Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHSA-2013:1635 - Security Advisory
Issued:
2013-11-21
Updated:
2013-11-21

RHSA-2013:1635 - Security Advisory

  • Overview
  • Updated Packages

Synopsis

Low: pacemaker security, bug fix, and enhancement update

Type/Severity

Security Advisory: Low

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated pacemaker packages that fix one security issue, several bugs, and
add various enhancements are now available for Red Hat Enterprise Linux 6.

The Red Hat Security Response Team has rated this update as having low
security impact. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available from the CVE link in
the References section.

Description

Pacemaker is a high-availability cluster resource manager with a powerful
policy engine.

A denial of service flaw was found in the way Pacemaker performed
authentication and processing of remote connections in certain
circumstances. When Pacemaker was configured to allow remote Cluster
Information Base (CIB) configuration or resource management, a remote
attacker could use this flaw to cause Pacemaker to block indefinitely
(preventing it from serving other requests). (CVE-2013-0281)

Note: The default Pacemaker configuration in Red Hat Enterprise Linux 6 has
the remote CIB management functionality disabled.

The pacemaker package has been upgraded to upstream version 1.1.10, which
provides a number of bug fixes and enhancements over the previous version:

  • Pacemaker no longer assumes unknown cman nodes are safely stopped.
  • The core dump file now converts all exit codes into positive 'errno'

values.

  • Pacemaker ensures a return to a stable state after too many fencing

failures, and initiates a shutdown if a node claimed to be fenced is still
active.

  • The crm_error tool adds the ability to list and print error symbols.
  • The crm_resource command allows individual resources to be reprobed, and

implements the "--ban" option for moving resources away from nodes.
The "--clear" option has replaced the "--unmove" option. Also, crm_resource
now supports OCF tracing when using the "--force" option.

  • The IPC mechanism restores the ability for members of the haclient group

to connect to the cluster.

  • The Policy Engine daemon allows active nodes in the current membership to

be fenced without quorum.

  • Policy Engine now suppresses meaningless IDs when displaying anonymous

clone status, supports maintenance mode for a single node, and correctly
handles the recovered resources before they are operated on.

  • XML configuration files are now checked for non-printing characters and

replaced with their octal equivalent when exporting XML text. Also, a more
reliable buffer allocation strategy has been implemented to prevent
lockups.

(BZ#987355)

Additional bug fixes:

  • The "crm_resource --move" command was designed for atomic resources and

could not handle resources on clones, masters, or slaves present on
multiple nodes. Consequently, crm_resource could not obtain enough
information to move a resource and did not perform any action. The "--ban"
and "--clear" options have been added to allow the administrator to
instruct the cluster unambiguously. Clone, master, and slave resources can
now be navigated within the cluster as expected. (BZ#902407)

  • The hacluster user account did not have a user identification (UID) or

group identification (GID) number reserved on the system. Thus, UID and GID
values were picked randomly during the installation process. The UID and
GID number 189 was reserved for hacluster and is now used consistently for
all installations. (BZ#908450)

  • Certain clusters used node host names that did not match the output of

the "uname -n" command. Thus, the default node name used by the crm_standby
and crm_failcount commands was incorrect and caused the cluster to ignore
the update by the administrator. The crm_node command is now used instead
of the uname utility in helper scripts. As a result, the cluster behaves as
expected. (BZ#913093)

  • Due to incorrect return code handling, internal recovery logic of the

crm_mon utility was not executed when a configuration updated failed to
apply, leading to an assertion failure. Return codes are now checked
correctly, and the recovery of an expected error state is now handled
transparently. (BZ#951371)

  • cman's automatic unfencing feature failed when combined with Pacemaker.

