- Issued:
- 2006-08-10
- Updated:
- 2006-08-10
RHBA-2006:0492 - Bug Fix Advisory
Synopsis
netdump bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated netdump-server and netdump packages that address two issues are now
available.
Description
The netdump server listens to the network for crashed kernels to contact
it. It then writes the oops log and a memory dump to /var/crash before
asking the crashed machine to reboot. The netdump client sets up the
kernel to send crash dumps to a remote system.
The updated netdump-server package adds a new -a (or --addr) option to
allow binding the netdump-server to a specific address.
The package README file and the netdump-server.8 man page advise the user
that the four optional netdump-server script files are run in the
foreground, blocking the netdump-server from handling any other crash or
log requests. For time-consuming tasks, then, the per-site tailored script
files should be run in the background to allow the netdump-server to continue.
All users of netdump-server should upgrade to these updated packages, which
resolve these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 177783 - netdump-server halts when running external script
- BZ - 178807 - Netdump server does not receive packets when bound to an alias address
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
netdump-0.7.16-2.src.rpm | SHA-256: 6a5ec5515d0163b66ad3f8e5a1e3e8b5af78366a4ac07920d0fad0852f443218 |
x86_64 | |
netdump-0.7.16-2.x86_64.rpm | SHA-256: 493094ecad76221ed4628d5f3de1482e6bbb55a72f7dd71cedc7b2b51b7d83eb |
netdump-0.7.16-2.x86_64.rpm | SHA-256: 493094ecad76221ed4628d5f3de1482e6bbb55a72f7dd71cedc7b2b51b7d83eb |
netdump-server-0.7.16-2.x86_64.rpm | SHA-256: 0f4338621b39a0c19543048e50bc763aef671d0bef692d800b3337d04c226cc8 |
netdump-server-0.7.16-2.x86_64.rpm | SHA-256: 0f4338621b39a0c19543048e50bc763aef671d0bef692d800b3337d04c226cc8 |
ia64 | |
netdump-0.7.16-2.ia64.rpm | SHA-256: cd8099f35299a66f16c7d12f4a500a949891391065f3f9b58890b9a2e116661c |
netdump-0.7.16-2.ia64.rpm | SHA-256: cd8099f35299a66f16c7d12f4a500a949891391065f3f9b58890b9a2e116661c |
netdump-server-0.7.16-2.ia64.rpm | SHA-256: 60f03dfd9968e54a7df209fcc493535c1def8f24d5f5304e3bbfc9069138a08e |
netdump-server-0.7.16-2.ia64.rpm | SHA-256: 60f03dfd9968e54a7df209fcc493535c1def8f24d5f5304e3bbfc9069138a08e |
i386 | |
netdump-0.7.16-2.i386.rpm | SHA-256: 0e8c472b80d4c5f98736ba548c9761c58edb32f45c36dd95a944dbd11a857dcd |
netdump-0.7.16-2.i386.rpm | SHA-256: 0e8c472b80d4c5f98736ba548c9761c58edb32f45c36dd95a944dbd11a857dcd |
netdump-server-0.7.16-2.i386.rpm | SHA-256: a7d7e519af4200de357583714266fcfc54d49be9f0603f13c8d55d3ab3e911d0 |
netdump-server-0.7.16-2.i386.rpm | SHA-256: a7d7e519af4200de357583714266fcfc54d49be9f0603f13c8d55d3ab3e911d0 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
netdump-0.7.16-2.src.rpm | SHA-256: 6a5ec5515d0163b66ad3f8e5a1e3e8b5af78366a4ac07920d0fad0852f443218 |
x86_64 | |
netdump-0.7.16-2.x86_64.rpm | SHA-256: 493094ecad76221ed4628d5f3de1482e6bbb55a72f7dd71cedc7b2b51b7d83eb |
netdump-server-0.7.16-2.x86_64.rpm | SHA-256: 0f4338621b39a0c19543048e50bc763aef671d0bef692d800b3337d04c226cc8 |
ia64 | |
netdump-0.7.16-2.ia64.rpm | SHA-256: cd8099f35299a66f16c7d12f4a500a949891391065f3f9b58890b9a2e116661c |
netdump-server-0.7.16-2.ia64.rpm | SHA-256: 60f03dfd9968e54a7df209fcc493535c1def8f24d5f5304e3bbfc9069138a08e |
i386 | |
netdump-0.7.16-2.i386.rpm | SHA-256: 0e8c472b80d4c5f98736ba548c9761c58edb32f45c36dd95a944dbd11a857dcd |
netdump-server-0.7.16-2.i386.rpm | SHA-256: a7d7e519af4200de357583714266fcfc54d49be9f0603f13c8d55d3ab3e911d0 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
netdump-0.7.16-2.src.rpm | SHA-256: 6a5ec5515d0163b66ad3f8e5a1e3e8b5af78366a4ac07920d0fad0852f443218 |
x86_64 | |
netdump-0.7.16-2.x86_64.rpm | SHA-256: 493094ecad76221ed4628d5f3de1482e6bbb55a72f7dd71cedc7b2b51b7d83eb |
netdump-server-0.7.16-2.x86_64.rpm | SHA-256: 0f4338621b39a0c19543048e50bc763aef671d0bef692d800b3337d04c226cc8 |
i386 | |
netdump-0.7.16-2.i386.rpm | SHA-256: 0e8c472b80d4c5f98736ba548c9761c58edb32f45c36dd95a944dbd11a857dcd |
netdump-server-0.7.16-2.i386.rpm | SHA-256: a7d7e519af4200de357583714266fcfc54d49be9f0603f13c8d55d3ab3e911d0 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
netdump-0.7.16-2.src.rpm | SHA-256: 6a5ec5515d0163b66ad3f8e5a1e3e8b5af78366a4ac07920d0fad0852f443218 |
s390x | |
netdump-0.7.16-2.s390x.rpm | SHA-256: 5640cef0f90978a0d34fd8e5cab30907f74e51ac4b053c955391b95ceae93356 |
netdump-server-0.7.16-2.s390x.rpm | SHA-256: fccbc9afe192767415c07cbb5ece836529b8c28a0bc6a37a46f9541456b085bf |
s390 | |
netdump-0.7.16-2.s390.rpm | SHA-256: cf647dd4476ab8d256a6e1039d649f9ea9f389acbd470652ef37a0996508940a |
netdump-server-0.7.16-2.s390.rpm | SHA-256: 169b02bea419371c6835cc5f1cb81204c2caf9937d852affdf7dbfa80882f497 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
netdump-0.7.16-2.src.rpm | SHA-256: 6a5ec5515d0163b66ad3f8e5a1e3e8b5af78366a4ac07920d0fad0852f443218 |
ppc | |
netdump-0.7.16-2.ppc.rpm | SHA-256: 27c1ab0681e0a9dfb3c5823a5cd600d5b13f214fc8cbc8b3e50d57053ced91d5 |
netdump-server-0.7.16-2.ppc.rpm | SHA-256: 405fc48d9117cd7ff4ced1bd05d13b98a44074d3b96bf7824d24fb548af4b5d3 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.