- Issued:
- 2013-01-07
- Updated:
- 2013-01-07
RHBA-2013:0065 - Bug Fix Advisory
Synopsis
piranha bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated piranha packages that fix two bugs are now available for Red Hat
Enterprise Linux 5.
Description
Piranha provides high-availability and load balancing services for Red Hat
Enterprise Linux. The piranha packages contains various tools to administer and
configure the Linux Virtual Server (LVS), as well as the heartbeat and failover
components. LVS is a dynamically-adjusted kernel routing mechanism that provides
load balancing, primarily for Web and FTP servers.
This update fixes the following bugs:
- Previously, the lvsd daemon did not correctly identify the existence of a new
virtual server when re-reading the configuration file. As a consequence, the
lvsd daemon could terminate unexpectedly with a segmentation fault when the
pulse service was reloaded. With this update, the lvsd daemon correctly
determines if a virtual server has been added to the configuration file when the
pulse service is reloaded. (BZ#786364)
- Previously, the lvsd daemon exited if a nanny process encountered an error as
a result of executing the ipvsadm command to add or remove a real server. If a
nanny process attempted to delete a real server that was not defined for a
virtual service, or if a nanny process attempted to add a real server that was
already defined for a virtual service, nanny encountered an error from ipvsadm
and exited abnormally. With this update, a nanny process does not exit if it
fails to add or remove a real server. (BZ#739223)
All users of piranha are advised to upgrade to these updated packages, which fix
these bugs.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux High Availability for x86_64 5 x86_64
- Red Hat Enterprise Linux High Availability for x86_64 5 ppc
- Red Hat Enterprise Linux High Availability for x86_64 5 ia64
- Red Hat Enterprise Linux High Availability for x86_64 5 i386
- Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 5 x86_64
- Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 5 i386
Fixes
- BZ - 739223 - Nanny crashes and shuts LVS down if a service is deleted using ipvsadm and then the corresponding real server goes down.
CVEs
(none)
References
(none)
Red Hat Enterprise Linux High Availability for x86_64 5
SRPM | |
---|---|
piranha-0.8.4-25.el5.src.rpm | SHA-256: 7ccc09bb3d06d5a569d6c4abe5335956574b86e331bf9836ddff73e8fce77083 |
x86_64 | |
piranha-0.8.4-25.el5.x86_64.rpm | SHA-256: 4462d198b93c6872281a1f4cf5e293891da4b8b22f3cdbb9896e7296ef1216ba |
piranha-debuginfo-0.8.4-25.el5.x86_64.rpm | SHA-256: 10e0348217ad62820e341aa0bb6580d5787323fa2a46fe21538da6ff2cfe0355 |
ppc | |
piranha-0.8.4-25.el5.ppc.rpm | SHA-256: e9797ea3a71d7e97d88c49a76d3df3a9a12e29ebf88a903bdf1a10e4451d23ea |
piranha-debuginfo-0.8.4-25.el5.ppc.rpm | SHA-256: f25b0499609f601ea70b7af89e40743654071530f092c06924b9a5842247d22f |
ia64 | |
piranha-0.8.4-25.el5.ia64.rpm | SHA-256: dafbe199554582d01353a1e12e5c7a8a8928775ee54263b3a84f68e2ae5b6482 |
piranha-debuginfo-0.8.4-25.el5.ia64.rpm | SHA-256: 748127712370cfbf2e32e9c413a6d9a9f6d4d996e539254dda93482fd5d54a21 |
i386 | |
piranha-0.8.4-25.el5.i386.rpm | SHA-256: 96f04bc95e34c362f157aa17bdd9f4ce7387f42f9bf39d00acfebc30506cc3f0 |
piranha-debuginfo-0.8.4-25.el5.i386.rpm | SHA-256: d31701e193bd0963555cbf3329284f038e572beb511a3c943f486b8c69552b9c |
Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 5
SRPM | |
---|---|
piranha-0.8.4-25.el5.src.rpm | SHA-256: 7ccc09bb3d06d5a569d6c4abe5335956574b86e331bf9836ddff73e8fce77083 |
x86_64 | |
piranha-0.8.4-25.el5.x86_64.rpm | SHA-256: 4462d198b93c6872281a1f4cf5e293891da4b8b22f3cdbb9896e7296ef1216ba |
piranha-debuginfo-0.8.4-25.el5.x86_64.rpm | SHA-256: 10e0348217ad62820e341aa0bb6580d5787323fa2a46fe21538da6ff2cfe0355 |
i386 | |
piranha-0.8.4-25.el5.i386.rpm | SHA-256: 96f04bc95e34c362f157aa17bdd9f4ce7387f42f9bf39d00acfebc30506cc3f0 |
piranha-debuginfo-0.8.4-25.el5.i386.rpm | SHA-256: d31701e193bd0963555cbf3329284f038e572beb511a3c943f486b8c69552b9c |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.