Skip to navigation

Bug Fix Advisory crash bug fix update

Advisory: RHBA-2009:0049-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2009-01-20
Last updated on: 2009-01-20
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)
Red Hat Enterprise Linux EUS (v. 5.3.z server)
Red Hat Enterprise Linux Long Life (v. 5.3 server)

Details

Updated crash packages are now available.

Crash is a self-contained tool that can be used to investigate live
systems, kernel core dumps created from the netdump, diskdump and kdump
packages from Red Hat Linux, the mcore kernel patch offered by Mission
Critical Linux, or the LKCD kernel patch.

This updated package includes the following bug fix:

* The bt command displays a task's kernel-stack backtrace. When running
this command against an x86 Xen kernel vmcore, crash did not correctly
handle the transition from the IRQ stack back to the process stack, leading
to a segmentation fault. The version of crash provided with this advisory
contains a patch that corrects this issue, allowing users to analyze a
vmcore file from a system with an x86 Xen kernel.

All users of crash should upgrade to this updated package.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
crash-4.0-7.2.3.el5_3.1.src.rpm
File outdated by:  RHBA-2013:0140
    MD5: ac5976eedd210803eedf6ae8e3557f24
 
IA-32:
crash-devel-4.0-7.2.3.el5_3.1.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: 22821ce4d648760c0de7c1afa0a8a43b
 
x86_64:
crash-devel-4.0-7.2.3.el5_3.1.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: 22821ce4d648760c0de7c1afa0a8a43b
crash-devel-4.0-7.2.3.el5_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0140
    MD5: a310d3d6e4dccf99d4b8dbc2cd83fa65
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
crash-4.0-7.2.3.el5_3.1.src.rpm
File outdated by:  RHBA-2013:0140
    MD5: ac5976eedd210803eedf6ae8e3557f24
 
IA-32:
crash-4.0-7.2.3.el5_3.1.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: 2bdd584945549f5acf3b6be94676dcd9
crash-devel-4.0-7.2.3.el5_3.1.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: 22821ce4d648760c0de7c1afa0a8a43b
 
IA-64:
crash-4.0-7.2.3.el5_3.1.ia64.rpm
File outdated by:  RHBA-2013:0140
    MD5: d28820d0dcb2b4b61e84b568c33df9be
crash-devel-4.0-7.2.3.el5_3.1.ia64.rpm
File outdated by:  RHBA-2013:0140
    MD5: b17b85f688c05cebb5e46aca2d0ee0a8
 
PPC:
crash-4.0-7.2.3.el5_3.1.ppc64.rpm
File outdated by:  RHBA-2013:0140
    MD5: 84f84636c967e2a7707faeb736c9a6dc
crash-devel-4.0-7.2.3.el5_3.1.ppc64.rpm
File outdated by:  RHBA-2013:0140
    MD5: 3bc5a6cff554fdf8737c331b663c55a3
 
s390x:
crash-4.0-7.2.3.el5_3.1.s390x.rpm
File outdated by:  RHBA-2013:0140
    MD5: fc802e2dc29be02e19967c2ec046bbbc
crash-devel-4.0-7.2.3.el5_3.1.s390.rpm
File outdated by:  RHBA-2013:0140
    MD5: 1ab199dc8e1e7610e228fa6a43cc8a4f
crash-devel-4.0-7.2.3.el5_3.1.s390x.rpm
File outdated by:  RHBA-2013:0140
    MD5: 54d5e715f9c90a601cf9e88ce92b4e37
 
x86_64:
crash-4.0-7.2.3.el5_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0140
    MD5: 7d377f9b6c18dccf782e1f903160bb3c
crash-devel-4.0-7.2.3.el5_3.1.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: 22821ce4d648760c0de7c1afa0a8a43b
crash-devel-4.0-7.2.3.el5_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0140
    MD5: a310d3d6e4dccf99d4b8dbc2cd83fa65
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
crash-4.0-7.2.3.el5_3.1.src.rpm
File outdated by:  RHBA-2013:0140
    MD5: ac5976eedd210803eedf6ae8e3557f24
 
