- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2012:0262 - piranha bug fix update
Synopsis
piranha bug fix update
Type/Severity
Bug Fix Advisory
Topic
An updated piranha package that fixes two bugs and adds one enhancement is now available for Red Hat Enterprise Linux 5.
Description
Piranha provides high-availability and load balancing services for Red Hat Enterprise Linux. The piranha package contains various tools to administer and configure the Linux Virtual Server (LVS), as well as the heartbeat and failover components. LVS is a dynamically-adjusted kernel routing mechanism that provides load balancing, primarily for Web and FTP servers.
This update fixes the following bugs:
-
Previously, the piranha-gui utility reported an HTTP 414 error (Request-URI Too Long) if too many virtual servers were defined. As a consequence, when trying to edit a virtual server, the "Too many arguments in the URL" error message appeared. With this update, the number of defined virtual servers does not affect the length of the URI and error messages are no longer reported. (BZ#708035)
-
Previously, the pulse service did not correctly stop the ipvsadm sync daemon due to incorrect ipvsadm syntax. As a consequence, multiple sync daemons existed after restarting the pulse. With this update, the correct syntax is used. The pulse service now stops all the sync daemons, and exactly one master sync daemon and one backup sync daemon exist at any given time. (BZ#725367)
This update also adds the following enhancement:
- This update adds the 255.255.254.0 network mask to the piranha-gui drop-down menus. (BZ#698505)
All users of piranha are advised to upgrade to this updated package, which fixes these bugs and adds this enhancement.
Solution
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at This content is not included.https://access.redhat.com/kb/docs/DOC-11259
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux High Availability for x86_64 | 5 | x86_64 |
| Red Hat Enterprise Linux High Availability for x86_64 | 5 | ppc |
| Red Hat Enterprise Linux High Availability for x86_64 | 5 | ia64 |
| Red Hat Enterprise Linux High Availability for x86_64 | 5 | i386 |
| Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI | 5 | x86_64 |
| Red Hat Enterprise Linux High Availability (for RHEL Server) from RHUI | 5 | i386 |
Updated Packages
- piranha-0.8.4-24.el5.ppc.rpm
- piranha-0.8.4-24.el5.i386.rpm
- piranha-0.8.4-24.el5.src.rpm
- piranha-0.8.4-24.el5.ia64.rpm
- piranha-0.8.4-24.el5.x86_64.rpm
Fixes
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.