Support for automated unfencing in Pacemaker has been added, and the
unwanted behavior no longer occurs. (BZ#996850)

All pacemaker users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues and add these
enhancements.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 6 x86_64
  • Red Hat Enterprise Linux Server 6 i386
  • Red Hat Enterprise Linux High Availability for x86_64 6 x86_64
  • Red Hat Enterprise Linux High Availability for x86_64 6 i386
  • Red Hat Enterprise Linux Resilient Storage for x86_64 6 x86_64
  • Red Hat Enterprise Linux Resilient Storage for x86_64 6 i386
  • Red Hat Enterprise Linux Server from RHUI 6 x86_64
  • Red Hat Enterprise Linux Server from RHUI 6 i386
  • Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 6 x86_64
  • Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 6 i386
  • Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 6 x86_64
  • Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 6 i386
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
  • Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386

Fixes

  • BZ - 891922 - CVE-2013-0281 pacemaker: remote DoS when CIB management is enabled caused by use of blocking sockets
  • BZ - 902407 - Different results when moving Master/Slave resources
  • BZ - 902459 - Persistent resource-related data after the resource is deleted
  • BZ - 996850 - Unfence at cluster startup with fence_scsi
  • BZ - 997346 - pacemaker enables itself on boot during installation
  • BZ - 1011618 - Slave roles inconsistent in pcs status xml (or crm_mon)

CVEs

  • CVE-2013-0281

References

  • https://access.redhat.com/security/updates/classification/#low
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 6

SRPM
pacemaker-1.1.10-14.el6.src.rpm SHA-256: be1e616f983c81bcb8071e77e58cba8744720af7111430589083832b8c63d6fe
x86_64
pacemaker-debuginfo-1.1.10-14.el6.x86_64.rpm SHA-256: 5530b306ea447607568633c559be178de77a52f9c9a583b67bdf9d63fb8f9843
pacemaker-remote-1.1.10-14.el6.x86_64.rpm SHA-256: 5b889b7f1f6299f9fb9952beba11a19267789ef2136f3c227f6eca3f49be75a8
i386
pacemaker-debuginfo-1.1.10-14.el6.i686.rpm SHA-256: be1f891d1359c4dfaf24b3a97c6aca721ff1c341bcbad9a79267194fd87f435f
pacemaker-remote-1.1.10-14.el6.i686.rpm SHA-256: 25d0eae97261cab13557fdcc803cbd26358e4c30c428aa611924785c9b18a94e

Red Hat Enterprise Linux Resilient Storage for x86_64 6

SRPM