IA-32:
crash-4.0-7.2.3.el5_3.1.i386.rpm
File outdated by:  RHBA-2013:0140
    MD5: 2bdd584945549f5acf3b6be94676dcd9
 
x86_64:
crash-4.0-7.2.3.el5_3.1.x86_64.rpm
File outdated by:  RHBA-2013:0140
    MD5: 7d377f9b6c18dccf782e1f903160bb3c
 
Red Hat Enterprise Linux EUS (v. 5.3.z server)

SRPMS:
crash-4.0-7.2.3.el5_3.1.src.rpm
File outdated by:  RHBA-2013:0140
    MD5: ac5976eedd210803eedf6ae8e3557f24
 
IA-32:
crash-4.0-7.2.3.el5_3.1.i386.rpm     MD5: 2bdd584945549f5acf3b6be94676dcd9
crash-devel-4.0-7.2.3.el5_3.1.i386.rpm     MD5: 22821ce4d648760c0de7c1afa0a8a43b
 
IA-64:
crash-4.0-7.2.3.el5_3.1.ia64.rpm     MD5: d28820d0dcb2b4b61e84b568c33df9be
crash-devel-4.0-7.2.3.el5_3.1.ia64.rpm     MD5: b17b85f688c05cebb5e46aca2d0ee0a8
 
PPC:
crash-4.0-7.2.3.el5_3.1.ppc64.rpm     MD5: 84f84636c967e2a7707faeb736c9a6dc
crash-devel-4.0-7.2.3.el5_3.1.ppc64.rpm     MD5: 3bc5a6cff554fdf8737c331b663c55a3
 
s390x:
crash-4.0-7.2.3.el5_3.1.s390x.rpm     MD5: fc802e2dc29be02e19967c2ec046bbbc
crash-devel-4.0-7.2.3.el5_3.1.s390.rpm     MD5: 1ab199dc8e1e7610e228fa6a43cc8a4f
crash-devel-4.0-7.2.3.el5_3.1.s390x.rpm     MD5: 54d5e715f9c90a601cf9e88ce92b4e37
 
x86_64:
crash-4.0-7.2.3.el5_3.1.x86_64.rpm     MD5: 7d377f9b6c18dccf782e1f903160bb3c
crash-devel-4.0-7.2.3.el5_3.1.i386.rpm     MD5: 22821ce4d648760c0de7c1afa0a8a43b
crash-devel-4.0-7.2.3.el5_3.1.x86_64.rpm     MD5: a310d3d6e4dccf99d4b8dbc2cd83fa65
 
Red Hat Enterprise Linux Long Life (v. 5.3 server)

SRPMS:
crash-4.0-7.2.3.el5_3.1.src.rpm
File outdated by:  RHBA-2013:0140
    MD5: ac5976eedd210803eedf6ae8e3557f24
 
IA-32:
crash-4.0-7.2.3.el5_3.1.i386.rpm     MD5: 2bdd584945549f5acf3b6be94676dcd9
crash-devel-4.0-7.2.3.el5_3.1.i386.rpm     MD5: 22821ce4d648760c0de7c1afa0a8a43b
 
IA-64:
crash-4.0-7.2.3.el5_3.1.ia64.rpm     MD5: d28820d0dcb2b4b61e84b568c33df9be
crash-devel-4.0-7.2.3.el5_3.1.ia64.rpm     MD5: b17b85f688c05cebb5e46aca2d0ee0a8
 
x86_64:
crash-4.0-7.2.3.el5_3.1.x86_64.rpm     MD5: 7d377f9b6c18dccf782e1f903160bb3c
crash-devel-4.0-7.2.3.el5_3.1.i386.rpm     MD5: 22821ce4d648760c0de7c1afa0a8a43b
crash-devel-4.0-7.2.3.el5_3.1.x86_64.rpm     MD5: a310d3d6e4dccf99d4b8dbc2cd83fa65
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

479810 - Segmentation fault occurred in crash bt command on RHEL5.3 Snapshot5 dom0.



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/