- Issued:
- 2013-09-12
- Updated:
- 2013-11-20
RHBA-2013:1259 - Bug Fix Advisory
Synopsis
ipmitool bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ipmitool packages that fix several bugs are now available.
Description
The ipmitool package contains a command-line utility for interfacing with
devices that support the Intelligent Platform Management Interface (IPMI)
specification. IPMI is an open standard for machine health, inventory, and
remote power control.
This update fixes the following bugs:
- In a previous ipmitool update, the new options "-R" and "-N" were added to
adjust the retransmission rate of outgoing IPMI requests over LAN and lanplus
interfaces. Implementation of these options set a wrong default value of the
retransmission timeout, and an outgoing request timed out prematurely. In
addition, in some corner cases, ipmitool could terminate unexpectedly with a
segmentation fault when the timeout occurred. This update fixes the default
timeout value, so ipmitool without the "-N" option retransmits outgoing IPMI
requests as in previous versions, and crashes no longer occur in the described
scenario. (BZ#826027)
- Previously, enabling the "ipmi" and "link" keys in user access information
using the ipmitool utility did not work properly. Consequently, the values of
these settings were not taken into account. A patch has been provided that
ensures the values of these settings are read and processed as expected.
(BZ#903251)
- In cases of congested network or slow-responding Baseboard Management
Controller (BMC), the reply operation timeout triggered the protocol command
retry action. Consequently, the ipmitool utility could incorrectly process a LAN
session protocol command with the reply from a previous protocol command. This
update fixes handling of expected replies for each command alone, and cleans up
expected replies between commands. Now, the retried reply of the first command
is correctly ignored while the later command, which is currently pending, is
properly processed in the described scenario. (BZ#923192)
Users of ipmitool are advised to upgrade to these updated packages, which fix
these bugs. After installing this update, the IPMI event daemon (ipmievd) will
be restarted automatically.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 i386
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
- Red Hat Enterprise Linux for Scientific Computing 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 x86_64
- Red Hat Enterprise Linux Server from RHUI 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support 6 x86_64
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6 s390x
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 x86_64
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6 i386
- Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6 s390x
Fixes
- BZ - 826027 - ipmitool segfaults in ipmi_lanplus_send_payload
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
ipmitool-1.8.11-16.el6.src.rpm | SHA-256: a486f0a692ae7e2288b09e73cc83b52381c68c1237e2c22daeab238c1b9de3e5 |
x86_64 | |