pacemaker-1.1.10-14.el6.src.rpm SHA-256: be1e616f983c81bcb8071e77e58cba8744720af7111430589083832b8c63d6fe
x86_64
pacemaker-1.1.10-14.el6.x86_64.rpm SHA-256: f934c8d1a39bf4fef949eeba5a1bf248e2b45fd1540d16490cd23cd38bdd820a
pacemaker-cli-1.1.10-14.el6.x86_64.rpm SHA-256: 62d90f11e492b313cd892342c92a08040511d1365c8397ea259fca257001619d
pacemaker-cluster-libs-1.1.10-14.el6.i686.rpm SHA-256: 959a813472f159c02d81229dbc21a0f48cb445e9892a5f2b30fd8461c759813b
pacemaker-cluster-libs-1.1.10-14.el6.x86_64.rpm SHA-256: c2c07352dd12e51e432c3ec767b6cb1d252d0071f0d87fc6ed7d940761f3f0a0
pacemaker-cts-1.1.10-14.el6.x86_64.rpm SHA-256: ee165afab9069383ee0d27b824a4ceba280783882acb225aae0807cc280178c3
pacemaker-debuginfo-1.1.10-14.el6.i686.rpm SHA-256: be1f891d1359c4dfaf24b3a97c6aca721ff1c341bcbad9a79267194fd87f435f
pacemaker-debuginfo-1.1.10-14.el6.x86_64.rpm SHA-256: 5530b306ea447607568633c559be178de77a52f9c9a583b67bdf9d63fb8f9843
pacemaker-doc-1.1.10-14.el6.x86_64.rpm SHA-256: 9637263f0ea3c231b766be2c67de67f04c9a9d9a6208cd36c895ec3c99e133b5
pacemaker-libs-1.1.10-14.el6.i686.rpm SHA-256: f069a2e3cc915ec2327acd679a4dbb4d4225385ed58f704390051bd1eff6805b
pacemaker-libs-1.1.10-14.el6.x86_64.rpm SHA-256: 20bf6bc6f74b95f181a11f2fce16023f3837c295f45334f68221f9610f7c6cdc
pacemaker-libs-devel-1.1.10-14.el6.i686.rpm SHA-256: cf21e41322e102741731e68bac5a07332479b259a399062b6cc6afd81fdbff0e
pacemaker-libs-devel-1.1.10-14.el6.x86_64.rpm SHA-256: 6f71a668c5c41d9993c0730ce912232bb25e209e1521465cfe7558f9f81b2386
i386
pacemaker-1.1.10-14.el6.i686.rpm SHA-256: 68c862e0d5c3d0819d2bd4d908ad1fa7420eede6b1fa972df0ec6c8d2eb31a4b
pacemaker-cli-1.1.10-14.el6.i686.rpm SHA-256: 786c3ef557b41d4a0ef2734a2278ec80e8f0446d4828b636c87fc84a503d0be6
pacemaker-cluster-libs-1.1.10-14.el6.i686.rpm SHA-256: 959a813472f159c02d81229dbc21a0f48cb445e9892a5f2b30fd8461c759813b
pacemaker-cts-1.1.10-14.el6.i686.rpm SHA-256: bf998cb71883162864c8c1bf52f244100b0659b5bad7c6594c5960a49dfaf71b
pacemaker-debuginfo-1.1.10-14.el6.i686.rpm SHA-256: be1f891d1359c4dfaf24b3a97c6aca721ff1c341bcbad9a79267194fd87f435f
pacemaker-doc-1.1.10-14.el6.i686.rpm SHA-256: d0690aafae9e5700ed95f1620a677c26bab78c41e135c3fe0f42c25ec6171f40
pacemaker-libs-1.1.10-14.el6.i686.rpm SHA-256: f069a2e3cc915ec2327acd679a4dbb4d4225385ed58f704390051bd1eff6805b
pacemaker-libs-devel-1.1.10-14.el6.i686.rpm SHA-256: cf21e41322e102741731e68bac5a07332479b259a399062b6cc6afd81fdbff0e

