Описание
ELSA-2009-1341: cman security, bug fix, and enhancement update (LOW)
[2.0.115-1]
- RSA II fencing agent has been fixed.
- Resolves: rhbz#493802
[2.0.114-1]
- local variable 'verbose_filename' referenced before assignment has been fixed
- RSA II fencing agent has been fixed.
- Resolves: rhbz#493802 rhbz#514758
[2.0.113-1]
- Limitations with 2-node fence_scsi are now properly documented in the man page.
- Resolves: rhbz#512998
[2.0.112-1]
- The pexpect exception is now properly checked in fence agents.
- Resolves: rhbz#501586
[2.0.111-1]
- cman_tool leave remove does now properly reduces quorum.
- Resolves: rhbz#505258
[2.0.110-1]
- Updated fence_lpar man page to remove options that do not yet exist.
- Resolves: rhbz#498045
[2.0.108-1]
- A semaphore leak in cman has been fixed.
- Resolves: rhbz#505594
[2.0.107-1]
- Added man page for lpar fencing agent (fence_lpar).
- Resolves: rhbz#498045
[2.0.106-1]
- The lssyscfg command can take longer than the shell timeout which will cause fencing to fail, we now wait longer for the lssyscfg command to complete.
- Resolves: rhbz#504705
[2.0.105-1]
- The fencing agents no longer fail with pexpect exceptions.
- Resolves: rhbz#501586
[2.0.104-1]
- Broadcast communcations are now possible with cman
- fence_lpar can now login to IVM systems
- Resolves: rhbz#502674 rhbz#492808
[2.0.103-1]
- fence_apc no longer fails with a pexpect exception
- symlink vulnerabilities in fance_apc_snmp were fixed
- The virsh fencing agent was added.
- Resolves: rhbz#496629 rhbz#498952 rhbz#501586
[2.0.102-1]
- Correct return code is checked during disk scanning check.
- Resolves: rhbz#484956
[2.0.101-1]
- The SCSI fence agent now verifies that sg_persist is installed properly.
- The DRAC5 fencing agent now properly handles a modulename.
- QDisk now logs warning messages if it appears it's I/O to shared storage is hung.
- Resolves: rhbz#496724 rhbz#500450 rhbz#500567
[2.0.100-1]
- Support has been added for ePowerSwitch 8+ devices
- cluster.conf files can now have more than 52 entries inside a block inside [block]
- The output of the group_tool dump sub commands are no longer NULL padded.
- Using device='' instead of label='' no longer causes qdiskd to incorrectly exit
- The IPMI fencing agent has been modified to timeout after 10 seconds. It is also now possible to specify a different timeout with the '-t' option.
- The IPMI fencing agent now allows punctuation in the password
- Quickly starting and stopping the cman service no longer causes the cluster membership to become inconsistent across the cluster
- An issue with lock syncing causing 'receive_own from ...' errors in syslog has been fixed
- An issue which caused gfs_controld to segfault when mounting hundreds of filesystems has been fixed
- The LPAR fencing agent now properly reports status when an LPAR is in Open Firmware
- The APC SNMP fencing agent now properly recognizes outletStatusOn and outletStatusOff returns codes from the SNMP agent
- WTI Fencing agent can now connect to fencing devices with no password
- The rps-10 fencing agent now properly performs a reboot when run with no options.
- The IPMI fencing agent now supports different cipher types with the '-C' option
- Qdisk now properly scans devices and partitions
- Added support for LPAR/HMC v3
- cman now checks to see if a new node has state to prevent killing the first node during cluster setup
- service qdiskd start now works properly
- The McData fence agent now works properly with the Sphereon 4500 model
- The Egenera fence agent can now specify an ssh login name
- APC Fence agent works with non-admin accounts with firmware 3.5.x
- fence_xvmd now tries two methods to reboot a virtual machine
- Connections to openais are now allowed from unprivileged CPG clients with user and group of 'ais'
- Support has been added for Cisco 9124/9134 SAN switches
- groupd no longer allows the default fence domain to be '0' which would cause rgmanager to hang
- The RSA fence agent now supports ssh enabled RSA II devices
- DRAC fence agent now works with iDRAC on the Dell M600 Blade Chassis
- fence_drac5 now shows proper usage instructions
- cman no longer uses the wrong node name when getnameinfo() fails
- The SCSI fence agent now verifies that sg_persist is installed properly
- Resolves: rhbz#467112 rhbz#468966 rhbz#470318 rhbz#276541 rhbz#447964 rhbz#472786 rhbz#474163 rhbz#480401 rhbz#481566 rhbz#484095 rhbz#481664 rhbz#322291 rhbz#447497 rhbz#484956 rhbz#485700 rhbz#485026 rhbz#485199 rhbz#470983 rhbz#488958 rhbz#487501 rhbz#491640 rhbz#480178 rhbz#485469 rhbz#480836 rhbz#493207 rhbz#493802 rhbz#462390 rhbz#498329 rhbz#488565 rhbz#499871
Обновленные пакеты
Oracle Linux 5
Oracle Linux ia64
cman
2.0.115-1.el5
cman-devel
2.0.115-1.el5
Oracle Linux x86_64
cman
2.0.115-1.el5
cman-devel
2.0.115-1.el5
Oracle Linux i386
cman
2.0.115-1.el5
cman-devel
2.0.115-1.el5
Связанные CVE
Связанные уязвимости
The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file.
The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file.
The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fence 2.02.00-r1 and possibly (b) cman, when running in verbose mode, allows local users to append to arbitrary files via a symlink attack on the apclog temporary file.
The (1) fence_apc and (2) fence_apc_snmp programs, as used in (a) fenc ...
Red Hat Cluster Project 2.x allows local users to modify or overwrite arbitrary files via symlink attacks on files in /tmp, involving unspecified components in Resource Group Manager (aka rgmanager) before 2.03.09-1, gfs2-utils before 2.03.09-1, and CMAN - The Cluster Manager before 2.03.09-1 on Fedora 9.