Updated cman packages that fix one bug are now available for Red Hat EnterpriseLinux 5.
The Cluster Manager (cman) utility provides user-level services for managing aLinux cluster.This update fixes the following bug:* Due to security concerns, the Secure Sockets Layer version 3 (SSLv3)has been deprecated on the Cisco Unified Computing System (UCS) hardwarewith the UCS firmware. However, the prior version of the fence_cisco_ucs fenceagent did not allow the Transport Layer Security version 1 (TLSv1) protocolversion to be used instead.

As a consequence, fence_cisco_ucs did not work withCisco UCS devices running the latest firmware, which could cause securityissues.

The underlying code has been fixed so that fence_cisco_ucs now usesTLSv1.3 instead of SSLv3. Now, fence_cisco_ucs works as expected with Cisco UCShardware running the latest firmware. (BZ#1321592)* Fence agents that connected using the SSH protocol previously failed to log inif an identity file was used as the method of authentication.

The bug has beenfixed, and the aforementioned fence agents now successfully authenticate throughan identity file. (BZ#1206604)Users of cman are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258RHEL Desktop Workstation (v. 5 client)

SRPMS:
cman-2.0.115-124.el5_11.4.src.rpm
    MD5: 0cd4c310cb2d44a46705865d90546c0cSHA-256: ab843c608e31717612603dffc446f902b9a008096dfd0ecdbdb8414be5fc74ea
 
IA-32:
cman-2.0.115-124.el5_11.4.i386.rpm
    MD5: 2cc37de7a2acd4a5567fcf3a9d6a2fc5SHA-256: 05cd28f8443ef67c1d422c45a3821c8db2b7957fdb9af70dc488b69aede81355
cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm
    MD5: 8e4bc3e8a8127b8fa80e18c6b714fbf3SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae
cman-devel-2.0.115-124.el5_11.4.i386.rpm
    MD5: 20021f42927f751e7708e421bf4fb7c2SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9
 
x86_64:
cman-2.0.115-124.el5_11.4.x86_64.rpm
    MD5: 8237f89ba5aebcad80265e0781f1c74fSHA-256: 1bf7cc78d8e79792d6d7fe7d04b1e898cda72b68171678e7fe7254ea43fae7db
cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm
    MD5: 8e4bc3e8a8127b8fa80e18c6b714fbf3SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae
cman-debuginfo-2.0.115-124.el5_11.4.x86_64.rpm
    MD5: de0cf386fd1e17255a7f85badc10a714SHA-256: eb60e793cf5750ebf204fe4f4841f1081319662d9cf1267b32a8ec92c8bd8811
cman-devel-2.0.115-124.el5_11.4.i386.rpm
    MD5: 20021f42927f751e7708e421bf4fb7c2SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9
cman-devel-2.0.115-124.el5_11.4.x86_64.rpm
    MD5: 7cc7e687fa963883c4542f96ca75a0d8SHA-256: 3e5e7c3d276293462924c7159664aaba6f6e98a63f0b48d526ca0823917e2f90
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
cman-2.0.115-124.el5_11.4.src.rpm
    MD5: 0cd4c310cb2d44a46705865d90546c0cSHA-256: ab843c608e31717612603dffc446f902b9a008096dfd0ecdbdb8414be5fc74ea
 
IA-32:
cman-2.0.115-124.el5_11.4.i386.rpm
    MD5: 2cc37de7a2acd4a5567fcf3a9d6a2fc5SHA-256: 05cd28f8443ef67c1d422c45a3821c8db2b7957fdb9af70dc488b69aede81355
cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm
    MD5: 8e4bc3e8a8127b8fa80e18c6b714fbf3SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae
cman-devel-2.0.115-124.el5_11.4.i386.rpm
    MD5: 20021f42927f751e7708e421bf4fb7c2SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9
 
IA-64:
cman-2.0.115-124.el5_11.4.ia64.rpm
    MD5: d411a596435843a651ddb170e63bf9f1SHA-256: 432b80f6b44906b4a0741a23187b3bc924a14bf5002d2d2f7257bca5d85a3ffc
cman-debuginfo-2.0.115-124.el5_11.4.ia64.rpm
    MD5: c5f4ce9dfe0ddfb6edbd8303e9b82653SHA-256: 4fece127b75939db425a2b587a69141a2b155660a48188956f36372a72f9df8f
cman-devel-2.0.115-124.el5_11.4.ia64.rpm
    MD5: 24d9a949bd51cee244aa164dfea15080SHA-256: 241ee0a0e1a08e0660e7e283a34a7346f3c247f724c4e481e9afd99213a337c0
 
PPC:
cman-2.0.115-124.el5_11.4.ppc.rpm
    MD5: c3265f78836ce9161fbc4084e79db278SHA-256: 20df42c3fb5d9b815bef9f8b7fc43236b2fe39c7def1d2665c5594b8b7f9c513
cman-debuginfo-2.0.115-124.el5_11.4.ppc.rpm
    MD5: e5872e47dc00db37c63d8c1c93022913SHA-256: 9d2a0baf2c4253b1a007d2be7ab374fa02c88d274520b64154d2855ff06d7cc5
cman-debuginfo-2.0.115-124.el5_11.4.ppc64.rpm
    MD5: 8a82b20cedb4b7c2f849166182d1f756SHA-256: e497cb246dc08184858a5a183731c84df96fa76e2c9c8b3235129987f4b67dcd
cman-devel-2.0.115-124.el5_11.4.ppc.rpm
    MD5: 5b1c64eb8be181b66b751981a87b08d0SHA-256: 61961739df2cdc9ef4e91cadb55e439f4261580b1074f6d0746c280729395936
cman-devel-2.0.115-124.el5_11.4.ppc64.rpm
    MD5: 4758506f7b83855ac30693dcd79d22ebSHA-256: 7bdaf482f4c1189bc7fba60f37cd9ee5993c1484e8782159d81bde0aa4ae36a3
 
x86_64:
cman-2.0.115-124.el5_11.4.x86_64.rpm
    MD5: 8237f89ba5aebcad80265e0781f1c74fSHA-256: 1bf7cc78d8e79792d6d7fe7d04b1e898cda72b68171678e7fe7254ea43fae7db
cman-debuginfo-2.0.115-124.el5_11.4.i386.rpm
    MD5: 8e4bc3e8a8127b8fa80e18c6b714fbf3SHA-256: 3f3c6dd30b7cfbf2269e1cea417b334988fb8b48a1f6674a8d2d6db790cf17ae
cman-debuginfo-2.0.115-124.el5_11.4.x86_64.rpm
    MD5: de0cf386fd1e17255a7f85badc10a714SHA-256: eb60e793cf5750ebf204fe4f4841f1081319662d9cf1267b32a8ec92c8bd8811
cman-devel-2.0.115-124.el5_11.4.i386.rpm
    MD5: 20021f42927f751e7708e421bf4fb7c2SHA-256: 38bbfe171a4af360a336e8abcf42450d820f04a7911d829e2197eb40e70c14d9
cman-devel-2.0.115-124.el5_11.4.x86_64.rpm
    MD5: 7cc7e687fa963883c4542f96ca75a0d8SHA-256: 3e5e7c3d276293462924c7159664aaba6f6e98a63f0b48d526ca0823917e2f90
 
(The unlinked packages above are only available from the Red Hat Network)

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

Leave a Reply