Red Hat Enterprise Linux Server from RHUI 6

SRPM
pacemaker-1.1.10-14.el6.src.rpm SHA-256: be1e616f983c81bcb8071e77e58cba8744720af7111430589083832b8c63d6fe
x86_64
pacemaker-debuginfo-1.1.10-14.el6.x86_64.rpm SHA-256: 5530b306ea447607568633c559be178de77a52f9c9a583b67bdf9d63fb8f9843
pacemaker-remote-1.1.10-14.el6.x86_64.rpm SHA-256: 5b889b7f1f6299f9fb9952beba11a19267789ef2136f3c227f6eca3f49be75a8
i386
pacemaker-debuginfo-1.1.10-14.el6.i686.rpm SHA-256: be1f891d1359c4dfaf24b3a97c6aca721ff1c341bcbad9a79267194fd87f435f
pacemaker-remote-1.1.10-14.el6.i686.rpm SHA-256: 25d0eae97261cab13557fdcc803cbd26358e4c30c428aa611924785c9b18a94e

Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 6

SRPM
pacemaker-1.1.10-14.el6.src.rpm SHA-256: be1e616f983c81bcb8071e77e58cba8744720af7111430589083832b8c63d6fe
x86_64
pacemaker-1.1.10-14.el6.x86_64.rpm SHA-256: f934c8d1a39bf4fef949eeba5a1bf248e2b45fd1540d16490cd23cd38bdd820a
pacemaker-cli-1.1.10-14.el6.x86_64.rpm SHA-256: 62d90f11e492b313cd892342c92a08040511d1365c8397ea259fca257001619d
pacemaker-cluster-libs-1.1.10-14.el6.i686.rpm SHA-256: 959a813472f159c02d81229dbc21a0f48cb445e9892a5f2b30fd8461c759813b
pacemaker-cluster-libs-1.1.10-14.el6.x86_64.rpm SHA-256: c2c07352dd12e51e432c3ec767b6cb1d252d0071f0d87fc6ed7d940761f3f0a0
pacemaker-cts-1.1.10-14.el6.x86_64.rpm SHA-256: ee165afab9069383ee0d27b824a4ceba280783882acb225aae0807cc280178c3
pacemaker-debuginfo-1.1.10-14.el6.i686.rpm SHA-256: be1f891d1359c4dfaf24b3a97c6aca721ff1c341bcbad9a79267194fd87f435f
pacemaker-debuginfo-1.1.10-14.el6.x86_64.rpm SHA-256: 5530b306ea447607568633c559be178de77a52f9c9a583b67bdf9d63fb8f9843
pacemaker-doc-1.1.10-14.el6.x86_64.rpm SHA-256: 9637263f0ea3c231b766be2c67de67f04c9a9d9a6208cd36c895ec3c99e133b5
pacemaker-libs-1.1.10-14.el6.i686.rpm SHA-256: f069a2e3cc915ec2327acd679a4dbb4d4225385ed58f704390051bd1eff6805b
pacemaker-libs-1.1.10-14.el6.x86_64.rpm SHA-256: 20bf6bc6f74b95f181a11f2fce16023f3837c295f45334f68221f9610f7c6cdc
pacemaker-libs-devel-1.1.10-14.el6.i686.rpm SHA-256: cf21e41322e102741731e68bac5a07332479b259a399062b6cc6afd81fdbff0e
pacemaker-libs-devel-1.1.10-14.el6.x86_64.rpm SHA-256: 6f71a668c5c41d9993c0730ce912232bb25e209e1521465cfe7558f9f81b2386
i386
pacemaker-1.1.10-14.el6.i686.rpm SHA-256: 68c862e0d5c3d0819d2bd4d908ad1fa7420eede6b1fa972df0ec6c8d2eb31a4b
pacemaker-cli-1.1.10-14.el6.i686.rpm SHA-256: 786c3ef557b41d4a0ef2734a2278ec80e8f0446d4828b636c87fc84a503d0be6
pacemaker-cluster-libs-1.1.10-14.el6.i686.rpm SHA-256: 959a813472f159c02d81229dbc21a0f48cb445e9892a5f2b30fd8461c759813b
pacemaker-cts-1.1.10-14.el6.i686.rpm SHA-256: bf998cb71883162864c8c1bf52f244100b0659b5bad7c6594c5960a49dfaf71b
pacemaker-debuginfo-1.1.10-14.el6.i686.rpm SHA-256: be1f891d1359c4dfaf24b3a97c6aca721ff1c341bcbad9a79267194fd87f435f
pacemaker-doc-1.1.10-14.el6.i686.rpm SHA-256: d0690aafae9e5700ed95f1620a677c26bab78c41e135c3fe0f42c25ec6171f40
pacemaker-libs-1.1.10-14.el6.i686.rpm SHA-256: f069a2e3cc915ec2327acd679a4dbb4d4225385ed58f704390051bd1eff6805b
pacemaker-libs-devel-1.1.10-14.el6.i686.rpm SHA-256: cf21e41322e102741731e68bac5a07332479b259a399062b6cc6afd81fdbff0e

Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 6

SRPM
pacemaker-1.1.10-14.el6.src.rpm SHA-256: be1e616f983c81bcb8071e77e58cba8744720af7111430589083832b8c63d6fe
x86_64
pacemaker-1.1.10-14.el6.x86_64.rpm SHA-256: f934c8d1a39bf4fef949eeba5a1bf248e2b45fd1540d16490cd23cd38bdd820a
pacemaker-cli-1.1.10-14.el6.x86_64.rpm SHA-256: 62d90f11e492b313cd892342c92a08040511d1365c8397ea259fca257001619d
pacemaker-cluster-libs-1.1.10-14.el6.i686.rpm SHA-256: 959a813472f159c02d81229dbc21a0f48cb445e9892a5f2b30fd8461c759813b
pacemaker-cluster-libs-1.1.10-14.el6.x86_64.rpm SHA-256: c2c07352dd12e51e432c3ec767b6cb1d252d0071f0d87fc6ed7d940761f3f0a0
pacemaker-cts-1.1.10-14.el6.x86_64.rpm SHA-256: ee165afab9069383ee0d27b824a4ceba280783882acb225aae0807cc280178c3
pacemaker-debuginfo-1.1.10-14.el6.i686.rpm SHA-256: be1f891d1359c4dfaf24b3a97c6aca721ff1c341bcbad9a79267194fd87f435f
pacemaker-debuginfo-1.1.10-14.el6.x86_64.rpm SHA-256: 5530b306ea447607568633c559be178de77a52f9c9a583b67bdf9d63fb8f9843
pacemaker-doc-1.1.10-14.el6.x86_64.rpm SHA-256: 9637263f0ea3c231b766be2c67de67f04c9a9d9a6208cd36c895ec3c99e133b5
pacemaker-libs-1.1.10-14.el6.i686.rpm SHA-256: f069a2e3cc915ec2327acd679a4dbb4d4225385ed58f704390051bd1eff6805b
pacemaker-libs-1.1.10-14.el6.x86_64.rpm SHA-256: 20bf6bc6f74b95f181a11f2fce16023f3837c295f45334f68221f9610f7c6cdc
pacemaker-libs-devel-1.1.10-14.el6.i686.rpm SHA-256: cf21e41322e102741731e68bac5a07332479b259a399062b6cc6afd81fdbff0e
pacemaker-libs-devel-1.1.10-14.el6.x86_64.rpm SHA-256: 6f71a668c5c41d9993c0730ce912232bb25e209e1521465cfe7558f9f81b2386
i386
pacemaker-1.1.10-14.el6.i686.rpm SHA-256: 68c862e0d5c3d0819d2bd4d908ad1fa7420eede6b1fa972df0ec6c8d2eb31a4b
pacemaker-cli-1.1.10-14.el6.i686.rpm SHA-256: 786c3ef557b41d4a0ef2734a2278ec80e8f0446d4828b636c87fc84a503d0be6
pacemaker-cluster-libs-1.1.10-14.el6.i686.rpm SHA-256: 959a813472f159c02d81229dbc21a0f48cb445e9892a5f2b30fd8461c759813b
pacemaker-cts-1.1.10-14.el6.i686.rpm SHA-256: bf998cb71883162864c8c1bf52f244100b0659b5bad7c6594c5960a49dfaf71b
pacemaker-debuginfo-1.1.10-14.el6.i686.rpm SHA-256: be1f891d1359c4dfaf24b3a97c6aca721ff1c341bcbad9a79267194fd87f435f
pacemaker-doc-1.1.10-14.el6.i686.rpm SHA-256: d0690aafae9e5700ed95f1620a677c26bab78c41e135c3fe0f42c25ec6171f40
pacemaker-libs-1.1.10-14.el6.i686.rpm SHA-256: f069a2e3cc915ec2327acd679a4dbb4d4225385ed58f704390051bd1eff6805b
pacemaker-libs-devel-1.1.10-14.el6.i686.rpm SHA-256: cf21e41322e102741731e68bac5a07332479b259a399062b6cc6afd81fdbff0e

Red Hat Enterprise Linux Server - Extended Life Cycle Support 6

SRPM
pacemaker-1.1.10-14.el6.src.rpm SHA-256: be1e616f983c81bcb8071e77e58cba8744720af7111430589083832b8c63d6fe
x86_64
pacemaker-debuginfo-1.1.10-14.el6.x86_64.rpm SHA-256: 5530b306ea447607568633c559be178de77a52f9c9a583b67bdf9d63fb8f9843
pacemaker-remote-1.1.10-14.el6.x86_64.rpm SHA-256: 5b889b7f1f6299f9fb9952beba11a19267789ef2136f3c227f6eca3f49be75a8
i386
pacemaker-debuginfo-1.1.10-14.el6.i686.rpm SHA-256: be1f891d1359c4dfaf24b3a97c6aca721ff1c341bcbad9a79267194fd87f435f
pacemaker-remote-1.1.10-14.el6.i686.rpm SHA-256: 25d0eae97261cab13557fdcc803cbd26358e4c30c428aa611924785c9b18a94e

