Updated ipmitool packages that fix one bug are now available for Red HatEnterprise Linux 6.

The ipmitool packages contain a command line utility for interfacing withdevices that support the Intelligent Platform Management Interface (IPMI)specification. IPMI is an open standard for machine health, inventory, andremote power control.This update fixes the following bug:* Previously, the ipmitool default timeout values signified a time periodwhich was too short. As a consequence, during retries, the ipmitool utilitycould terminate unexpectedly with a segmentation fault, or could produce anonsensical error message. With this update, the ipmitool options passed fromenvironment variable are parsed correctly from IPMITOOL_OPTS and IPMI_OPTSvariables, IPMITOOL_* taking precedence over IPMI_* variables. As a result,ipmitool no longer crashes in the described situation. (BZ#1147593)Users of ipmitool are advised to upgrade to these updated packages, which fixthis bug. After installing this update, the IPMI event daemon (ipmievd) will berestarted automatically.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
ipmitool-1.8.11-21.el6.src.rpm
    MD5: d8c0f448602c19d96aa7573ab48e65d4SHA-256: c6a9e9822ffa08ddde8eccf2aeb8f0a4de6080f5249cfd244499608b59462d27
 
IA-32:
ipmitool-1.8.11-21.el6.i686.rpm
    MD5: b6df18b8f10e4bb8c11dfc4846b05c79SHA-256: 23e708791d022985e8a256472bcf2383855636df06ae81e5c0e2a37dcfcbe407
ipmitool-debuginfo-1.8.11-21.el6.i686.rpm
    MD5: 0f7abffb1a69ae5b9bda256fe3a13be6SHA-256: 8f23622b0c7053dd422ed04788b7eb2e79a4b17d688d883a8fdd3d6df1d05187
 
x86_64:
ipmitool-1.8.11-21.el6.x86_64.rpm
    MD5: f32625aa5e6562007fa485a1afee5587SHA-256: 24550a1c3a87b22ad6821e2fe8313835abce5139a61873226b6655f64950eda5
ipmitool-debuginfo-1.8.11-21.el6.x86_64.rpm
    MD5: c7858245df70fc44002da228e6eef29eSHA-256: 9719b2d49efe8230b7de0e68e55eca6cd2f9416f9211b43034d628e14b49084f
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
ipmitool-1.8.11-21.el6.src.rpm
    MD5: d8c0f448602c19d96aa7573ab48e65d4SHA-256: c6a9e9822ffa08ddde8eccf2aeb8f0a4de6080f5249cfd244499608b59462d27
 
x86_64:
ipmitool-1.8.11-21.el6.x86_64.rpm
    MD5: f32625aa5e6562007fa485a1afee5587SHA-256: 24550a1c3a87b22ad6821e2fe8313835abce5139a61873226b6655f64950eda5
ipmitool-debuginfo-1.8.11-21.el6.x86_64.rpm
    MD5: c7858245df70fc44002da228e6eef29eSHA-256: 9719b2d49efe8230b7de0e68e55eca6cd2f9416f9211b43034d628e14b49084f
 
Red Hat Enterprise Linux High Availability EUS (v. 6.6.z)

SRPMS:
ipmitool-1.8.11-21.el6.src.rpm
    MD5: d8c0f448602c19d96aa7573ab48e65d4SHA-256: c6a9e9822ffa08ddde8eccf2aeb8f0a4de6080f5249cfd244499608b59462d27
 
x86_64:
ipmitool-1.8.11-21.el6.x86_64.rpm
    MD5: f32625aa5e6562007fa485a1afee5587SHA-256: 24550a1c3a87b22ad6821e2fe8313835abce5139a61873226b6655f64950eda5
ipmitool-debuginfo-1.8.11-21.el6.x86_64.rpm
    MD5: c7858245df70fc44002da228e6eef29eSHA-256: 9719b2d49efe8230b7de0e68e55eca6cd2f9416f9211b43034d628e14b49084f
 
Red Hat Enterprise Linux Load Balancer (v. 6)

