Skip to navigation

Bug Fix Advisory OpenIPMI bug fix update

Advisory: RHBA-2011:1352-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-20
Last updated on: 2012-02-20
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated OpenIPMI packages that fix three bugs are now available for Red Hat
Enterprise Linux 5.

The OpenIPMI packages provide command line tools and utilities to access
platform information using IPMI (Intelligent Platform Management Interface), and
thus allowing system administrators to manage systems and perform system health
monitoring.

This update fixes the following bugs:

* Prior to this update, the "delloem powermonitor" command did not properly
convert values received on network to integer numbers on big-endian systems
(PowerPC, IBM System z), and thus showed incorrect values when reporting power
consumption. This update fixes the integer conversions in the "delloem
powermonitor" command so that the power consumption is reported correctly on
PowerPC and IBM System z architectures. (BZ#659326)

* Prior to this update, ipmitool's Serial Over LAN (SOL) module erroneously
calculated number of octets processed by Baseboard Management Controller (BMC)
and could have resent already acknowledged chunks of serial communication, which
could have disturbed the serial line with additional characters. Under certain
circumstances, this could have also brought ipmitool into endless loop or
unexpected termination. With this update, ipmitool now correctly calculates
number of octets processed by BMC and does not resend unwanted characters over
the serial line. (BZ#675980)

* Prior to this update, a debug message "Discovered local IPMB address
[address]" was included in the output of "ipmitool -v". With this update, the
message severity has been lowered and it is only shown when the "-v" option is
used multiple times to enable very verbose debug output. (BZ#674494)

All users of OpenIPMI are advised to upgrade to these updated packages, which
fix these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
OpenIPMI-2.0.16-12.el5.src.rpm
File outdated by:  RHSA-2013:0123
    MD5: e95b7a41562b9f0243e7e31b61996f2b
SHA-256: 30d513312b482d5db89d92d4f4b25c4e7cdeab3a2a1febfb3c28d176094829fa
 
IA-32:
OpenIPMI-devel-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: 21d0f6951c5660b39bb07c2ee7ee82a6
SHA-256: 206204fcc29a3b1d9e6ef2b8636e0458a9e601af65fbebdf17ba3f3e952647d0
 
x86_64:
OpenIPMI-devel-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: 21d0f6951c5660b39bb07c2ee7ee82a6
SHA-256: 206204fcc29a3b1d9e6ef2b8636e0458a9e601af65fbebdf17ba3f3e952647d0
OpenIPMI-devel-2.0.16-12.el5.x86_64.rpm
File outdated by:  RHSA-2013:0123
    MD5: 713ff6f0a30d9233269cd49aaca4021c
SHA-256: ecae4a503598588a4c7af646ba4474b64a96db6dc324570ebe27c2b68d02b7e4
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
OpenIPMI-2.0.16-12.el5.src.rpm
File outdated by:  RHSA-2013:0123
    MD5: e95b7a41562b9f0243e7e31b61996f2b
SHA-256: 30d513312b482d5db89d92d4f4b25c4e7cdeab3a2a1febfb3c28d176094829fa
 
IA-32:
OpenIPMI-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: f1d1ce6479a31fe3312848c41916e3e4
SHA-256: 93aba225dad74e81a68a03737f7af13ea2e2eec68acb2c1679c40c315226cde4
OpenIPMI-devel-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: 21d0f6951c5660b39bb07c2ee7ee82a6
SHA-256: 206204fcc29a3b1d9e6ef2b8636e0458a9e601af65fbebdf17ba3f3e952647d0
OpenIPMI-gui-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: 1561b9908e7fecc6102be821019c5810
SHA-256: 6f0bdedd7e926f802cbd2c48f62018e6926d3e192a1a5b1b72b5e34ccab0c39d
OpenIPMI-libs-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: 56f805bb5d4734bdcb6bc3c13cf26d80
SHA-256: eda3dc9478da6c04bafcf2f408919b45546142748a0fed59bb4f367a6bd68604
OpenIPMI-perl-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: 7fc93e096ccc95dddc549ad7317d5ef9
SHA-256: 46fa562ff9d0f2b43c9558ec22ce57a3f94a01e08091385cfeb7124e405a55e7
OpenIPMI-python-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: f10f9767beb7f5a8bfa7055ce546161a
SHA-256: 9563f8c0263ad87034c431925e147ea7cd9e621619eb7f7f73024d46f0a1606b
OpenIPMI-tools-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: 971b8b9dbda68a867faa3fda1ff044d8
SHA-256: a514435d884539f74ea5f20f4314f7f3341724ecd0ab5672f7ec8cefd5b609ff
 
