- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2012:0180 - openais bug fix and enhancement update
Synopsis
openais bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Topic
An updated openais package that fixes various bugs and adds one enhancement is now available for Red Hat Enterprise Linux 5.
Description
The Application Interface Specification (AIS) is an API and a set of policies for developing applications that maintain services during faults. The OpenAIS Standards Based Cluster Framework is an OSI-certified implementation of the Service Availability Forum AIS. The openais package contains the openais executable, OpenAIS service handlers, default configuration files and an init script.
This update fixes the following bugs:
-
Previously, the length of the array cpg_exec_service[]/cpg_exec_engine[] in OpenAIS and corosync differed. Consequently, OpenAIS failed if corosync ran on the same network. This update modifies the length of this array in OpenAIS. Now, OpenAIS and corosync successfully run on the same network. (BZ#708335)
-
Previously, the receive buffers could overflow under heavy traffic. Consequently, packets could be lost and retransmit list error messages appeared in the log files. Now, incoming messages are processed more frequently, and the retransmit list error messages no longer appear. (BZ#718773)
-
Previously, the OpenAIS service could, under certain circumstances, encounter a deadlock when starting or stopping the process. This update modifies the underlying source code to prevent such a deadlock. Deadlock situations no longer happen during a rapid start or stop process. (BZ#726142)
-
Previously, OpenAIS could, under certain circumstances, terminate unexpectedly when OpenAIS was used in a network losing packets and a large number of configuration changes occurred. This update modifies the underlying source code, and OpenAIS no longer terminates under these circumstances. (BZ#729081)
-
Previously, OpenAIS could, under certain circumstances, use an incorrect sort message queue when the "memb_join" message was sent during recovery. Consequently, OpenAIS could join all nodes. Now, OpenAIS uses the correct sort message queue if memb_join message is sent during recovery. (BZ#734865)
-
Previously, openais_response_send could, under certain circumstances, change the value of req->ics_channel_handle. Consequently, OpenAIS terminated unexpectedly when using the subscribe function of the eventing (EVT) service. This update saves the handle outside the message. OpenAIS no longer terminates if an application is using the subscribe function of the EVT service. (BZ#737100)
-
Previously, cman could, under certain circumstances, terminate unexpectedly on all cluster nodes and nodes were not fenced if the system clock was changed on a cluster node. Consequently, the cluster was not shut down gracefully and had to be rebooted manually. Now, the underlying code has been modified to handle significant time changes. The cman service no longer terminates and the cluster no longer fails. (BZ#738468)
-
Previously, the groupd daemon often exited with the "groupd: cpg_leave error retrying" error message, causing OpenAIS to become unresponsive when stopping the cman service on a cluster node shutdown. Consequently, the cluster node was not shut down correctly. Now, the underlying code has been modified to stop cman correctly. Cluster nodes can be shut down as expected. (BZ#746807)
-
Previously, totemip_parse used the getaddrinfo function without an associated freeaddrinfo call. Consequently, a small amount of memory leaked when calling OpenAIS. This update adds a call to freeaddrinfo. OpenAIS no longer leaks memory in totemip module. (BZ#752952)
This update also adds the following enhancement:
- With this update, manual pages for ais-keygen, aisexec, openais-cfgtool and openais-confdb-display have been added to OpenAIS. (BZ#703162)
All users of openais are advised to upgrade to this updated package, which fixes these bugs and adds this enhancement.
Solution
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at This content is not included.https://access.redhat.com/kb/docs/DOC-11259
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for Power, big endian | 5 | ppc |
| Red Hat Enterprise Linux Workstation | 5 | x86_64 |
| Red Hat Enterprise Linux Workstation | 5 | i386 |
| Red Hat Enterprise Linux Server | 5 | x86_64 |
| Red Hat Enterprise Linux Server | 5 | ia64 |
| Red Hat Enterprise Linux Server | 5 | i386 |
| Red Hat Enterprise Linux Server from RHUI | 5 | x86_64 |
| Red Hat Enterprise Linux Server from RHUI | 5 | i386 |
Updated Packages
- openais-0.80.6-36.el5.ppc.rpm
- openais-0.80.6-36.el5.x86_64.rpm
- openais-devel-0.80.6-36.el5.x86_64.rpm
- openais-devel-0.80.6-36.el5.i386.rpm
- openais-0.80.6-36.el5.src.rpm
- openais-devel-0.80.6-36.el5.ppc.rpm
- openais-0.80.6-36.el5.i386.rpm
- openais-devel-0.80.6-36.el5.ppc64.rpm
- openais-0.80.6-36.el5.ia64.rpm
- openais-devel-0.80.6-36.el5.ia64.rpm
Fixes
- This content is not included.BZ - 703162
- This content is not included.BZ - 708335
- This content is not included.BZ - 726142
- This content is not included.BZ - 729081
- This content is not included.BZ - 734865
- This content is not included.BZ - 752952
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.