Red Hat Enterprise Linux High Availability for x86_64 6

SRPM
pacemaker-1.1.10-14.el6.src.rpm SHA-256: be1e616f983c81bcb8071e77e58cba8744720af7111430589083832b8c63d6fe
x86_64
pacemaker-1.1.10-14.el6.x86_64.rpm SHA-256: f934c8d1a39bf4fef949eeba5a1bf248e2b45fd1540d16490cd23cd38bdd820a
pacemaker-cli-1.1.10-14.el6.x86_64.rpm SHA-256: 62d90f11e492b313cd892342c92a08040511d1365c8397ea259fca257001619d
pacemaker-cluster-libs-1.1.10-14.el6.i686.rpm SHA-256: 959a813472f159c02d81229dbc21a0f48cb445e9892a5f2b30fd8461c759813b
pacemaker-cluster-libs-1.1.10-14.el6.x86_64.rpm SHA-256: c2c07352dd12e51e432c3ec767b6cb1d252d0071f0d87fc6ed7d940761f3f0a0
pacemaker-cts-1.1.10-14.el6.x86_64.rpm SHA-256: ee165afab9069383ee0d27b824a4ceba280783882acb225aae0807cc280178c3
pacemaker-debuginfo-1.1.10-14.el6.i686.rpm SHA-256: be1f891d1359c4dfaf24b3a97c6aca721ff1c341bcbad9a79267194fd87f435f
pacemaker-debuginfo-1.1.10-14.el6.x86_64.rpm SHA-256: 5530b306ea447607568633c559be178de77a52f9c9a583b67bdf9d63fb8f9843
pacemaker-doc-1.1.10-14.el6.x86_64.rpm SHA-256: 9637263f0ea3c231b766be2c67de67f04c9a9d9a6208cd36c895ec3c99e133b5
pacemaker-libs-1.1.10-14.el6.i686.rpm SHA-256: f069a2e3cc915ec2327acd679a4dbb4d4225385ed58f704390051bd1eff6805b
pacemaker-libs-1.1.10-14.el6.x86_64.rpm SHA-256: 20bf6bc6f74b95f181a11f2fce16023f3837c295f45334f68221f9610f7c6cdc
pacemaker-libs-devel-1.1.10-14.el6.i686.rpm SHA-256: cf21e41322e102741731e68bac5a07332479b259a399062b6cc6afd81fdbff0e
pacemaker-libs-devel-1.1.10-14.el6.x86_64.rpm SHA-256: 6f71a668c5c41d9993c0730ce912232bb25e209e1521465cfe7558f9f81b2386
i386
pacemaker-1.1.10-14.el6.i686.rpm SHA-256: 68c862e0d5c3d0819d2bd4d908ad1fa7420eede6b1fa972df0ec6c8d2eb31a4b
pacemaker-cli-1.1.10-14.el6.i686.rpm SHA-256: 786c3ef557b41d4a0ef2734a2278ec80e8f0446d4828b636c87fc84a503d0be6
pacemaker-cluster-libs-1.1.10-14.el6.i686.rpm SHA-256: 959a813472f159c02d81229dbc21a0f48cb445e9892a5f2b30fd8461c759813b
pacemaker-cts-1.1.10-14.el6.i686.rpm SHA-256: bf998cb71883162864c8c1bf52f244100b0659b5bad7c6594c5960a49dfaf71b
pacemaker-debuginfo-1.1.10-14.el6.i686.rpm SHA-256: be1f891d1359c4dfaf24b3a97c6aca721ff1c341bcbad9a79267194fd87f435f
pacemaker-doc-1.1.10-14.el6.i686.rpm SHA-256: d0690aafae9e5700ed95f1620a677c26bab78c41e135c3fe0f42c25ec6171f40
pacemaker-libs-1.1.10-14.el6.i686.rpm SHA-256: f069a2e3cc915ec2327acd679a4dbb4d4225385ed58f704390051bd1eff6805b
pacemaker-libs-devel-1.1.10-14.el6.i686.rpm SHA-256: cf21e41322e102741731e68bac5a07332479b259a399062b6cc6afd81fdbff0e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our <a href='http://www.redhat.com/en/about/privacy-policy' class='privacy-policy'>Privacy Statement</a> effective September 15, 2023.
Red Hat Summit Red Hat Summit
Twitter