Skip to navigation

Bug Fix Advisory piranha bug fix update

Advisory: RHBA-2013:0065-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: RHEL Clustering (v. 5 server)

Details

Updated piranha packages that fix two bugs are now available for Red Hat
Enterprise Linux 5.

Piranha provides high-availability and load balancing services for Red Hat
Enterprise Linux. The piranha packages contains various tools to administer and
configure the Linux Virtual Server (LVS), as well as the heartbeat and failover
components. LVS is a dynamically-adjusted kernel routing mechanism that provides
load balancing, primarily for Web and FTP servers.

This update fixes the following bugs:

* Previously, the lvsd daemon did not correctly identify the existence of a new
virtual server when re-reading the configuration file. As a consequence, the
lvsd daemon could terminate unexpectedly with a segmentation fault when the
pulse service was reloaded. With this update, the lvsd daemon correctly
determines if a virtual server has been added to the configuration file when the
pulse service is reloaded. (BZ#786364)

* Previously, the lvsd daemon exited if a nanny process encountered an error as
a result of executing the ipvsadm command to add or remove a real server. If a
nanny process attempted to delete a real server that was not defined for a
virtual service, or if a nanny process attempted to add a real server that was
already defined for a virtual service, nanny encountered an error from ipvsadm
and exited abnormally. With this update, a nanny process does not exit if it
fails to add or remove a real server. (BZ#739223)

All users of piranha are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Clustering (v. 5 server)

SRPMS:
piranha-0.8.4-25.el5.src.rpm
File outdated by:  RHSA-2014:0174
    MD5: 0aceb17642b1121024b251653e425800
SHA-256: 7ccc09bb3d06d5a569d6c4abe5335956574b86e331bf9836ddff73e8fce77083
 
IA-32:
piranha-0.8.4-25.el5.i386.rpm
File outdated by:  RHSA-2014:0174
    MD5: 689e5c37682a011ea88d8b9ad5a7b95b
SHA-256: 96f04bc95e34c362f157aa17bdd9f4ce7387f42f9bf39d00acfebc30506cc3f0
piranha-debuginfo-0.8.4-25.el5.i386.rpm
File outdated by:  RHSA-2014:0174
    MD5: aa3e2596663d60e409bbfb118242410f
SHA-256: d31701e193bd0963555cbf3329284f038e572beb511a3c943f486b8c69552b9c
 
IA-64:
piranha-0.8.4-25.el5.ia64.rpm
File outdated by:  RHSA-2014:0174
    MD5: 2001afb9fb6cca52b24b58dc0e71a71f
SHA-256: dafbe199554582d01353a1e12e5c7a8a8928775ee54263b3a84f68e2ae5b6482
piranha-debuginfo-0.8.4-25.el5.ia64.rpm
File outdated by:  RHSA-2014:0174
    MD5: e02780e43fcb1695d30c358550bd5970
SHA-256: 748127712370cfbf2e32e9c413a6d9a9f6d4d996e539254dda93482fd5d54a21
 
PPC:
piranha-0.8.4-25.el5.ppc.rpm
File outdated by:  RHSA-2014:0174
    MD5: 1e37aa7ef18089580a1fe1c272215c71
SHA-256: e9797ea3a71d7e97d88c49a76d3df3a9a12e29ebf88a903bdf1a10e4451d23ea
piranha-debuginfo-0.8.4-25.el5.ppc.rpm
File outdated by:  RHSA-2014:0174
    MD5: 0387c66d03a9c29294cba7dbcc8231da
SHA-256: f25b0499609f601ea70b7af89e40743654071530f092c06924b9a5842247d22f
 
x86_64:
piranha-0.8.4-25.el5.x86_64.rpm
File outdated by:  RHSA-2014:0174
    MD5: 16308288c2dfe0ecfa351c4fa246602f
SHA-256: 4462d198b93c6872281a1f4cf5e293891da4b8b22f3cdbb9896e7296ef1216ba
piranha-debuginfo-0.8.4-25.el5.x86_64.rpm
File outdated by:  RHSA-2014:0174
    MD5: cef27b83d42719b5716d4d2f390e60a3
SHA-256: 10e0348217ad62820e341aa0bb6580d5787323fa2a46fe21538da6ff2cfe0355
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

739223 - Nanny crashes and shuts LVS down if a service is deleted using ipvsadm and then the corresponding real server goes down.



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/