- Issued:
- 2015-07-21
- Updated:
- 2015-07-21
RHBA-2015:1456 - Bug Fix Advisory
Synopsis
kernel bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix one bug are now available for Red Hat
Enterprise Linux 6.2 Advanced Update Support.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating
system.
This update fixes the following bug:
- The backlog data could previously not be consumed when the audit_log_start()
function was running even if audit_log_start() called the wait_for_auditd()
function to consume it. As only auditd could consume the backlog data,
audit_log_start() terminated unexpectedly. Consequently, the system became
unresponsive until the backlog timeout was up. With this update,
audit_log_start() no longer terminates and the system shuts down and reboots
gracefully in a timely manner. (BZ#1140488)
Users of kernel are advised to upgrade to these updated packages, which fix
these bugs. The system must be rebooted for this update to take effect.
Solution
Before applying this update, make sure all previously released errata relevant
to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server - AUS 6.2 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server - AUS 6.2
SRPM | |
---|---|
kernel-2.6.32-220.64.1.el6.src.rpm | SHA-256: 13d2d0f8c6c35c593fc1088e219a3cb2df009eb507418ec54b634bf9a6fb6199 |
x86_64 | |
kernel-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: 9ac1e634a96c2cafa52063532b7b43ddf61db618e48352be08efbb95fa3ff674 |
kernel-debug-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: 8c9076d0af2f92a579a21233ff56a4f17d14c4d150a76712720acab533ea1fe0 |
kernel-debug-debuginfo-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: c7f79b69ba6057a89566e51f686abba4229ee718c74bb33d66c3ae3f16280158 |
kernel-debug-debuginfo-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: c7f79b69ba6057a89566e51f686abba4229ee718c74bb33d66c3ae3f16280158 |
kernel-debug-devel-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: 15ef50120f2b464c608090009e0b4f57e1ba2e0583da75730d26ef95ef1e3f2d |
kernel-debuginfo-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: 50785f454cadd868d23b76cce9a8479e93282ceb10b8f27a652ca4c4c7a5936c |
kernel-debuginfo-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: 50785f454cadd868d23b76cce9a8479e93282ceb10b8f27a652ca4c4c7a5936c |
kernel-debuginfo-common-x86_64-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: 42d8468b6645f3e4bf9ae201d036e302fb26023dfad7816a1ace465e38e9f518 |
kernel-debuginfo-common-x86_64-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: 42d8468b6645f3e4bf9ae201d036e302fb26023dfad7816a1ace465e38e9f518 |
kernel-devel-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: d1838c5334290edd15f7edfa07afb3d7ecf0fc47c485eacdfaf57d61d6afcf5a |
kernel-doc-2.6.32-220.64.1.el6.noarch.rpm | SHA-256: b5ea7a247a80d8b31fd7219e1738ee833ca7b1aed7adcbbfdca8007309013e2e |
kernel-firmware-2.6.32-220.64.1.el6.noarch.rpm | SHA-256: 010823fa6bc14ef43e963408a91d880a8fa89c350a1029950c1b364a17acd825 |
kernel-headers-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: c1510d85de46def62332274abd6e28438c572478018e42599c5741c1e03d331a |
perf-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: 9e5f2c69a64e4f76d1e40cf8e1f1d0fa4b2882b11ae6b36fdc51a089cc914b61 |
perf-debuginfo-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: 705657df7e348e3fdccb2f1d1dc60de32ca3122be7b27fbcf9c4e0424c68a9f5 |
perf-debuginfo-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: 705657df7e348e3fdccb2f1d1dc60de32ca3122be7b27fbcf9c4e0424c68a9f5 |
python-perf-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: 033c7efb01413f854d47d861f390c6c7178ef719b563b723d165a6274dee672a |
python-perf-debuginfo-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: 779f2bf1df5503cab99a0f9effe060d9a791b2c737ee787841b320e6f2cc2e3b |
python-perf-debuginfo-2.6.32-220.64.1.el6.x86_64.rpm | SHA-256: 779f2bf1df5503cab99a0f9effe060d9a791b2c737ee787841b320e6f2cc2e3b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.