- Issued:
- 2013-09-30
- Updated:
- 2013-09-30
RHBA-2013:1305 - clustermon bug fix update
Synopsis
clustermon bug fix update
Type/Severity
Bug Fix Advisory
Topic
Updated clustermon packages that fix several bugs are now available for Red Hat Enterprise Linux 5.
Description
The clustermon packages are used for remote cluster management. The modclusterd service provides an abstraction of cluster status used by conga and by the Simple Network Management (SNMP) and Common Information Model (CIM) modules of clustermon.
This update fixes the following bugs:
-
Previously, the SNMP agent exposing the cluster status and shipped as cluster-snmp caused the SNMP server (snmpd) to terminate unexpectedly with a segmentation fault when this module was loaded, and the containing server was told to reload. This was caused by an improper disposal of the resources facilitated by this server, alarms in particular. Now, the module will properly clean up such resources when being unloaded, preventing the crash on reload. (BZ#847289)
-
Prior to this update, the dynamic library that represents the CIM provider of a cluster status was not built with all the required dependencies, and certain symbols could not be resolved. As a consequence, the cluster status could not be accessed by CIM. This update adds the missing dependencies to the dynamic library, and the cluster status is now accessible as expected. (BZ#882277)
-
When modclusterd was about to associate the local machine with a particular cluster node entry from the cluster configuration, it first tried CMAN API in an improper way, yielding no expected results. This process occurred every five seconds. As a consequence, it had to periodically resort to iterative detection through local interface addresses. Also when logging for CMAN enabled, and including membership messages, it would cause messages arising from the CMAN API misuse to be emitted. Now, the API is used as expected, which corrects the aforementioned consequences. (BZ#957798)
-
Previously, a segmentation fault occurred in the modclusterd daemon and/or modcluster, ricci cluster-dedicated module, when processing large cluster.conf files (or peer-delivered counterparts). This was caused by the allocation of large amounts of memory not available on the stack. With this update, a patch has been introduced to allocate memory on the heap, and provide an error if not enough memory is available. As a result, crashes no longer occur in the described scenario. (BZ#965792)
Users of clustermon are advised to upgrade to these updated packages, which fix these bugs.
Solution
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux High Availability for x86_64 | 5 | x86_64 |
| Red Hat Enterprise Linux High Availability for x86_64 | 5 | ppc |
| Red Hat Enterprise Linux High Availability for x86_64 | 5 | ia64 |
| Red Hat Enterprise Linux High Availability for x86_64 | 5 | i386 |
| Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI | 5 | x86_64 |
| Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI | 5 | i386 |
Updated Packages
- cluster-snmp-0.12.1-10.el5.ppc.rpm
- cluster-cim-0.12.1-10.el5.x86_64.rpm
- clustermon-debuginfo-0.12.1-10.el5.i386.rpm
- cluster-snmp-0.12.1-10.el5.x86_64.rpm
- clustermon-debuginfo-0.12.1-10.el5.ia64.rpm
- clustermon-debuginfo-0.12.1-10.el5.x86_64.rpm
- cluster-cim-0.12.1-10.el5.ppc.rpm
- modcluster-0.12.1-10.el5.ia64.rpm
- cluster-cim-0.12.1-10.el5.ia64.rpm
- modcluster-0.12.1-10.el5.ppc.rpm
- modcluster-0.12.1-10.el5.x86_64.rpm
- cluster-cim-0.12.1-10.el5.i386.rpm
- cluster-snmp-0.12.1-10.el5.ia64.rpm
- clustermon-0.12.1-10.el5.src.rpm
- clustermon-debuginfo-0.12.1-10.el5.ppc.rpm
- cluster-snmp-0.12.1-10.el5.i386.rpm
- modcluster-0.12.1-10.el5.i386.rpm
Fixes
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.