Skip to navigation

Bug Fix Advisory piranha bug fix update

Advisory: RHBA-2013:0262-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-02-18
Last updated on: 2013-02-18
Affected Products: RHEL Clustering (v. 5 server)
RHEL Clustering EUS (v. 5.9.z server)
RHEL Clustering Long Life (v. 5.9 server)

Details

Updated piranha packages are now available for Red Hat Enterprise Linux 5
Extended Update Support.

Piranha provides high-availability and load balancing services for Red Hat
Enterprise Linux. The piranha packages contain various tools to administer and
configure the Linux Virtual Server (LVS), as well as the heartbeat and failover
components. LVS is a dynamically-adjusted kernel routing mechanism that provides
load balancing, primarily for Web and FTP servers.

This update fixes the following bug:

* Previously, the pulse daemon did not correctly detect when the lvsd daemon had
been terminated. As a result, the pulse daemon did not trigger a failover. With
this update, the pulse daemon correctly detects when lvsd has been terminated
and, if a backup director is configured and active, will result in a failover.
(BZ#911287)

All users of piranha are advised to upgrade to these updated packages, which
fixes this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Clustering (v. 5 server)

SRPMS:
piranha-0.8.4-25.el5_9.1.src.rpm
File outdated by:  RHSA-2014:0174
    MD5: 3912e18e524444b2a13ad77a2a06be5b
SHA-256: fa368d4142675c07ceaeeab1e15b34f5d11ac85bef5f5015b022280b2b6756dc
 
IA-32:
piranha-0.8.4-25.el5_9.1.i386.rpm
File outdated by:  RHSA-2014:0174
    MD5: 1081ae1f2ce3bf419a3ef89b40bf5891
SHA-256: 814021dd409868fade974b0ef9d2ec8447939eb990b60b8c1e180345a66977dd
piranha-debuginfo-0.8.4-25.el5_9.1.i386.rpm
File outdated by:  RHSA-2014:0174
    MD5: db0a333d077dba0c6fb1a95273b67da1
SHA-256: 9d3ea73531785bbc0b7c7bae29738c89295118ebe4afb2ab2fc80f66bf551b32
 
IA-64:
piranha-0.8.4-25.el5_9.1.ia64.rpm
File outdated by:  RHSA-2014:0174
    MD5: 755a568803a3e668c944fb459124b94f
SHA-256: 653db7dfb464310f235cabe8f32b51f324ecc12b5fed6ad9beb86d5ece342bd1
piranha-debuginfo-0.8.4-25.el5_9.1.ia64.rpm
File outdated by:  RHSA-2014:0174
    MD5: 82eb83d64b805c2502dbbed29bdfcb0f
SHA-256: 6d1ec23ceb69ac0501e12808036822d0c8c1c11db99a7dcbd812d309a086a64c
 
PPC:
piranha-0.8.4-25.el5_9.1.ppc.rpm
File outdated by:  RHSA-2014:0174
    MD5: 4cc2a2a7098187b237f0c06a1a43ad20
SHA-256: 6649b646632de2ad13d9145e26f9bb3eb837a5b4e11897317e0494acf172f874
piranha-debuginfo-0.8.4-25.el5_9.1.ppc.rpm
File outdated by:  RHSA-2014:0174
    MD5: 802aa1ecdcab4000956264124b54340e
SHA-256: 85882bd3734a5ebf2971423b2ae20ab8a5739c42c4a9ffdf0f56fe84b6ac402b
 
x86_64:
piranha-0.8.4-25.el5_9.1.x86_64.rpm
File outdated by:  RHSA-2014:0174
    MD5: 77a35a0e9baa450e0613c9137d7d47a2
SHA-256: c0e1b66d37df3efc9c4f26fd6f976580b4012ee52f411b1dddf7f93b678a182f
piranha-debuginfo-0.8.4-25.el5_9.1.x86_64.rpm
File outdated by:  RHSA-2014:0174
    MD5: 500238bc0ed3dfaa7b2dddf046483843
SHA-256: 026b914c2b26234547f778ba90bca302307e253924c91051771d4086015e4019
 
RHEL Clustering EUS (v. 5.9.z server)

SRPMS:
piranha-0.8.4-25.el5_9.1.src.rpm
File outdated by:  RHSA-2014:0174
    MD5: 3912e18e524444b2a13ad77a2a06be5b
SHA-256: fa368d4142675c07ceaeeab1e15b34f5d11ac85bef5f5015b022280b2b6756dc
 
IA-32:
piranha-0.8.4-25.el5_9.1.i386.rpm     MD5: 1081ae1f2ce3bf419a3ef89b40bf5891
SHA-256: 814021dd409868fade974b0ef9d2ec8447939eb990b60b8c1e180345a66977dd
piranha-debuginfo-0.8.4-25.el5_9.1.i386.rpm     MD5: db0a333d077dba0c6fb1a95273b67da1
SHA-256: 9d3ea73531785bbc0b7c7bae29738c89295118ebe4afb2ab2fc80f66bf551b32
 
IA-64:
piranha-0.8.4-25.el5_9.1.ia64.rpm     MD5: 755a568803a3e668c944fb459124b94f
SHA-256: 653db7dfb464310f235cabe8f32b51f324ecc12b5fed6ad9beb86d5ece342bd1
piranha-debuginfo-0.8.4-25.el5_9.1.ia64.rpm     MD5: 82eb83d64b805c2502dbbed29bdfcb0f
SHA-256: 6d1ec23ceb69ac0501e12808036822d0c8c1c11db99a7dcbd812d309a086a64c
 
PPC:
piranha-0.8.4-25.el5_9.1.ppc.rpm     MD5: 4cc2a2a7098187b237f0c06a1a43ad20
SHA-256: 6649b646632de2ad13d9145e26f9bb3eb837a5b4e11897317e0494acf172f874
piranha-debuginfo-0.8.4-25.el5_9.1.ppc.rpm     MD5: 802aa1ecdcab4000956264124b54340e
SHA-256: 85882bd3734a5ebf2971423b2ae20ab8a5739c42c4a9ffdf0f56fe84b6ac402b
 
x86_64:
piranha-0.8.4-25.el5_9.1.x86_64.rpm     MD5: 77a35a0e9baa450e0613c9137d7d47a2
SHA-256: c0e1b66d37df3efc9c4f26fd6f976580b4012ee52f411b1dddf7f93b678a182f
piranha-debuginfo-0.8.4-25.el5_9.1.x86_64.rpm     MD5: 500238bc0ed3dfaa7b2dddf046483843
SHA-256: 026b914c2b26234547f778ba90bca302307e253924c91051771d4086015e4019
 
RHEL Clustering Long Life (v. 5.9 server)

SRPMS:
piranha-0.8.4-25.el5_9.1.src.rpm
File outdated by:  RHSA-2014:0174
    MD5: 3912e18e524444b2a13ad77a2a06be5b
SHA-256: fa368d4142675c07ceaeeab1e15b34f5d11ac85bef5f5015b022280b2b6756dc
 
IA-32:
piranha-0.8.4-25.el5_9.1.i386.rpm     MD5: 1081ae1f2ce3bf419a3ef89b40bf5891
SHA-256: 814021dd409868fade974b0ef9d2ec8447939eb990b60b8c1e180345a66977dd
piranha-debuginfo-0.8.4-25.el5_9.1.i386.rpm     MD5: db0a333d077dba0c6fb1a95273b67da1
SHA-256: 9d3ea73531785bbc0b7c7bae29738c89295118ebe4afb2ab2fc80f66bf551b32
 
IA-64:
piranha-0.8.4-25.el5_9.1.ia64.rpm     MD5: 755a568803a3e668c944fb459124b94f
SHA-256: 653db7dfb464310f235cabe8f32b51f324ecc12b5fed6ad9beb86d5ece342bd1
piranha-debuginfo-0.8.4-25.el5_9.1.ia64.rpm     MD5: 82eb83d64b805c2502dbbed29bdfcb0f
SHA-256: 6d1ec23ceb69ac0501e12808036822d0c8c1c11db99a7dcbd812d309a086a64c
 
x86_64:
piranha-0.8.4-25.el5_9.1.x86_64.rpm     MD5: 77a35a0e9baa450e0613c9137d7d47a2
SHA-256: c0e1b66d37df3efc9c4f26fd6f976580b4012ee52f411b1dddf7f93b678a182f
piranha-debuginfo-0.8.4-25.el5_9.1.x86_64.rpm     MD5: 500238bc0ed3dfaa7b2dddf046483843
SHA-256: 026b914c2b26234547f778ba90bca302307e253924c91051771d4086015e4019
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/