ipmitool-1.8.11-16.el6.x86_64.rpm | SHA-256: 786e147bdd02525d65ff93cd6376c0c1ef78ecb2ed662efd170b431952df4fee |
ipmitool-1.8.11-16.el6.x86_64.rpm | SHA-256: 786e147bdd02525d65ff93cd6376c0c1ef78ecb2ed662efd170b431952df4fee |
ipmitool-debuginfo-1.8.11-16.el6.x86_64.rpm | SHA-256: 5308de9770f280cccc62bfc90b1fa672fd09934479f6718be0e116fc3e9a86b2 |
ipmitool-debuginfo-1.8.11-16.el6.x86_64.rpm | SHA-256: 5308de9770f280cccc62bfc90b1fa672fd09934479f6718be0e116fc3e9a86b2 |
i386 | |
ipmitool-1.8.11-16.el6.i686.rpm | SHA-256: 0e50d306817e1653416ef18544e769ac4afed64013cb6b37aa39ed969dac83f3 |
ipmitool-debuginfo-1.8.11-16.el6.i686.rpm | SHA-256: 3ff4bf0a238001617ae2f16aff228983ab0f9c2b8d5d6e631ce3f35bce38a7dc |
Red Hat Enterprise Linux Server from RHUI 6
SRPM | |
---|---|
ipmitool-1.8.11-16.el6.src.rpm | SHA-256: a486f0a692ae7e2288b09e73cc83b52381c68c1237e2c22daeab238c1b9de3e5 |
x86_64 | |
ipmitool-1.8.11-16.el6.x86_64.rpm | SHA-256: 786e147bdd02525d65ff93cd6376c0c1ef78ecb2ed662efd170b431952df4fee |
ipmitool-debuginfo-1.8.11-16.el6.x86_64.rpm | SHA-256: 5308de9770f280cccc62bfc90b1fa672fd09934479f6718be0e116fc3e9a86b2 |
i386 | |
ipmitool-1.8.11-16.el6.i686.rpm | SHA-256: 0e50d306817e1653416ef18544e769ac4afed64013cb6b37aa39ed969dac83f3 |
ipmitool-debuginfo-1.8.11-16.el6.i686.rpm | SHA-256: 3ff4bf0a238001617ae2f16aff228983ab0f9c2b8d5d6e631ce3f35bce38a7dc |
Red Hat Enterprise Linux Server - Extended Life Cycle Support 6
SRPM | |
---|---|
ipmitool-1.8.11-16.el6.src.rpm | SHA-256: a486f0a692ae7e2288b09e73cc83b52381c68c1237e2c22daeab238c1b9de3e5 |
x86_64 | |
ipmitool-1.8.11-16.el6.x86_64.rpm | SHA-256: 786e147bdd02525d65ff93cd6376c0c1ef78ecb2ed662efd170b431952df4fee |
ipmitool-debuginfo-1.8.11-16.el6.x86_64.rpm | SHA-256: 5308de9770f280cccc62bfc90b1fa672fd09934479f6718be0e116fc3e9a86b2 |
i386 | |
ipmitool-1.8.11-16.el6.i686.rpm | SHA-256: 0e50d306817e1653416ef18544e769ac4afed64013cb6b37aa39ed969dac83f3 |
ipmitool-debuginfo-1.8.11-16.el6.i686.rpm | SHA-256: 3ff4bf0a238001617ae2f16aff228983ab0f9c2b8d5d6e631ce3f35bce38a7dc |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
ipmitool-1.8.11-16.el6.src.rpm | SHA-256: a486f0a692ae7e2288b09e73cc83b52381c68c1237e2c22daeab238c1b9de3e5 |
x86_64 | |
ipmitool-1.8.11-16.el6.x86_64.rpm | SHA-256: 786e147bdd02525d65ff93cd6376c0c1ef78ecb2ed662efd170b431952df4fee |
ipmitool-debuginfo-1.8.11-16.el6.x86_64.rpm | SHA-256: 5308de9770f280cccc62bfc90b1fa672fd09934479f6718be0e116fc3e9a86b2 |
i386 | |
ipmitool-1.8.11-16.el6.i686.rpm | SHA-256: 0e50d306817e1653416ef18544e769ac4afed64013cb6b37aa39ed969dac83f3 |
ipmitool-debuginfo-1.8.11-16.el6.i686.rpm | SHA-256: 3ff4bf0a238001617ae2f16aff228983ab0f9c2b8d5d6e631ce3f35bce38a7dc |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
ipmitool-1.8.11-16.el6.src.rpm | SHA-256: a486f0a692ae7e2288b09e73cc83b52381c68c1237e2c22daeab238c1b9de3e5 |
x86_64 | |
ipmitool-1.8.11-16.el6.x86_64.rpm | SHA-256: 786e147bdd02525d65ff93cd6376c0c1ef78ecb2ed662efd170b431952df4fee |
ipmitool-debuginfo-1.8.11-16.el6.x86_64.rpm | SHA-256: 5308de9770f280cccc62bfc90b1fa672fd09934479f6718be0e116fc3e9a86b2 |
i386 | |
