- Issued:
- 2009-09-02
- Updated:
- 2009-09-02
RHBA-2009:1396 - Bug Fix Advisory
Synopsis
piranha bug-fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated piranha packages that fix several bugs are now available.
Description
Piranha provides high-availability and load balancing services for Red Hat
Enterprise Linux. It includes various tools to administer and configure the
Linux Virtual Server (LVS), as well as the heartbeat and failover
components. LVS is a dynamically-adjusted kernel routing mechanism, that
provides load balancing, primarily for Web and FTP servers.
This update fixes the following bugs:
- Logrotate rotates all files including previously rotated one.
- Nanny does not default to webservice query string when no query/expect
string specified.
- Piranha-gui removes slashes from monitoring script send commands.
- Adding real port in piranha-gui caused pulse to error.
Users of piranha are advised to upgrade to these updated packages, which
resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux High Availability for x86_64 5 x86_64
- Red Hat Enterprise Linux High Availability for x86_64 5 ppc
- Red Hat Enterprise Linux High Availability for x86_64 5 ia64
- Red Hat Enterprise Linux High Availability for x86_64 5 i386
- Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 5 x86_64
- Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 5 i386
Fixes
- BZ - 483602 - logrotate default configuration, use of wildcard ' * '
- BZ - 495005 - nanny does not default to webservice query string when no query/expect string specified.
- BZ - 495102 - piranha removes slashes from monitoring script send commands
CVEs
(none)
References
(none)
Red Hat Enterprise Linux High Availability for x86_64 5
SRPM | |
---|---|
piranha-0.8.4-13.el5.src.rpm | SHA-256: b8421e6e7a8bbc3ae868d1ccff81f5a5c87487714fe38c047d553801ff30d6ef |
x86_64 | |
piranha-0.8.4-13.el5.x86_64.rpm | SHA-256: 12e478cbb46f6c747fceb2be03df5471851d53c782b369ca306d091c8e8e8d80 |
ppc | |
piranha-0.8.4-13.el5.ppc.rpm | SHA-256: 2c22e9777bf1578e975264643247a6de5262e699574adbfe5ba555520e6ac175 |
ia64 | |
piranha-0.8.4-13.el5.ia64.rpm | SHA-256: 8b44428bb80d45a0aaf3344fdc134b768aa4c0152c9bb6569dc7ed5a1910c9e3 |
i386 | |
piranha-0.8.4-13.el5.i386.rpm | SHA-256: bb9f64b813ae68e63312a641d4fb869ac59bb836cb649926d6af390f102ea6c7 |
Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI 5
SRPM | |
---|---|
piranha-0.8.4-13.el5.src.rpm | SHA-256: b8421e6e7a8bbc3ae868d1ccff81f5a5c87487714fe38c047d553801ff30d6ef |
x86_64 | |
piranha-0.8.4-13.el5.x86_64.rpm | SHA-256: 12e478cbb46f6c747fceb2be03df5471851d53c782b369ca306d091c8e8e8d80 |
i386 | |
piranha-0.8.4-13.el5.i386.rpm | SHA-256: bb9f64b813ae68e63312a641d4fb869ac59bb836cb649926d6af390f102ea6c7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.