- Issued:
- 2016-09-20
- Updated:
- 2016-09-20
RHBA-2016:1909 - Bug Fix Advisory
Synopsis
kernel bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix one bug are now available for Red Hat Enterprise Linux 6.4 Advanced Update Support.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
This update fixes the following bug:
- Previously, the BUG_ON() signal appeared in the fs_clear_inode() function when the nfs_have_writebacks() function reported a positive value for nfs_inode->npages. As a consequence, a kernel panic occurred. This update performs a serialization by holding the inode i_lock over the check of PagePrivate and locking the request. As a result, the kernel no longer panics in the described situation. (BZ#1365159)
Users of kernel are advised to upgrade to these updated packages, which fix this bug. The system must be rebooted for this update to take effect.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server - AUS 6.4 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server - AUS 6.4
SRPM | |
---|---|
kernel-2.6.32-358.73.1.el6.src.rpm | SHA-256: ea29587004b7620d6ade3eb53f113104da2237cdc1fabc68e7d2244dd264b70c |
x86_64 | |
kernel-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: 2ff556d233ddc7e5ff05638259f378e65afe09627fec171eda4f5813d719b908 |
kernel-debug-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: b3de38a4965706e8b64654bdf5281dfd176e03687e57b463949f05e6b7e02aca |
kernel-debug-debuginfo-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: 4eb7eef30ab856d7dbba3e1b3674918735ea8af8539f21715b90ad4c98909b93 |
kernel-debug-debuginfo-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: 4eb7eef30ab856d7dbba3e1b3674918735ea8af8539f21715b90ad4c98909b93 |
kernel-debug-devel-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: 381db5d5874619904e5281c8d01dd6952cfb9f2b2883f9274b3bdabcf265a0b9 |
kernel-debuginfo-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: fd470dd7faeeeb0c54ea35f6e61107453276609ef0c8b9622be26ec012de99b0 |
kernel-debuginfo-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: fd470dd7faeeeb0c54ea35f6e61107453276609ef0c8b9622be26ec012de99b0 |
kernel-debuginfo-common-x86_64-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: f56ce4c2e05566434ed555d4c8198f9b764781009dfb4ed56689813b5b3a708e |
kernel-debuginfo-common-x86_64-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: f56ce4c2e05566434ed555d4c8198f9b764781009dfb4ed56689813b5b3a708e |
kernel-devel-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: 6a34955822dfa7ccf67a6a40b4f3f4984915671d5d53002dd7c3d5418281124d |
kernel-doc-2.6.32-358.73.1.el6.noarch.rpm | SHA-256: ffe476dc290c67e9e03015b03a15bc5b3b4458a4306caa75617917aa336bbd1e |
kernel-firmware-2.6.32-358.73.1.el6.noarch.rpm | SHA-256: e69125173af43803031383b02440a790d008b2bbb3644fd0b276e66762620be2 |
kernel-headers-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: 92ae4019376638b22a6af74222b61d1f09e0cea45e43206770611bf32709bca3 |
perf-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: 60928f9b876adbead70dbe6bdcaee5883092e4a23d20710ee480b46b8c659f08 |
perf-debuginfo-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: 112e9e289a579be3cb224193ebfbf7b561aa4e0b728c8b1a0a2f745e5b3cf9ba |
perf-debuginfo-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: 112e9e289a579be3cb224193ebfbf7b561aa4e0b728c8b1a0a2f745e5b3cf9ba |
python-perf-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: 93117ef185103a7b1b550468a152cbc4afb0bf5ca89cede6b30f367834bdef55 |
python-perf-debuginfo-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: ee71219e7594a03a0fbac73649dae5705651420e4553c802d27b64cbbdfa5903 |
python-perf-debuginfo-2.6.32-358.73.1.el6.x86_64.rpm | SHA-256: ee71219e7594a03a0fbac73649dae5705651420e4553c802d27b64cbbdfa5903 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.