Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2016:1658 - Bug Fix Advisory
Issued:
2016-08-23
Updated:
2016-08-23

RHBA-2016:1658 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

cman bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated cman packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

Description

The Cluster Manager (cman) utility provides user-level services for managing a
Linux cluster.

This update fixes the following bug:

  • Due to security concerns, the Secure Sockets Layer version 3 (SSLv3)

has been deprecated on the Cisco Unified Computing System (UCS) hardware
with the UCS firmware. However, the prior version of the fence_cisco_ucs fence
agent did not allow the Transport Layer Security version 1 (TLSv1) protocol
version to be used instead. As a consequence, fence_cisco_ucs did not work with
Cisco UCS devices running the latest firmware, which could cause security
issues. The underlying code has been fixed so that fence_cisco_ucs now uses
TLSv1.3 instead of SSLv3. Now, fence_cisco_ucs works as expected with Cisco UCS
hardware running the latest firmware. (BZ#1321592)

  • Fence agents that connected using the SSH protocol previously failed to log in

if an identity file was used as the method of authentication. The bug has been
fixed, and the aforementioned fence agents now successfully authenticate through
an identity file. (BZ#1206604)

Users of cman are advised to upgrade to these updated packages, which fix this
bug.

Solution

Before applying this update, make sure all previously released errata relevant
to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux for Power, big endian 5 ppc

Fixes

(none)

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
cman-2.0.115-124.el5_11.4.src.rpm SHA-256: ab843c608e31717612603dffc446f902b9a008096dfd0ecdbdb8414be5fc74ea
x86_64
cman-2.0.115-124.el5_11.4.x86_64.rpm SHA-256: 1bf7cc78d8e79792d6d7fe7d04b1e898cda72b68171678e7fe7254ea43fae7db
cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae
cman-debuginfo-2.0.115-124.el5_11.4.x86_64.rpm SHA-256: eb60e793cf5750ebf204fe4f4841f1081319662d9cf1267b32a8ec92c8bd8811
cman-devel-2.0.115-124.el5_11.4.i386.rpm SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9
cman-devel-2.0.115-124.el5_11.4.x86_64.rpm SHA-256: 3e5e7c3d276293462924c7159664aaba6f6e98a63f0b48d526ca0823917e2f90
ia64
cman-2.0.115-124.el5_11.4.ia64.rpm SHA-256: 432b80f6b44906b4a0741a23187b3bc924a14bf5002d2d2f7257bca5d85a3ffc
cman-debuginfo-2.0.115-124.el5_11.4.ia64.rpm SHA-256: 4fece127b75939db425a2b587a69141a2b155660a48188956f36372a72f9df8f
cman-devel-2.0.115-124.el5_11.4.ia64.rpm SHA-256: 241ee0a0e1a08e0660e7e283a34a7346f3c247f724c4e481e9afd99213a337c0
i386
cman-2.0.115-124.el5_11.4.i386.rpm SHA-256: 05cd28f8443ef67c1d422c45a3821c8db2b7957fdb9af70dc488b69aede81355
cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae
cman-devel-2.0.115-124.el5_11.4.i386.rpm SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9

Red Hat Enterprise Linux Workstation 5

SRPM
cman-2.0.115-124.el5_11.4.src.rpm SHA-256: ab843c608e31717612603dffc446f902b9a008096dfd0ecdbdb8414be5fc74ea
x86_64
cman-2.0.115-124.el5_11.4.x86_64.rpm SHA-256: 1bf7cc78d8e79792d6d7fe7d04b1e898cda72b68171678e7fe7254ea43fae7db
cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae
cman-debuginfo-2.0.115-124.el5_11.4.x86_64.rpm SHA-256: eb60e793cf5750ebf204fe4f4841f1081319662d9cf1267b32a8ec92c8bd8811
cman-devel-2.0.115-124.el5_11.4.i386.rpm SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9
cman-devel-2.0.115-124.el5_11.4.x86_64.rpm SHA-256: 3e5e7c3d276293462924c7159664aaba6f6e98a63f0b48d526ca0823917e2f90
i386
cman-2.0.115-124.el5_11.4.i386.rpm SHA-256: 05cd28f8443ef67c1d422c45a3821c8db2b7957fdb9af70dc488b69aede81355
cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae
cman-devel-2.0.115-124.el5_11.4.i386.rpm SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9

Red Hat Enterprise Linux for Power, big endian 5

SRPM
cman-2.0.115-124.el5_11.4.src.rpm SHA-256: ab843c608e31717612603dffc446f902b9a008096dfd0ecdbdb8414be5fc74ea
ppc
cman-2.0.115-124.el5_11.4.ppc.rpm SHA-256: 20df42c3fb5d9b815bef9f8b7fc43236b2fe39c7def1d2665c5594b8b7f9c513
cman-debuginfo-2.0.115-124.el5_11.4.ppc.rpm SHA-256: 9d2a0baf2c4253b1a007d2be7ab374fa02c88d274520b64154d2855ff06d7cc5
cman-debuginfo-2.0.115-124.el5_11.4.ppc64.rpm SHA-256: e497cb246dc08184858a5a183731c84df96fa76e2c9c8b3235129987f4b67dcd
cman-devel-2.0.115-124.el5_11.4.ppc.rpm SHA-256: 61961739df2cdc9ef4e91cadb55e439f4261580b1074f6d0746c280729395936
cman-devel-2.0.115-124.el5_11.4.ppc64.rpm SHA-256: 7bdaf482f4c1189bc7fba60f37cd9ee5993c1484e8782159d81bde0aa4ae36a3

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our <a href='http://www.redhat.com/en/about/privacy-policy' class='privacy-policy'>Privacy Statement</a> effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter