Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2015:1363 - Bug Fix Advisory
Issued:
2015-07-22
Updated:
2015-07-22

RHBA-2015:1363 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

cluster bug fix and enhancement update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated cluster packages that fix several bugs and add two enhancements are now
available for Red Hat Enterprise Linux 6.

Description

The Red Hat Cluster Manager is a collection of technologies working together to
provide data integrity and the ability to maintain application availability in
the event of a failure.

This update fixes the following bugs:

  • Previously, the gfs2_convert utility or a certain corruption could introduce

bogus values for the ondisk inode "di_goal_meta" field. Consequently, these
bogus values could affect GFS2 block allocation, cause an EBADSLT error on such
inodes, and could disallow the creation of new files in directories or new
blocks in regular files. With this update, gfs2_convert calculates the correct
values. The fsck.gfs2 utility now also has the capability to identify and fix
incorrect inode goal values, and the described problems no longer occur.
(BZ#1149516)

  • The gfs2_quota, gfs2_tool, gfs2_grow, and gfs2_jadd utilities did not mount

the gfs2 meta file system with the "context" mount option matching the "context"
option used for mounting the parent gfs2 file system. Consequently, the affected
gfs2 utilities failed with an error message "Device or resource busy" when run
with SELinux enabled. The mentioned gfs2 utilities have been updated to pass the
"context" mount option of the gfs2 file system to the meta file system, and they
no longer fail when SELinux is enabled. (BZ#1121693)

  • A race condition in the dlm_controld daemon could be triggered when reloading

the configuration, which caused a dangling file pointer to be written to.
Consequently, under certain rare conditions, dlm_controld could terminate
unexpectedly with a segmentation fault, leaving Distributed Lock Manager (DLM)
lockspaces unmanaged and requiring a system reboot to clear. This bug has been
fixed, and dlm_controld no longer crashes when the configuration is updated.
(BZ#1133724)

  • Previously, errors generated while updating the resource-agents scheme were

sometimes not reported. As a consequence, if an error occurred when updating the
resource-agents schema, the update failed silently and later attempts to start
the cman service could fail as well. With this update, schema errors are
reported, and remedial action can be taken at upgrade time in case of problems.
(BZ#1087286)

In addition, this update adds the following enhancements:

  • The qdiskd daemon now automatically enables the master_wins mode when votes

for the quorum disk default to 1 or when the number of votes is explicitly set
to 1. As a result, quorum disk configuration is more consistent with the
documentation, and a misconfiguration is avoided. (BZ#1099223)

  • A new error message has been added to the qdiskd daemon, which prevents qdiskd

from starting if it is configured with no heuristics in a cluster with three or
more nodes. Heuristics are required in clusters with three or more nodes using a
quorum device for correct operation in the event of a tie-break. Now, if no
heuristics are specified and the cluster contains three or more nodes, the cman
service fails to start and an error message is returned. This behavior prevents
misconfigurations. (BZ#1095418)

Users of cluster are advised to upgrade to these updated packages, which fix
these bugs and add these enhancements.

Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux High Availability for x86_64 6 x86_64
  • Red Hat Enterprise Linux High Availability for x86_64 6 i386
  • Red Hat Enterprise Linux Resilient Storage for x86_64 6 x86_64
  • Red Hat Enterprise Linux Resilient Storage for x86_64 6 i386
  • Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 6 x86_64
  • Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 6 i386
  • Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 6 x86_64
  • Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 6 i386

Fixes

  • BZ - 1087286 - The cman service could not start after updating the RHEL version from 6.0 to RHEL6.3
  • BZ - 1095657 - receive_start should make it clear when it fails
  • BZ - 1111500 - cman.5 incorrectly states that cluster.conf can contain up to 9 altnames for a node.
  • BZ - 1142947 - two_nodes=1 with one-node cluster

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux High Availability for x86_64 6