IA-64:
OpenIPMI-2.0.16-12.el5.ia64.rpm
File outdated by:  RHSA-2013:0123
    MD5: e16b80aa3a2d7ebfa43dfa09255d8697
SHA-256: 3492cd5ec2e656096e69dca1cde64c498f05ae70431ce91aeb5d5253438a28aa
OpenIPMI-devel-2.0.16-12.el5.ia64.rpm
File outdated by:  RHSA-2013:0123
    MD5: 0f0fd12d8319c73f3f692a43e37333e0
SHA-256: 44218525bf5a0b8dcfdd9be8b767fb640f5bc38e67e63931c702bd9b1187b7a9
OpenIPMI-gui-2.0.16-12.el5.ia64.rpm
File outdated by:  RHSA-2013:0123
    MD5: 187e8c908fe9f36be3f35873d998859b
SHA-256: 894613e4ed34a927cd02d5671961378f9e9f7eb8a1d72d8fc3bd674d72bfba09
OpenIPMI-libs-2.0.16-12.el5.ia64.rpm
File outdated by:  RHSA-2013:0123
    MD5: 7677a6f6839180c32cc2fe1a76fb70bc
SHA-256: 8b7af71baa6b12da843276d2462375294b2be1e956fd237add94b3b36878d843
OpenIPMI-perl-2.0.16-12.el5.ia64.rpm
File outdated by:  RHSA-2013:0123
    MD5: 347cc55fdf9029a10ac86cfde1b1ef08
SHA-256: 7d7ef2711587102ca1b4f319ba90305f567124094ba2b7f06f66c8c65a9baaa6
OpenIPMI-python-2.0.16-12.el5.ia64.rpm
File outdated by:  RHSA-2013:0123
    MD5: 2cb91a4cf1aacd44e95ed02bc44e80f5
SHA-256: de927ec790a5e6123825e466c368162ea0eb50594133fdb5b5c973682efa5995
OpenIPMI-tools-2.0.16-12.el5.ia64.rpm
File outdated by:  RHSA-2013:0123
    MD5: 415e8e7d11b17c85299189f0bc2ede6a
SHA-256: cfe1c8be7b984d4efca3051b2c42676979608599ea9f3a8aae5233236b79c469
 
PPC:
OpenIPMI-2.0.16-12.el5.ppc.rpm
File outdated by:  RHSA-2013:0123
    MD5: 813d99d1548a707ef215b595902f62f5
SHA-256: 66cb7dde5890a6c33c4431be2bce52bbd7fcea53a497a7a49b5cde241f91201b
OpenIPMI-devel-2.0.16-12.el5.ppc.rpm
File outdated by:  RHSA-2013:0123
    MD5: f109c387378e98bb6598f9cefd13fc65
SHA-256: 082ddca18855d658758c2a45d45388ff832a19ae4fd3cc74753bb728abeeaa04
OpenIPMI-devel-2.0.16-12.el5.ppc64.rpm
File outdated by:  RHSA-2013:0123
    MD5: 125cd0b4c5f04786d366f57e0d67b8bd
SHA-256: 721d6bf40594370409da1efa6743e6abc793b33a0a8372606f96258f5bd0d854
OpenIPMI-gui-2.0.16-12.el5.ppc.rpm
File outdated by:  RHSA-2013:0123
    MD5: a861f98ddae1ff3a64287a678c482636
SHA-256: 482a0d89d797fcea3690af9313a03dd91519beb16d8294730ee89b91225d5c1f
OpenIPMI-libs-2.0.16-12.el5.ppc.rpm
File outdated by:  RHSA-2013:0123
    MD5: 64c3073d50f46299cc3c17d3f2a0e0b5
SHA-256: 209b720b3fb80fbec0d0d628747772ded0a214cba8bb3c2b8ab730d5ffd83ba2
OpenIPMI-libs-2.0.16-12.el5.ppc64.rpm
File outdated by:  RHSA-2013:0123
    MD5: bfccc0d8502d95bb29719b257d848fa5
SHA-256: 17386fb15b05b26e39baa7c24be3dae7f1ba56540a4decc08b4102fb0055907c
OpenIPMI-perl-2.0.16-12.el5.ppc.rpm
File outdated by:  RHSA-2013:0123
    MD5: 50d64fbb55ac9613fc824528f478cb5e
SHA-256: 1866984ee3f05850969af165ba8e61fa9063f709af404905cfef5c1e159d2502
OpenIPMI-python-2.0.16-12.el5.ppc.rpm
File outdated by:  RHSA-2013:0123
    MD5: e2f2528b5792edc298b44f1392ee6c2e
SHA-256: 9fb5c9a1308a24f295f339a243e52ff82077a0f2fb941d363dc7b7a14bf19065
OpenIPMI-tools-2.0.16-12.el5.ppc.rpm
File outdated by:  RHSA-2013:0123
    MD5: 261f5ac8432f9790909f89c4cc09e98a
SHA-256: edc0c3c5a39689ca8040b163928891066e6c47fb218180d9f51d2dbc8b1ff243
 