SRPMS:
ipmitool-1.8.11-21.el6.src.rpm
    MD5: d8c0f448602c19d96aa7573ab48e65d4SHA-256: c6a9e9822ffa08ddde8eccf2aeb8f0a4de6080f5249cfd244499608b59462d27
 
x86_64:
ipmitool-1.8.11-21.el6.x86_64.rpm
    MD5: f32625aa5e6562007fa485a1afee5587SHA-256: 24550a1c3a87b22ad6821e2fe8313835abce5139a61873226b6655f64950eda5
ipmitool-debuginfo-1.8.11-21.el6.x86_64.rpm
    MD5: c7858245df70fc44002da228e6eef29eSHA-256: 9719b2d49efe8230b7de0e68e55eca6cd2f9416f9211b43034d628e14b49084f
 
Red Hat Enterprise Linux Resilient Storage EUS (v. 6.6.z)

SRPMS:
ipmitool-1.8.11-21.el6.src.rpm
    MD5: d8c0f448602c19d96aa7573ab48e65d4SHA-256: c6a9e9822ffa08ddde8eccf2aeb8f0a4de6080f5249cfd244499608b59462d27
 
x86_64:
ipmitool-1.8.11-21.el6.x86_64.rpm
    MD5: f32625aa5e6562007fa485a1afee5587SHA-256: 24550a1c3a87b22ad6821e2fe8313835abce5139a61873226b6655f64950eda5
ipmitool-debuginfo-1.8.11-21.el6.x86_64.rpm
    MD5: c7858245df70fc44002da228e6eef29eSHA-256: 9719b2d49efe8230b7de0e68e55eca6cd2f9416f9211b43034d628e14b49084f
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
ipmitool-1.8.11-21.el6.src.rpm
    MD5: d8c0f448602c19d96aa7573ab48e65d4SHA-256: c6a9e9822ffa08ddde8eccf2aeb8f0a4de6080f5249cfd244499608b59462d27
 
IA-32:
ipmitool-1.8.11-21.el6.i686.rpm
    MD5: b6df18b8f10e4bb8c11dfc4846b05c79SHA-256: 23e708791d022985e8a256472bcf2383855636df06ae81e5c0e2a37dcfcbe407
ipmitool-debuginfo-1.8.11-21.el6.i686.rpm
    MD5: 0f7abffb1a69ae5b9bda256fe3a13be6SHA-256: 8f23622b0c7053dd422ed04788b7eb2e79a4b17d688d883a8fdd3d6df1d05187
 
PPC:
ipmitool-1.8.11-21.el6.ppc64.rpm
    MD5: f9d2c3cfa1b3fbb7867dbec82baa7323SHA-256: b163cfb806512b24f4377b14760753ff905f178e2896192647eca3ab5cbee41d
ipmitool-debuginfo-1.8.11-21.el6.ppc64.rpm
    MD5: f1cb5b0dfc1ef490dc92085c55cf7ed5SHA-256: 499a25ef1b238af3c2bb726e4759c8dd10ad03bf9ad0adac05fd97de3a38d000
 
s390x:
ipmitool-1.8.11-21.el6.s390x.rpm
    MD5: 3b44f1247ec58283e6172ac9464431c2SHA-256: 93714f128c61afeabdce23776d897bf58869e984ffc1b6d59410fe3f3c1422bc
ipmitool-debuginfo-1.8.11-21.el6.s390x.rpm
    MD5: 46aad3ffdd649c0f393f345c8cb4fe3cSHA-256: b29984fd30ae34dd69769f2b7ef097a2cac58a1c4b9646ab0cece98fad6624ee
 
x86_64:
ipmitool-1.8.11-21.el6.x86_64.rpm
    MD5: f32625aa5e6562007fa485a1afee5587SHA-256: 24550a1c3a87b22ad6821e2fe8313835abce5139a61873226b6655f64950eda5
ipmitool-debuginfo-1.8.11-21.el6.x86_64.rpm
    MD5: c7858245df70fc44002da228e6eef29eSHA-256: 9719b2d49efe8230b7de0e68e55eca6cd2f9416f9211b43034d628e14b49084f
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
ipmitool-1.8.11-21.el6.src.rpm
    MD5: d8c0f448602c19d96aa7573ab48e65d4SHA-256: c6a9e9822ffa08ddde8eccf2aeb8f0a4de6080f5249cfd244499608b59462d27
 
