Issued:
2013-09-30
Updated:
2013-09-30

RHBA-2013:1305 - clustermon bug fix update


Synopsis

clustermon bug fix update

Type/Severity

Bug Fix Advisory

Topic

Updated clustermon packages that fix several bugs are now available for Red Hat Enterprise Linux 5.

Description

The clustermon packages are used for remote cluster management. The modclusterd service provides an abstraction of cluster status used by conga and by the Simple Network Management (SNMP) and Common Information Model (CIM) modules of clustermon.

This update fixes the following bugs:

  • Previously, the SNMP agent exposing the cluster status and shipped as cluster-snmp caused the SNMP server (snmpd) to terminate unexpectedly with a segmentation fault when this module was loaded, and the containing server was told to reload. This was caused by an improper disposal of the resources facilitated by this server, alarms in particular. Now, the module will properly clean up such resources when being unloaded, preventing the crash on reload. (BZ#847289)

  • Prior to this update, the dynamic library that represents the CIM provider of a cluster status was not built with all the required dependencies, and certain symbols could not be resolved. As a consequence, the cluster status could not be accessed by CIM. This update adds the missing dependencies to the dynamic library, and the cluster status is now accessible as expected. (BZ#882277)

  • When modclusterd was about to associate the local machine with a particular cluster node entry from the cluster configuration, it first tried CMAN API in an improper way, yielding no expected results. This process occurred every five seconds. As a consequence, it had to periodically resort to iterative detection through local interface addresses. Also when logging for CMAN enabled, and including membership messages, it would cause messages arising from the CMAN API misuse to be emitted. Now, the API is used as expected, which corrects the aforementioned consequences. (BZ#957798)

  • Previously, a segmentation fault occurred in the modclusterd daemon and/or modcluster, ricci cluster-dedicated module, when processing large cluster.conf files (or peer-delivered counterparts). This was caused by the allocation of large amounts of memory not available on the stack. With this update, a patch has been introduced to allocate memory on the heap, and provide an error if not enough memory is available. As a result, crashes no longer occur in the described scenario. (BZ#965792)

Users of clustermon are advised to upgrade to these updated packages, which fix these bugs.

Solution

Before applying this update, make sure all previously-released errata relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258

Affected Products

ProductVersionArch
Red Hat Enterprise Linux High Availability for x86_645x86_64
Red Hat Enterprise Linux High Availability for x86_645ppc
Red Hat Enterprise Linux High Availability for x86_645ia64
Red Hat Enterprise Linux High Availability for x86_645i386
Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI5x86_64
Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI5i386

Updated Packages

  • cluster-snmp-0.12.1-10.el5.ppc.rpm
  • cluster-cim-0.12.1-10.el5.x86_64.rpm
  • clustermon-debuginfo-0.12.1-10.el5.i386.rpm
  • cluster-snmp-0.12.1-10.el5.x86_64.rpm
  • clustermon-debuginfo-0.12.1-10.el5.ia64.rpm
  • clustermon-debuginfo-0.12.1-10.el5.x86_64.rpm
  • cluster-cim-0.12.1-10.el5.ppc.rpm
  • modcluster-0.12.1-10.el5.ia64.rpm
  • cluster-cim-0.12.1-10.el5.ia64.rpm
  • modcluster-0.12.1-10.el5.ppc.rpm
  • modcluster-0.12.1-10.el5.x86_64.rpm
  • cluster-cim-0.12.1-10.el5.i386.rpm
  • cluster-snmp-0.12.1-10.el5.ia64.rpm
  • clustermon-0.12.1-10.el5.src.rpm
  • clustermon-debuginfo-0.12.1-10.el5.ppc.rpm
  • cluster-snmp-0.12.1-10.el5.i386.rpm
  • modcluster-0.12.1-10.el5.i386.rpm

Fixes

CVEs

(none)

References

(none)


Additional information