfo-2.0.115-124.el5.i386.rpm | SHA-256: ff4e4e86f3bc504e6d40ee7dde18ee436c48ea2fb3cef66f4d393b83a9c1add6 |
cman-debuginfo-2.0.115-124.el5.x86_64.rpm | SHA-256: d1316233c3df49279ec4d4d6c6713028e979c04ce373f1afc09d66123ef651dc |
cman-devel-2.0.115-124.el5.i386.rpm | SHA-256: b820336cade81756b2def7d120b7b1dbf6635dfbd79f515534825a28ee65030b |
cman-devel-2.0.115-124.el5.x86_64.rpm | SHA-256: 315d6668dc6d57199f54338e11e2650fd79a0a08295a6a97ba36e4d7c7ff8e4c |
i386 | |
cman-2.0.115-124.el5.i386.rpm | SHA-256: 7c299ca992304418ce3b7be7d76017ec611287a2070c07a2b6eb50b2e9829d22 |
cman-debuginfo-2.0.115-124.el5.i386.rpm | SHA-256: ff4e4e86f3bc504e6d40ee7dde18ee436c48ea2fb3cef66f4d393b83a9c1add6 |
cman-devel-2.0.115-124.el5.i386.rpm | SHA-256: b820336cade81756b2def7d120b7b1dbf6635dfbd79f515534825a28ee65030b |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
cman-2.0.115-124.el5.src.rpm | SHA-256: 836120c3277e73090900ab187b55cab751a3eafcd7c959d3a55739b39212def4 |
ppc | |
cman-2.0.115-124.el5.ppc.rpm | SHA-256: 7c22efd5bf0263a8e219e460de7f0465490d952f93fa18169bb46bae284c6366 |
cman-debuginfo-2.0.115-124.el5.ppc.rpm | SHA-256: 0274b99e98fba99eb10bfc917eb1534b9bfc2af333c2df0eb65375224edb4f67 |
cman-debuginfo-2.0.115-124.el5.ppc64.rpm | SHA-256: 080490a01120a47ecd092f4428ea54e53f504c49dee0d8f4ab7201b0b74970f5 |
cman-devel-2.0.115-124.el5.ppc.rpm | SHA-256: fb8a8af61956308ce7180824efedc4fdf77b302e011670002a9963ca403d134d |
cman-devel-2.0.115-124.el5.ppc64.rpm | SHA-256: b6ce2497b41ed637e2d394c64563c0a9d5d14b7ab666d9d1b87fe1727a609ce0 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
cman-2.0.115-124.el5.src.rpm | SHA-256: 836120c3277e73090900ab187b55cab751a3eafcd7c959d3a55739b39212def4 |
x86_64 | |
cman-2.0.115-124.el5.x86_64.rpm | SHA-256: 034c9ca90acc3260a2cbafd9f13caff515c434d8bb239d75aba793ffaf0470c1 |
cman-debuginfo-2.0.115-124.el5.i386.rpm | SHA-256: ff4e4e86f3bc504e6d40ee7dde18ee436c48ea2fb3cef66f4d393b83a9c1add6 |
cman-debuginfo-2.0.115-124.el5.x86_64.rpm | SHA-256: d1316233c3df49279ec4d4d6c6713028e979c04ce373f1afc09d66123ef651dc |
cman-devel-2.0.115-124.el5.i386.rpm | SHA-256: b820336cade81756b2def7d120b7b1dbf6635dfbd79f515534825a28ee65030b |
cman-devel-2.0.115-124.el5.x86_64.rpm | SHA-256: 315d6668dc6d57199f54338e11e2650fd79a0a08295a6a97ba36e4d7c7ff8e4c |
i386 | |
cman-2.0.115-124.el5.i386.rpm | SHA-256: 7c299ca992304418ce3b7be7d76017ec611287a2070c07a2b6eb50b2e9829d22 |
cman-debuginfo-2.0.115-124.el5.i386.rpm | SHA-256: ff4e4e86f3bc504e6d40ee7dde18ee436c48ea2fb3cef66f4d393b83a9c1add6 |
cman-devel-2.0.115-124.el5.i386.rpm | SHA-256: b820336cade81756b2def7d120b7b1dbf6635dfbd79f515534825a28ee65030b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.