- Issued:
- 2014-10-13
- Updated:
- 2014-10-13
RHBA-2014:1586 - Bug Fix Advisory
Synopsis
rgmanager bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated rgmanager packages that fix several bugs and add one enhancement are now
available for Red Hat Enterprise Linux 6.
Description
The rgmanager packages contain the Red Hat Resource Group Manager, which is used
to create and manage high-availability server applications in the event of
system downtime.
This update fixes the following bugs:
- When moving services around a cluster, it was not possible to refer to virtual
machines without the "vm:" prefix. With this update, the virtual machines can be
controlled both with and without the "vm:" prefix. (BZ#952729)
- When a custom resource agent was configured without the primary attribute, the
rgmanager utility terminated unexpectedly with a segmentation fault. The
underlying source code has been modified to address this bug, and an error is
logged instead of the crash of rgmanager in the described scenario. (BZ#1812079)
- Previously, the rg_test utility did not handle exit codes correctly; when
rg_test failed, the zero exit code was returned instead of a non-zero exit code.
This update applies a patch to fix this bug and if rg_test crashes, the zero
exit code is returned as expected. (BZ#1033162)
- When the "time_t" values were not configured correctly in the cluster.conf
file, the rgmanager could terminate unexpectedly. This update provides a patch
to fix this bug, and rgmanager now properly handles the incorrectly configured
values. (BZ#1036652)
- When more instances were configured for a resource address than were specified
with the "maxinstances" attribute, no message was logged. With this update, a
warning is returned in such a case. (BZ#1053739)
In addition, this update adds the following enhancement:
- When a resource start or status operation failed to execute due to resource
starvation on the node, the user had to reboot the node manually. With this
enhancement, a new reboot_on_pid_exhaustion flag has been added. The flag allows
to set up rgmanager to reboot the node automatically in the described scenario.
(BZ#982820)
Users of rgmanager are advised to upgrade to these updated packages, which fix
these bugs and add this enhancement.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Enterprise Linux High Availability for x86_64 6 x86_64
- Red Hat Enterprise Linux High Availability for x86_64 6 i386
- Red Hat Enterprise Linux Resilient Storage for x86_64 6 x86_64
- Red Hat Enterprise Linux Resilient Storage for x86_64 6 i386
- Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 6 x86_64
- Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 6 i386
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 6 x86_64
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 6 i386
Fixes
- BZ - 1033162 - rg_test has exit code issues
CVEs
(none)
References
(none)
Red Hat Enterprise Linux High Availability for x86_64 6
SRPM | |
---|---|
rgmanager-3.0.12.1-21.el6.src.rpm | SHA-256: 74582594ddbae425a6cc55f76e697058aa020cda29b302eabc389eaffc4ca326 |
x86_64 | |
rgmanager-3.0.12.1-21.el6.x86_64.rpm | SHA-256: 176c817c897cec024639af629cf7111f90aae2f9bf13fefe53897abb8c8f697b |
rgmanager-debuginfo-3.0.12.1-21.el6.x86_64.rpm | SHA-256: 6605830d624cd6e6e02bb9c770c870268ada6e5713eef7bb3f49b2e7349513bf |
i386 | |
rgmanager-3.0.12.1-21.el6.i686.rpm | SHA-256: c2eb920a577bd7b8a928964557361b0b3daabf7fd0cc1c8a08d46e577377a2d9 |
rgmanager-debuginfo-3.0.12.1-21.el6.i686.rpm | SHA-256: 7de380f3819bff988587ea2594ef0dbf19f0181c0cb561a428d7470ad0b565b3 |
Red Hat Enterprise Linux Resilient Storage for x86_64 6
SRPM | |
---|---|
rgmanager-3.0.12.1-21.el6.src.rpm | SHA-256: 74582594ddbae425a6cc55f76e697058aa020cda29b302eabc389eaffc4ca326 |
x86_64 | |
rgmanager-3.0.12.1-21.el6.x86_64.rpm | SHA-256: 176c817c897cec024639af629cf7111f90aae2f9bf13fefe53897abb8c8f697b |
rgmanager-debuginfo-3.0.12.1-21.el6.x86_64.rpm | SHA-256: 6605830d624cd6e6e02bb9c770c870268ada6e5713eef7bb3f49b2e7349513bf |
i386 | |
rgmanager-3.0.12.1-21.el6.i686.rpm | SHA-256: c2eb920a577bd7b8a928964557361b0b3daabf7fd0cc1c8a08d46e577377a2d9 |
rgmanager-debuginfo-3.0.12.1-21.el6.i686.rpm | SHA-256: 7de380f3819bff988587ea2594ef0dbf19f0181c0cb561a428d7470ad0b565b3 |
Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 6
SRPM | |
---|---|
rgmanager-3.0.12.1-21.el6.src.rpm | SHA-256: 74582594ddbae425a6cc55f76e697058aa020cda29b302eabc389eaffc4ca326 |
x86_64 | |
rgmanager-3.0.12.1-21.el6.x86_64.rpm | SHA-256: 176c817c897cec024639af629cf7111f90aae2f9bf13fefe53897abb8c8f697b |
rgmanager-debuginfo-3.0.12.1-21.el6.x86_64.rpm | SHA-256: 6605830d624cd6e6e02bb9c770c870268ada6e5713eef7bb3f49b2e7349513bf |
i386 | |
rgmanager-3.0.12.1-21.el6.i686.rpm | SHA-256: c2eb920a577bd7b8a928964557361b0b3daabf7fd0cc1c8a08d46e577377a2d9 |
rgmanager-debuginfo-3.0.12.1-21.el6.i686.rpm | SHA-256: 7de380f3819bff988587ea2594ef0dbf19f0181c0cb561a428d7470ad0b565b3 |
Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 6
SRPM | |
---|---|
rgmanager-3.0.12.1-21.el6.src.rpm | SHA-256: 74582594ddbae425a6cc55f76e697058aa020cda29b302eabc389eaffc4ca326 |
x86_64 | |
rgmanager-3.0.12.1-21.el6.x86_64.rpm | SHA-256: 176c817c897cec024639af629cf7111f90aae2f9bf13fefe53897abb8c8f697b |
rgmanager-debuginfo-3.0.12.1-21.el6.x86_64.rpm | SHA-256: 6605830d624cd6e6e02bb9c770c870268ada6e5713eef7bb3f49b2e7349513bf |
i386 | |
rgmanager-3.0.12.1-21.el6.i686.rpm | SHA-256: c2eb920a577bd7b8a928964557361b0b3daabf7fd0cc1c8a08d46e577377a2d9 |
rgmanager-debuginfo-3.0.12.1-21.el6.i686.rpm | SHA-256: 7de380f3819bff988587ea2594ef0dbf19f0181c0cb561a428d7470ad0b565b3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.