SRPM
cluster-3.0.12.1-73.el6.src.rpm SHA-256: 662b5e3265ae229d9aaf06c6ae1bea9bdacb3602205e98da1693b216d41519e1
x86_64
cluster-debuginfo-3.0.12.1-73.el6.i686.rpm SHA-256: f9d4eb3db5c23087d2d348251ae01e219efee3471fb189de74c63a5114280ac4
cluster-debuginfo-3.0.12.1-73.el6.x86_64.rpm SHA-256: e9a4c4f032cb44d9cc936e0de43563c78c9f80072d91d79dbcca75ce2360c5ce
clusterlib-3.0.12.1-73.el6.i686.rpm SHA-256: dca17e0b0fb72cb2a68346047a86a54c62031c29c3ce312f02ea192155000630
clusterlib-3.0.12.1-73.el6.x86_64.rpm SHA-256: 912c2e50566a4ea593887712dcd8b43ddab43187b412fba2377000adec6e0732
clusterlib-devel-3.0.12.1-73.el6.i686.rpm SHA-256: 5f55c82e8b056785eec9822059079bbaeadfe5915d553dd4ea58b0b2a52c4ebe
clusterlib-devel-3.0.12.1-73.el6.x86_64.rpm SHA-256: 0156594c433ced00a6f2ff9977fced393d20baf9d3b62c3feb31c053a8d582c4
cman-3.0.12.1-73.el6.x86_64.rpm SHA-256: 71fb4fd6c49e561696d9e3ab92f47e06898fa72289ef26f0144e5becb7de3eb8
i386
cluster-debuginfo-3.0.12.1-73.el6.i686.rpm SHA-256: f9d4eb3db5c23087d2d348251ae01e219efee3471fb189de74c63a5114280ac4
clusterlib-3.0.12.1-73.el6.i686.rpm SHA-256: dca17e0b0fb72cb2a68346047a86a54c62031c29c3ce312f02ea192155000630
clusterlib-devel-3.0.12.1-73.el6.i686.rpm SHA-256: 5f55c82e8b056785eec9822059079bbaeadfe5915d553dd4ea58b0b2a52c4ebe
cman-3.0.12.1-73.el6.i686.rpm SHA-256: 665a4f2e92c9069e4474114722f96fe489c050ecb8c1824a258e96bbdd881f98

Red Hat Enterprise Linux Resilient Storage for x86_64 6

SRPM
cluster-3.0.12.1-73.el6.src.rpm SHA-256: 662b5e3265ae229d9aaf06c6ae1bea9bdacb3602205e98da1693b216d41519e1
x86_64
cluster-debuginfo-3.0.12.1-73.el6.i686.rpm SHA-256: f9d4eb3db5c23087d2d348251ae01e219efee3471fb189de74c63a5114280ac4
cluster-debuginfo-3.0.12.1-73.el6.x86_64.rpm SHA-256: e9a4c4f032cb44d9cc936e0de43563c78c9f80072d91d79dbcca75ce2360c5ce
clusterlib-3.0.12.1-73.el6.i686.rpm SHA-256: dca17e0b0fb72cb2a68346047a86a54c62031c29c3ce312f02ea192155000630
clusterlib-3.0.12.1-73.el6.x86_64.rpm SHA-256: 912c2e50566a4ea593887712dcd8b43ddab43187b412fba2377000adec6e0732
clusterlib-devel-3.0.12.1-73.el6.i686.rpm SHA-256: 5f55c82e8b056785eec9822059079bbaeadfe5915d553dd4ea58b0b2a52c4ebe
clusterlib-devel-3.0.12.1-73.el6.x86_64.rpm SHA-256: 0156594c433ced00a6f2ff9977fced393d20baf9d3b62c3feb31c053a8d582c4
cman-3.0.12.1-73.el6.x86_64.rpm SHA-256: 71fb4fd6c49e561696d9e3ab92f47e06898fa72289ef26f0144e5becb7de3eb8
gfs2-utils-3.0.12.1-73.el6.x86_64.rpm SHA-256: cc6faca8f4a1e2142776c7475e73551143421f50837e6fe9413164c4a18f0c4b
i386
cluster-debuginfo-3.0.12.1-73.el6.i686.rpm SHA-256: f9d4eb3db5c23087d2d348251ae01e219efee3471fb189de74c63a5114280ac4
clusterlib-3.0.12.1-73.el6.i686.rpm SHA-256: dca17e0b0fb72cb2a68346047a86a54c62031c29c3ce312f02ea192155000630
clusterlib-devel-3.0.12.1-73.el6.i686.rpm SHA-256: 5f55c82e8b056785eec9822059079bbaeadfe5915d553dd4ea58b0b2a52c4ebe
cman-3.0.12.1-73.el6.i686.rpm SHA-256: 665a4f2e92c9069e4474114722f96fe489c050ecb8c1824a258e96bbdd881f98
gfs2-utils-3.0.12.1-73.el6.i686.rpm SHA-256: 98fc746f58bb0337b89cafddb5c9c8fec4d8b5d84d2d8cf88dbac646e8723b6a

Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 6

SRPM
cluster-3.0.12.1-73.el6.src.rpm SHA-256: 662b5e3265ae229d9aaf06c6ae1bea9bdacb3602205e98da1693b216d41519e1
x86_64
cluster-debuginfo-3.0.12.1-73.el6.i686.rpm SHA-256: f9d4eb3db5c23087d2d348251ae01e219efee3471fb189de74c63a5114280ac4
cluster-debuginfo-3.0.12.1-73.el6.x86_64.rpm SHA-256: e9a4c4f032cb44d9cc936e0de43563c78c9f80072d91d79dbcca75ce2360c5ce
clusterlib-3.0.12.1-73.el6.i686.rpm SHA-256: dca17e0b0fb72cb2a68346047a86a54c62031c29c3ce312f02ea192155000630
clusterlib-3.0.12.1-73.el6.x86_64.rpm SHA-256: 912c2e50566a4ea593887712dcd8b43ddab43187b412fba2377000adec6e0732
clusterlib-devel-3.0.12.1-73.el6.i686.rpm SHA-256: 5f55c82e8b056785eec9822059079bbaeadfe5915d553dd4ea58b0b2a52c4ebe
clusterlib-devel-3.0.12.1-73.el6.x86_64.rpm SHA-256: 0156594c433ced00a6f2ff9977fced393d20baf9d3b62c3feb31c053a8d582c4
cman-3.0.12.1-73.el6.x86_64.rpm SHA-256: 71fb4fd6c49e561696d9e3ab92f47e06898fa72289ef26f0144e5becb7de3eb8
i386
cluster-debuginfo-3.0.12.1-73.el6.i686.rpm SHA-256: f9d4eb3db5c23087d2d348251ae01e219efee3471fb189de74c63a5114280ac4
clusterlib-3.0.12.1-73.el6.i686.rpm SHA-256: dca17e0b0fb72cb2a68346047a86a54c62031c29c3ce312f02ea192155000630
clusterlib-devel-3.0.12.1-73.el6.i686.rpm SHA-256: 5f55c82e8b056785eec9822059079bbaeadfe5915d553dd4ea58b0b2a52c4ebe
cman-3.0.12.1-73.el6.i686.rpm SHA-256: 665a4f2e92c9069e4474114722f96fe489c050ecb8c1824a258e96bbdd881f98

Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 6

SRPM
cluster-3.0.12.1-73.el6.src.rpm SHA-256: 662b5e3265ae229d9aaf06c6ae1bea9bdacb3602205e98da1693b216d41519e1
x86_64
cluster-debuginfo-3.0.12.1-73.el6.i686.rpm SHA-256: f9d4eb3db5c23087d2d348251ae01e219efee3471fb189de74c63a5114280ac4
cluster-debuginfo-3.0.12.1-73.el6.x86_64.rpm SHA-256: e9a4c4f032cb44d9cc936e0de43563c78c9f80072d91d79dbcca75ce2360c5ce
clusterlib-3.0.12.1-73.el6.i686.rpm SHA-256: dca17e0b0fb72cb2a68346047a86a54c62031c29c3ce312f02ea192155000630
clusterlib-3.0.12.1-73.el6.x86_64.rpm SHA-256: 912c2e50566a4ea593887712dcd8b43ddab43187b412fba2377000adec6e0732
clusterlib-devel-3.0.12.1-73.el6.i686.rpm SHA-256: 5f55c82e8b056785eec9822059079bbaeadfe5915d553dd4ea58b0b2a52c4ebe
clusterlib-devel-3.0.12.1-73.el6.x86_64.rpm SHA-256: 0156594c433ced00a6f2ff9977fced393d20baf9d3b62c3feb31c053a8d582c4
cman-3.0.12.1-73.el6.x86_64.rpm SHA-256: 71fb4fd6c49e561696d9e3ab92f47e06898fa72289ef26f0144e5becb7de3eb8
gfs2-utils-3.0.12.1-73.el6.x86_64.rpm SHA-256: cc6faca8f4a1e2142776c7475e73551143421f50837e6fe9413164c4a18f0c4b
i386
cluster-debuginfo-3.0.12.1-73.el6.i686.rpm SHA-256: f9d4eb3db5c23087d2d348251ae01e219efee3471fb189de74c63a5114280ac4
clusterlib-3.0.12.1-73.el6.i686.rpm SHA-256: dca17e0b0fb72cb2a68346047a86a54c62031c29c3ce312f02ea192155000630
clusterlib-devel-3.0.12.1-73.el6.i686.rpm SHA-256: 5f55c82e8b056785eec9822059079bbaeadfe5915d553dd4ea58b0b2a52c4ebe
cman-3.0.12.1-73.el6.i686.rpm SHA-256: 665a4f2e92c9069e4474114722f96fe489c050ecb8c1824a258e96bbdd881f98
gfs2-utils-3.0.12.1-73.el6.i686.rpm SHA-256: 98fc746f58bb0337b89cafddb5c9c8fec4d8b5d84d2d8cf88dbac646e8723b6a

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our <a href='http://www.redhat.com/en/about/privacy-policy' class='privacy-policy'>Privacy Statement</a> effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter