- Issued:
- 2009-05-18
- Updated:
- 2009-05-18
RHBA-2009:0486 - Bug Fix Advisory
Synopsis
netdump bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated netdump package that fixes a bug is now available.
Description
The netdump server listens to the network for crashed kernels to contact it
and then writes the oops log and a memory dump to /var/crash before asking
the crashed machine to reboot.
- netdump-server was hard-coded to use port 6666 when replying to Netdump
clients. If a Netdump client was configured to use any other port (via the
LOCALPORT parameter in "/etc/sysconfig/netdump"), the initial handshake
between client and server failed and no crash information was passed from
the client to the server. With this update, netdump-server honours custom
LOCALPORT configurations on the client. Note: if there is no LOCALPORT
value in "/etc/sysconfig/netdump", the client and server still default to
port 6666.
All Netdump users should update to this updated package which fixes the
above bug.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 454703 - netdump uses hard-coded remote port for server
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
netdump-0.7.16-15.src.rpm | SHA-256: 5936b4debe08738a7d057e97cc450bca2ae87faaf0da1d516ee0587742533cd8 |
x86_64 | |
netdump-0.7.16-15.x86_64.rpm | SHA-256: f8079a3191aa92f66b0ab68897525e277b6dcbde5b683594db497240ad246393 |
netdump-0.7.16-15.x86_64.rpm | SHA-256: f8079a3191aa92f66b0ab68897525e277b6dcbde5b683594db497240ad246393 |
netdump-server-0.7.16-15.x86_64.rpm | SHA-256: 455dca062cdd00214453a5abb8607052ac499f64ae7e25de62767b96ac00595f |
netdump-server-0.7.16-15.x86_64.rpm | SHA-256: 455dca062cdd00214453a5abb8607052ac499f64ae7e25de62767b96ac00595f |
ia64 | |
netdump-0.7.16-15.ia64.rpm | SHA-256: 2c52db334a595cb5fa13c575a363e339b6b232c693cd6207574ec498f40361f4 |
netdump-0.7.16-15.ia64.rpm | SHA-256: 2c52db334a595cb5fa13c575a363e339b6b232c693cd6207574ec498f40361f4 |
netdump-server-0.7.16-15.ia64.rpm | SHA-256: 7ddbc5590115d0ddc679d68c81b844bbfd734cadd08e4266f04041d6890662e4 |
netdump-server-0.7.16-15.ia64.rpm | SHA-256: 7ddbc5590115d0ddc679d68c81b844bbfd734cadd08e4266f04041d6890662e4 |
i386 | |
netdump-0.7.16-15.i386.rpm | SHA-256: 68877b310cbc7a13e26eb2d794fe7a48ead98d8894c446556fd9dd638d5e154a |
netdump-0.7.16-15.i386.rpm | SHA-256: 68877b310cbc7a13e26eb2d794fe7a48ead98d8894c446556fd9dd638d5e154a |
netdump-server-0.7.16-15.i386.rpm | SHA-256: 32f6da63545dfbbf716c3bc1053191be80e4ba9e08f4cf5d84ae31489b9738ec |
netdump-server-0.7.16-15.i386.rpm | SHA-256: 32f6da63545dfbbf716c3bc1053191be80e4ba9e08f4cf5d84ae31489b9738ec |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
netdump-0.7.16-15.src.rpm | SHA-256: 5936b4debe08738a7d057e97cc450bca2ae87faaf0da1d516ee0587742533cd8 |
x86_64 | |
netdump-0.7.16-15.x86_64.rpm | SHA-256: f8079a3191aa92f66b0ab68897525e277b6dcbde5b683594db497240ad246393 |
netdump-server-0.7.16-15.x86_64.rpm | SHA-256: 455dca062cdd00214453a5abb8607052ac499f64ae7e25de62767b96ac00595f |
ia64 | |
netdump-0.7.16-15.ia64.rpm | SHA-256: 2c52db334a595cb5fa13c575a363e339b6b232c693cd6207574ec498f40361f4 |
netdump-server-0.7.16-15.ia64.rpm | SHA-256: 7ddbc5590115d0ddc679d68c81b844bbfd734cadd08e4266f04041d6890662e4 |
i386 | |
netdump-0.7.16-15.i386.rpm | SHA-256: 68877b310cbc7a13e26eb2d794fe7a48ead98d8894c446556fd9dd638d5e154a |
netdump-server-0.7.16-15.i386.rpm | SHA-256: 32f6da63545dfbbf716c3bc1053191be80e4ba9e08f4cf5d84ae31489b9738ec |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
netdump-0.7.16-15.src.rpm | SHA-256: 5936b4debe08738a7d057e97cc450bca2ae87faaf0da1d516ee0587742533cd8 |
x86_64 | |
netdump-0.7.16-15.x86_64.rpm | SHA-256: f8079a3191aa92f66b0ab68897525e277b6dcbde5b683594db497240ad246393 |
netdump-server-0.7.16-15.x86_64.rpm | SHA-256: 455dca062cdd00214453a5abb8607052ac499f64ae7e25de62767b96ac00595f |
i386 | |
netdump-0.7.16-15.i386.rpm | SHA-256: 68877b310cbc7a13e26eb2d794fe7a48ead98d8894c446556fd9dd638d5e154a |
netdump-server-0.7.16-15.i386.rpm | SHA-256: 32f6da63545dfbbf716c3bc1053191be80e4ba9e08f4cf5d84ae31489b9738ec |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
netdump-0.7.16-15.src.rpm | SHA-256: 5936b4debe08738a7d057e97cc450bca2ae87faaf0da1d516ee0587742533cd8 |
s390x | |
netdump-0.7.16-15.s390x.rpm | SHA-256: 42da3de5ddd2fe0e44990921a7ea444d9513b67d1853d51750633bb94f504257 |
netdump-server-0.7.16-15.s390x.rpm | SHA-256: f093777046bbee61b70eb9cf17d7b055e31ba1b3578385a7f8bd796887c85498 |
s390 | |
netdump-0.7.16-15.s390.rpm | SHA-256: 68dc947df80f42c181a496cc3974d38a6498c1f8d3cf2f3d4d87f70a251009e8 |
netdump-server-0.7.16-15.s390.rpm | SHA-256: f29bb4631ab8fa94b8b0bcdb23ffefa979a5c6170cecacf9db7a40c92ea16e5b |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
netdump-0.7.16-15.src.rpm | SHA-256: 5936b4debe08738a7d057e97cc450bca2ae87faaf0da1d516ee0587742533cd8 |
ppc | |
netdump-0.7.16-15.ppc.rpm | SHA-256: cf1b509233d5e8252ecde9a54f0385f38357ccf20b5f93225d27c17fcea10acc |
netdump-server-0.7.16-15.ppc.rpm | SHA-256: dab9341d164992b07cb9eca4ea0e3396d6a1ff710cfe7be0127aae1262ccdd4d |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.