s390x:
OpenIPMI-2.0.16-12.el5.s390x.rpm
File outdated by:  RHSA-2013:0123
    MD5: 016116a436a5d3beab45599cc33a71c6
SHA-256: d4dc739424298c635a3ad2007a620b91928f5a9a29bd312f4e5c1bcf243b39ef
OpenIPMI-devel-2.0.16-12.el5.s390.rpm
File outdated by:  RHSA-2013:0123
    MD5: d387bb28fe8e77f3994fcf3b372f2d09
SHA-256: bc6eb28165e6c064814ec0c57a4fb56474ed3697003f6ce5c3beed6eed663815
OpenIPMI-devel-2.0.16-12.el5.s390x.rpm
File outdated by:  RHSA-2013:0123
    MD5: 31dceec77a8e00853ee4ab2ecf398dcf
SHA-256: 730fb8d87935492555c8ec91dc3ae63ba9da294e8fe0d32e37017e201072d214
OpenIPMI-gui-2.0.16-12.el5.s390x.rpm
File outdated by:  RHSA-2013:0123
    MD5: 8d02cc2a9da563f89bc5236ffa5caaec
SHA-256: 50adb23329914837f1abb452c455a902dd596bcd3f05502b28c50e31c33aa5a4
OpenIPMI-libs-2.0.16-12.el5.s390.rpm
File outdated by:  RHSA-2013:0123
    MD5: 04343fa16ee7fe3feac489ee51bfb320
SHA-256: 3974afe166492619cb11429d09d3cd3a7e40e818f40599977b0435a4bf4f762e
OpenIPMI-libs-2.0.16-12.el5.s390x.rpm
File outdated by:  RHSA-2013:0123
    MD5: e2a5eada922b458c2fc8bcb381ffb2de
SHA-256: f572d0f9991d4acd281e61aa056b046b7b8ead599fc23459791bd5209ae4aa0b
OpenIPMI-perl-2.0.16-12.el5.s390x.rpm
File outdated by:  RHSA-2013:0123
    MD5: bc45abd279bcb98ec9f5ea2dfe98adf1
SHA-256: 825e7ab883166ac95e90369f5ae7425454054be137c3c7291b67774cf9bf42f5
OpenIPMI-python-2.0.16-12.el5.s390x.rpm
File outdated by:  RHSA-2013:0123
    MD5: 2fdd2a14d5100703efc1286d738a27f8
SHA-256: c598010009728eb3bf84050306363b6ed9ae510bb1b482f6447e04465f1e782a
OpenIPMI-tools-2.0.16-12.el5.s390x.rpm
File outdated by:  RHSA-2013:0123
    MD5: 0fc8df805b231c1dbf2575cb6119ac0c
SHA-256: 6e6cca7fcbe3756b44ac66514b9ad750cd86c2c2c7e977560231c41cf370920d
 
x86_64:
OpenIPMI-2.0.16-12.el5.x86_64.rpm
File outdated by:  RHSA-2013:0123
    MD5: f7c5e9965fd6fdd66a81ca8064ea3eeb
SHA-256: 81c0dcff5b0979c3c7b4c8ff317ae12193cdc29469ea828a4db3229aecc76f33
OpenIPMI-devel-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: 21d0f6951c5660b39bb07c2ee7ee82a6
SHA-256: 206204fcc29a3b1d9e6ef2b8636e0458a9e601af65fbebdf17ba3f3e952647d0
OpenIPMI-devel-2.0.16-12.el5.x86_64.rpm
File outdated by:  RHSA-2013:0123
    MD5: 713ff6f0a30d9233269cd49aaca4021c
SHA-256: ecae4a503598588a4c7af646ba4474b64a96db6dc324570ebe27c2b68d02b7e4
OpenIPMI-gui-2.0.16-12.el5.x86_64.rpm
File outdated by:  RHSA-2013:0123
    MD5: d3ffae3abedf16b24f7a020080843092
SHA-256: c0fefa04728d7a13defa7b5492ab3d2908d99c320db75762fc5e57574d6b43c7
OpenIPMI-libs-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: 56f805bb5d4734bdcb6bc3c13cf26d80
SHA-256: eda3dc9478da6c04bafcf2f408919b45546142748a0fed59bb4f367a6bd68604
OpenIPMI-libs-2.0.16-12.el5.x86_64.rpm
File outdated by:  RHSA-2013:0123
    MD5: c2a1b8fa48ed6057b58594f18c1f7649
SHA-256: 7892239678898957bd75d40cb61a8852a77897acb0f2b8df0dbd498474556b33
OpenIPMI-perl-2.0.16-12.el5.x86_64.rpm
File outdated by:  RHSA-2013:0123
    MD5: 3c47a016baf62d4fb95775570574b22d
SHA-256: e21072d3f022ef01c9887add354bb5e5d1c790487081632b0bb3aaaf7cef2202
OpenIPMI-python-2.0.16-12.el5.x86_64.rpm
File outdated by:  RHSA-2013:0123
    MD5: d2d3b63cee2e44b3bc1aa5dc9de9714a
SHA-256: 6a14dede80317ff8b669ecbaec603a9e5d418594c21f94d310621962e3e2e249
OpenIPMI-tools-2.0.16-12.el5.x86_64.rpm
File outdated by:  RHSA-2013:0123
    MD5: 2de77aacf65f31d5e2675d6a9e5ab962
SHA-256: d826e5e7bd4d13cd7825a1ef3b5a1abb5c05328ecc68879d84e689f12e275880
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
OpenIPMI-2.0.16-12.el5.src.rpm
File outdated by:  RHSA-2013:0123
    MD5: e95b7a41562b9f0243e7e31b61996f2b
SHA-256: 30d513312b482d5db89d92d4f4b25c4e7cdeab3a2a1febfb3c28d176094829fa
 
