- Issued:
- 2018-01-23
- Updated:
- 2018-01-23
RHBA-2018:0119 - Bug Fix Advisory
Synopsis
kernel bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix one bug are now available for Red Hat
Enterprise Linux 6.5 Advanced Update Support.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
This update fixes the following bug:
- Previously, the corrupted Executable and Linkable Format (ELF) header of the /proc/vmcore ELF file caused that this file could not be read correctly. As a consequence, the kdump service terminated unexpectedly, resulting in a kernel panic. The provided patch fixes the ELF header, and kdump now succeeds as expected. (BZ#1534621)
Users of kernel are advised to upgrade to these updated packages, which fix
this bug. The system must be rebooted for this update to take effect.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux Server - AUS 6.5 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server - AUS 6.5
SRPM | |
---|---|
kernel-2.6.32-431.86.1.el6.src.rpm | SHA-256: cf0bb86c256ffdffe253057d9c74fa6d1742174cfa9cfff2784b659247773951 |
x86_64 | |
kernel-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: b4c05dde79f42444c99a2e1b137e5a3fec8c381f5b1312bfb903a5f7c4ad2e35 |
kernel-abi-whitelists-2.6.32-431.86.1.el6.noarch.rpm | SHA-256: e6a422e83eb641ba73bae9fc2d5b309ca82af7e0d77bd8de590a761d70680244 |
kernel-debug-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: d58370155bbc6d325d0d0f64ab2b91e875dbacc0343b805363c6366a0d342f84 |
kernel-debug-debuginfo-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: 8d3249429dfcc36d6ef4e958e4df5e2ea1cb0636822d15276b90d3e76ae8004a |
kernel-debug-debuginfo-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: 8d3249429dfcc36d6ef4e958e4df5e2ea1cb0636822d15276b90d3e76ae8004a |
kernel-debug-devel-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: 4a51b98d6bef502b0a8cf682a87aa19fafafc1b35efd9b33dc6ee72ae86b801f |
kernel-debuginfo-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: 175a248ca692133459adc408128036bc756693cb6e29aa271add1a5315c3fcee |
kernel-debuginfo-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: 175a248ca692133459adc408128036bc756693cb6e29aa271add1a5315c3fcee |
kernel-debuginfo-common-x86_64-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: 579b433b435a633bd595ce22e98b4474abb3dacc79cc2d77286dc3b37276c08c |
kernel-debuginfo-common-x86_64-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: 579b433b435a633bd595ce22e98b4474abb3dacc79cc2d77286dc3b37276c08c |
kernel-devel-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: d5d707486b5d9204f3664eeb448b905711ba447333467bbf95f66dd1adfbbf3e |
kernel-doc-2.6.32-431.86.1.el6.noarch.rpm | SHA-256: f0578f603339ff2dc5c7dd9841596a837c16df0407aeca7f74d97a488e06f15b |
kernel-firmware-2.6.32-431.86.1.el6.noarch.rpm | SHA-256: 386d976fc4411b4e27446b49253b9fc218dec8f787f0b09d7470c92817742311 |
kernel-headers-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: f4b616d4b36fd4be6269fce977d9ac13855b136bffe925ff581a155b3b408a87 |
perf-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: a30fb20c9679ed32c73da59b79a0635ba525c47c312a6b959d02ddcf6aa578dc |
perf-debuginfo-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: 0089b95a398613a22914f92e9d6251a28bc84cee37acbe7200ad9910c08fc740 |
perf-debuginfo-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: 0089b95a398613a22914f92e9d6251a28bc84cee37acbe7200ad9910c08fc740 |
python-perf-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: e36c8e7267ec08149a9031627362025308728196e7cae1edf3d574ccf7ebb4a6 |
python-perf-debuginfo-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: 901ba68bf2816536d40768979f533e8690d177543401d6d5bff7c47e39408f1b |
python-perf-debuginfo-2.6.32-431.86.1.el6.x86_64.rpm | SHA-256: 901ba68bf2816536d40768979f533e8690d177543401d6d5bff7c47e39408f1b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.