ipmitool-1.8.11-16.el6.i686.rpm | SHA-256: 0e50d306817e1653416ef18544e769ac4afed64013cb6b37aa39ed969dac83f3 |
ipmitool-debuginfo-1.8.11-16.el6.i686.rpm | SHA-256: 3ff4bf0a238001617ae2f16aff228983ab0f9c2b8d5d6e631ce3f35bce38a7dc |
Red Hat Enterprise Linux for IBM z Systems 6
SRPM | |
---|---|
ipmitool-1.8.11-16.el6.src.rpm | SHA-256: a486f0a692ae7e2288b09e73cc83b52381c68c1237e2c22daeab238c1b9de3e5 |
s390x | |
ipmitool-1.8.11-16.el6.s390x.rpm | SHA-256: 62584d7ef7bde95c3c0a81a3b4f65bb3170f4c0e956405813fe01cfa40df00eb |
ipmitool-debuginfo-1.8.11-16.el6.s390x.rpm | SHA-256: 1b2926346c6fe216429cc6dc6fabe4862af81f0193133304b225d9a2b77284c5 |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
ipmitool-1.8.11-16.el6.src.rpm | SHA-256: a486f0a692ae7e2288b09e73cc83b52381c68c1237e2c22daeab238c1b9de3e5 |
ppc64 | |
ipmitool-1.8.11-16.el6.ppc64.rpm | SHA-256: 70776576aed780ff15777838b92e20cfd310b1958687fa580ae8cd4e8c1efe83 |
ipmitool-debuginfo-1.8.11-16.el6.ppc64.rpm | SHA-256: a86e25ccda29aeca599fab1d0029ad6018b6b113329bc94bceaaf5327fa5ca85 |
Red Hat Enterprise Linux for Scientific Computing 6
SRPM | |
---|---|
ipmitool-1.8.11-16.el6.src.rpm | SHA-256: a486f0a692ae7e2288b09e73cc83b52381c68c1237e2c22daeab238c1b9de3e5 |
x86_64 | |
ipmitool-1.8.11-16.el6.x86_64.rpm | SHA-256: 786e147bdd02525d65ff93cd6376c0c1ef78ecb2ed662efd170b431952df4fee |
ipmitool-debuginfo-1.8.11-16.el6.x86_64.rpm | SHA-256: 5308de9770f280cccc62bfc90b1fa672fd09934479f6718be0e116fc3e9a86b2 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support (for IBM z Systems) 6
SRPM | |
---|---|
ipmitool-1.8.11-16.el6.src.rpm | SHA-256: a486f0a692ae7e2288b09e73cc83b52381c68c1237e2c22daeab238c1b9de3e5 |
s390x | |
ipmitool-1.8.11-16.el6.s390x.rpm | SHA-256: 62584d7ef7bde95c3c0a81a3b4f65bb3170f4c0e956405813fe01cfa40df00eb |
ipmitool-debuginfo-1.8.11-16.el6.s390x.rpm | SHA-256: 1b2926346c6fe216429cc6dc6fabe4862af81f0193133304b225d9a2b77284c5 |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension 6
SRPM | |
---|---|
ipmitool-1.8.11-16.el6.src.rpm | SHA-256: a486f0a692ae7e2288b09e73cc83b52381c68c1237e2c22daeab238c1b9de3e5 |
x86_64 | |
ipmitool-1.8.11-16.el6.x86_64.rpm | SHA-256: 786e147bdd02525d65ff93cd6376c0c1ef78ecb2ed662efd170b431952df4fee |
ipmitool-debuginfo-1.8.11-16.el6.x86_64.rpm | SHA-256: 5308de9770f280cccc62bfc90b1fa672fd09934479f6718be0e116fc3e9a86b2 |
i386 | |
ipmitool-1.8.11-16.el6.i686.rpm | SHA-256: 0e50d306817e1653416ef18544e769ac4afed64013cb6b37aa39ed969dac83f3 |
ipmitool-debuginfo-1.8.11-16.el6.i686.rpm | SHA-256: 3ff4bf0a238001617ae2f16aff228983ab0f9c2b8d5d6e631ce3f35bce38a7dc |
Red Hat Enterprise Linux Server - Extended Life Cycle Support Extension (for IBM z Systems) 6
SRPM | |
---|---|
ipmitool-1.8.11-16.el6.src.rpm | SHA-256: a486f0a692ae7e2288b09e73cc83b52381c68c1237e2c22daeab238c1b9de3e5 |
s390x | |
ipmitool-1.8.11-16.el6.s390x.rpm | SHA-256: 62584d7ef7bde95c3c0a81a3b4f65bb3170f4c0e956405813fe01cfa40df00eb |
ipmitool-debuginfo-1.8.11-16.el6.s390x.rpm | SHA-256: 1b2926346c6fe216429cc6dc6fabe4862af81f0193133304b225d9a2b77284c5 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.