IA-32:
OpenIPMI-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: f1d1ce6479a31fe3312848c41916e3e4
SHA-256: 93aba225dad74e81a68a03737f7af13ea2e2eec68acb2c1679c40c315226cde4
OpenIPMI-gui-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: 1561b9908e7fecc6102be821019c5810
SHA-256: 6f0bdedd7e926f802cbd2c48f62018e6926d3e192a1a5b1b72b5e34ccab0c39d
OpenIPMI-libs-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: 56f805bb5d4734bdcb6bc3c13cf26d80
SHA-256: eda3dc9478da6c04bafcf2f408919b45546142748a0fed59bb4f367a6bd68604
OpenIPMI-perl-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: 7fc93e096ccc95dddc549ad7317d5ef9
SHA-256: 46fa562ff9d0f2b43c9558ec22ce57a3f94a01e08091385cfeb7124e405a55e7
OpenIPMI-python-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: f10f9767beb7f5a8bfa7055ce546161a
SHA-256: 9563f8c0263ad87034c431925e147ea7cd9e621619eb7f7f73024d46f0a1606b
OpenIPMI-tools-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: 971b8b9dbda68a867faa3fda1ff044d8
SHA-256: a514435d884539f74ea5f20f4314f7f3341724ecd0ab5672f7ec8cefd5b609ff
 
x86_64:
OpenIPMI-2.0.16-12.el5.x86_64.rpm
File outdated by:  RHSA-2013:0123
    MD5: f7c5e9965fd6fdd66a81ca8064ea3eeb
SHA-256: 81c0dcff5b0979c3c7b4c8ff317ae12193cdc29469ea828a4db3229aecc76f33
OpenIPMI-gui-2.0.16-12.el5.x86_64.rpm
File outdated by:  RHSA-2013:0123
    MD5: d3ffae3abedf16b24f7a020080843092
SHA-256: c0fefa04728d7a13defa7b5492ab3d2908d99c320db75762fc5e57574d6b43c7
OpenIPMI-libs-2.0.16-12.el5.i386.rpm
File outdated by:  RHSA-2013:0123
    MD5: 56f805bb5d4734bdcb6bc3c13cf26d80
SHA-256: eda3dc9478da6c04bafcf2f408919b45546142748a0fed59bb4f367a6bd68604
OpenIPMI-libs-2.0.16-12.el5.x86_64.rpm
File outdated by:  RHSA-2013:0123
    MD5: c2a1b8fa48ed6057b58594f18c1f7649
SHA-256: 7892239678898957bd75d40cb61a8852a77897acb0f2b8df0dbd498474556b33
OpenIPMI-perl-2.0.16-12.el5.x86_64.rpm
File outdated by:  RHSA-2013:0123
    MD5: 3c47a016baf62d4fb95775570574b22d
SHA-256: e21072d3f022ef01c9887add354bb5e5d1c790487081632b0bb3aaaf7cef2202
OpenIPMI-python-2.0.16-12.el5.x86_64.rpm
File outdated by:  RHSA-2013:0123
    MD5: d2d3b63cee2e44b3bc1aa5dc9de9714a
SHA-256: 6a14dede80317ff8b669ecbaec603a9e5d418594c21f94d310621962e3e2e249
OpenIPMI-tools-2.0.16-12.el5.x86_64.rpm
File outdated by:  RHSA-2013:0123
    MD5: 2de77aacf65f31d5e2675d6a9e5ab962
SHA-256: d826e5e7bd4d13cd7825a1ef3b5a1abb5c05328ecc68879d84e689f12e275880
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

659326 - ipmitool delloem powermonitor wrong values on big endian platforms
674494 - An unexpected message is outputed with -v option of ipmitool.


Keywords

IPMI, ipmitool, OpenIPMI, platform, SOL


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/