- Issued:
- 2014-11-11
- Updated:
- 2014-11-11
RHBA-2014:1829 - Bug Fix Advisory
Synopsis
kexec-tools bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kexec-tools packages that fix one bug are now available for Red Hat
Enterprise Linux 6.4 Extended Update Support.
Description
The kexec-tools packages contain the /sbin/kexec binary and utilities that
together form the user-space component of the kernel's kexec feature. The
/sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec
feature either on a normal or a panic reboot. The kexec fastboot mechanism
allows booting a Linux kernel from the context of an already running kernel.
This update fixes the following bug:
- Previously, if the system had configured two or more network interfaces, where
one of the devices was configured with a default gateway, and another with a
static route to a private network, kdump ignored the non-default static route.
As a consequence, kdump failed to dump a core file over NFS or SSH because it
did not configure the route to the private network. This bug has been fixed and
now kdump successfully dumps the kernel over NFS or SSH as expected.
(BZ#1110183)
Users of kexec-tools are advised to upgrade to these updated packages, which fix
this bug.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/articles/11258
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.4 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.4 ppc64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4 i386
- Red Hat Gluster Storage Server for On-premise 2.1 x86_64
- Red Hat Storage for Public Cloud (via RHUI) 2.1 x86_64
- Red Hat Enterprise Linux EUS Compute Node 6.4 x86_64
- Red Hat Enterprise Linux Server - AUS 6.4 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4
SRPM | |
---|---|
kexec-tools-2.0.0-258.el6_4.3.src.rpm | SHA-256: b21cb7f87f4f57ccf6a7c1c9e0b6d5fbd0261d38e9ff9beef853f0f6f2e5e0b8 |
x86_64 | |
kexec-tools-2.0.0-258.el6_4.3.x86_64.rpm | SHA-256: c61d85cfc0dfd8a66bb7215ef36a94f669e594e0116c3e3276c6f4337d6ee76a |
kexec-tools-debuginfo-2.0.0-258.el6_4.3.x86_64.rpm | SHA-256: 2de7e351a8b55c8e6f21b521cff260a07612e365612c2b02cbe5c03ece9fd34a |
i386 | |
kexec-tools-2.0.0-258.el6_4.3.i686.rpm | SHA-256: fd51b7c647894be99d52efecb3c0129bbb02b043b7b91cd926abaeae4521cdd2 |
kexec-tools-debuginfo-2.0.0-258.el6_4.3.i686.rpm | SHA-256: d5b59615f121a485cfd09aab3407988989588f40636032e52fb833ffc4f07775 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.4
SRPM | |
---|---|
kexec-tools-2.0.0-258.el6_4.3.src.rpm | SHA-256: b21cb7f87f4f57ccf6a7c1c9e0b6d5fbd0261d38e9ff9beef853f0f6f2e5e0b8 |
ppc64 | |
kexec-tools-2.0.0-258.el6_4.3.ppc64.rpm | SHA-256: 289514a1520eb18036a68c66619e52f847992f1a792c83d9002446952e67c37d |
kexec-tools-debuginfo-2.0.0-258.el6_4.3.ppc64.rpm | SHA-256: f1977c9b8ad5e93d210f17af05fab4cfabddc705bbd75a01420b80816c897f43 |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4
SRPM | |
---|---|
kexec-tools-2.0.0-258.el6_4.3.src.rpm | SHA-256: b21cb7f87f4f57ccf6a7c1c9e0b6d5fbd0261d38e9ff9beef853f0f6f2e5e0b8 |
x86_64 | |
kexec-tools-2.0.0-258.el6_4.3.x86_64.rpm | SHA-256: c61d85cfc0dfd8a66bb7215ef36a94f669e594e0116c3e3276c6f4337d6ee76a |
kexec-tools-debuginfo-2.0.0-258.el6_4.3.x86_64.rpm | SHA-256: 2de7e351a8b55c8e6f21b521cff260a07612e365612c2b02cbe5c03ece9fd34a |
i386 | |
kexec-tools-2.0.0-258.el6_4.3.i686.rpm | SHA-256: fd51b7c647894be99d52efecb3c0129bbb02b043b7b91cd926abaeae4521cdd2 |
kexec-tools-debuginfo-2.0.0-258.el6_4.3.i686.rpm | SHA-256: d5b59615f121a485cfd09aab3407988989588f40636032e52fb833ffc4f07775 |
Red Hat Gluster Storage Server for On-premise 2.1
SRPM | |
---|---|
x86_64 |
Red Hat Storage for Public Cloud (via RHUI) 2.1
SRPM | |
---|---|
kexec-tools-2.0.0-258.el6_4.3.src.rpm | SHA-256: b21cb7f87f4f57ccf6a7c1c9e0b6d5fbd0261d38e9ff9beef853f0f6f2e5e0b8 |
x86_64 | |
kexec-tools-2.0.0-258.el6_4.3.x86_64.rpm | SHA-256: c61d85cfc0dfd8a66bb7215ef36a94f669e594e0116c3e3276c6f4337d6ee76a |
kexec-tools-debuginfo-2.0.0-258.el6_4.3.x86_64.rpm | SHA-256: 2de7e351a8b55c8e6f21b521cff260a07612e365612c2b02cbe5c03ece9fd34a |
Red Hat Enterprise Linux EUS Compute Node 6.4
SRPM | |
---|---|
kexec-tools-2.0.0-258.el6_4.3.src.rpm | SHA-256: b21cb7f87f4f57ccf6a7c1c9e0b6d5fbd0261d38e9ff9beef853f0f6f2e5e0b8 |
x86_64 | |
kexec-tools-2.0.0-258.el6_4.3.x86_64.rpm | SHA-256: c61d85cfc0dfd8a66bb7215ef36a94f669e594e0116c3e3276c6f4337d6ee76a |
kexec-tools-debuginfo-2.0.0-258.el6_4.3.x86_64.rpm | SHA-256: 2de7e351a8b55c8e6f21b521cff260a07612e365612c2b02cbe5c03ece9fd34a |
Red Hat Enterprise Linux Server - AUS 6.4
SRPM | |
---|---|
kexec-tools-2.0.0-258.el6_4.3.src.rpm | SHA-256: b21cb7f87f4f57ccf6a7c1c9e0b6d5fbd0261d38e9ff9beef853f0f6f2e5e0b8 |
x86_64 | |
kexec-tools-2.0.0-258.el6_4.3.x86_64.rpm | SHA-256: c61d85cfc0dfd8a66bb7215ef36a94f669e594e0116c3e3276c6f4337d6ee76a |
kexec-tools-debuginfo-2.0.0-258.el6_4.3.x86_64.rpm | SHA-256: 2de7e351a8b55c8e6f21b521cff260a07612e365612c2b02cbe5c03ece9fd34a |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.4
SRPM | |
---|---|
kexec-tools-2.0.0-258.el6_4.3.src.rpm | SHA-256: b21cb7f87f4f57ccf6a7c1c9e0b6d5fbd0261d38e9ff9beef853f0f6f2e5e0b8 |
s390x | |
kexec-tools-2.0.0-258.el6_4.3.s390x.rpm | SHA-256: 134cf1e5bc9bf13ab418318dab3e07f7012548bfa88f12190e491ab3faaeb876 |
kexec-tools-debuginfo-2.0.0-258.el6_4.3.s390x.rpm | SHA-256: 5e722ea9434a256a7dd3bd7a9114fee9ec0c75f663f3a3226cef013f53063316 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.