IA-32:
ipmitool-1.8.11-21.el6.i686.rpm
    MD5: b6df18b8f10e4bb8c11dfc4846b05c79SHA-256: 23e708791d022985e8a256472bcf2383855636df06ae81e5c0e2a37dcfcbe407
ipmitool-debuginfo-1.8.11-21.el6.i686.rpm
    MD5: 0f7abffb1a69ae5b9bda256fe3a13be6SHA-256: 8f23622b0c7053dd422ed04788b7eb2e79a4b17d688d883a8fdd3d6df1d05187
 
PPC:
ipmitool-1.8.11-21.el6.ppc64.rpm
    MD5: f9d2c3cfa1b3fbb7867dbec82baa7323SHA-256: b163cfb806512b24f4377b14760753ff905f178e2896192647eca3ab5cbee41d
ipmitool-debuginfo-1.8.11-21.el6.ppc64.rpm
    MD5: f1cb5b0dfc1ef490dc92085c55cf7ed5SHA-256: 499a25ef1b238af3c2bb726e4759c8dd10ad03bf9ad0adac05fd97de3a38d000
 
s390x:
ipmitool-1.8.11-21.el6.s390x.rpm
    MD5: 3b44f1247ec58283e6172ac9464431c2SHA-256: 93714f128c61afeabdce23776d897bf58869e984ffc1b6d59410fe3f3c1422bc
ipmitool-debuginfo-1.8.11-21.el6.s390x.rpm
    MD5: 46aad3ffdd649c0f393f345c8cb4fe3cSHA-256: b29984fd30ae34dd69769f2b7ef097a2cac58a1c4b9646ab0cece98fad6624ee
 
x86_64:
ipmitool-1.8.11-21.el6.x86_64.rpm
    MD5: f32625aa5e6562007fa485a1afee5587SHA-256: 24550a1c3a87b22ad6821e2fe8313835abce5139a61873226b6655f64950eda5
ipmitool-debuginfo-1.8.11-21.el6.x86_64.rpm
    MD5: c7858245df70fc44002da228e6eef29eSHA-256: 9719b2d49efe8230b7de0e68e55eca6cd2f9416f9211b43034d628e14b49084f
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
ipmitool-1.8.11-21.el6.src.rpm
    MD5: d8c0f448602c19d96aa7573ab48e65d4SHA-256: c6a9e9822ffa08ddde8eccf2aeb8f0a4de6080f5249cfd244499608b59462d27
 
IA-32:
ipmitool-1.8.11-21.el6.i686.rpm
    MD5: b6df18b8f10e4bb8c11dfc4846b05c79SHA-256: 23e708791d022985e8a256472bcf2383855636df06ae81e5c0e2a37dcfcbe407
ipmitool-debuginfo-1.8.11-21.el6.i686.rpm
    MD5: 0f7abffb1a69ae5b9bda256fe3a13be6SHA-256: 8f23622b0c7053dd422ed04788b7eb2e79a4b17d688d883a8fdd3d6df1d05187
 
x86_64:
ipmitool-1.8.11-21.el6.x86_64.rpm
    MD5: f32625aa5e6562007fa485a1afee5587SHA-256: 24550a1c3a87b22ad6821e2fe8313835abce5139a61873226b6655f64950eda5
ipmitool-debuginfo-1.8.11-21.el6.x86_64.rpm
    MD5: c7858245df70fc44002da228e6eef29eSHA-256: 9719b2d49efe8230b7de0e68e55eca6cd2f9416f9211b43034d628e14b49084f
 
(The unlinked packages above are only available from the Red Hat Network)
1147593 – ipmitool default timeout values are too short

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply