openssh-3.1p1-10.i386.rpm, openssh-askpass-3.1p1-10.i386.rpm, openssh-clients-3.1p1-10.i386.rpm, openssh-server-3.1p1-10.i386.rpm. A security vulnerability in the OpenSSH server was discovered on 2003-09-15. This vulnerability has been used by at least one exploit, and affects this and all previous Rocks releases. Note these packages install a "slow" ssh. If you use Rocks 3.1.0 or higher, you should not upgrade.
To upgrade: # rpm -e openssh-askpass-gnome # cd /where/i/downloaded/the/openssh-pkgs/ # rpm -Uvh openssh* # service sshd restart # cp openssh-* /home/install/contrib/7.3/public/[arch]/RPMS/, where [arch] is either "i386" or "ia64". Rebuild your distribution: # cd /home/install # rocks-dist dist Reinstall all compute nodes: # cluster-fork /boot/kickstart/cluster-kickstart
ganglia-python-3.0.1-2.i386.rpm. Fixes a memory leak in the "ps" monitoring module. This package should be upgraded on all cluster nodes, and then the "gschedule" service should be restarted.
Certain motherboards (perhaps those with hot-plug PCI slots) require a "tmpkernel-pcmcia-cs-3.1.27-18.i386.rpm" package which is not present on the Rocks base CD. This causes the installation to fail. Servers in the ProLiant class (ML370G3, DL380G3) are known to have this issue. We have a Patched Base CD for this problem.