Bug Fix Advisory ipvsadm bug fix update

Advisory: RHBA-2011:0979-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: RHEL Clustering (v. 5 server)


An updated ipvsadm package that fixes one bug is now available for Red Hat
Enterprise Linux 5.

The ipvsadm package provides the ipsvadm tool to administer the IP Virtual
Server services offered by the Linux kernel.

This update fixes the following bug:

* Prior to this update, the kernel module ipvs was automatically loaded if the
ipvsadm module was not loaded when checking the ipvsadm service status. This
behavior affected the system configuration, especially the memory usage. This
update ensures that the ipvsadm service status check does not load the kernel
module on systems without the loaded ipsvadm module. (BZ#592264)

All users of ipvsadm are advised to upgrade to this updated package, which fixes
this bug.


Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at

Updated packages

RHEL Clustering (v. 5 server)

ipvsadm-1.24-13.el5.src.rpm     MD5: 18fdffa9b2d1d07dc6b07f0bafe2c8b5
SHA-256: 38dedce9dd60f31a41fa059db01074485d61568e49651bf76aa7d944a1528ae3
ipvsadm-1.24-13.el5.i386.rpm     MD5: 49863ea5eb48de7a659a260b099dbeaf
SHA-256: 93522a842e2035618f7ceaa982768c616c17fa01ffe1f743cacd98b0bc9c58eb
ipvsadm-1.24-13.el5.ia64.rpm     MD5: ecb4d253ae5eeb15c78ca170807c520b
SHA-256: 0c436f7b890477aa8a11fa2fdacb92ac425c4f637d27df7e3d828582c592d6ef
ipvsadm-1.24-13.el5.ppc.rpm     MD5: ab601ce96076f8792684d80eb951f558
SHA-256: 0d151b3ff70480604ab8fe1a1852752d344e06eee953db5a89cc49a52377277f
ipvsadm-1.24-13.el5.x86_64.rpm     MD5: 7188b45f37843d2bebed1f72af8ef5e5
SHA-256: 8813d911ba3ad789715b0d912cdabd1012348eeaf77254f153420b8991229e10
(The unlinked packages above are only available from the Red Hat Network)



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/