Skip to navigation

Bug Fix Advisory kexec-tools bug fix update

Advisory: RHBA-2012:1554-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-12-10
Last updated on: 2012-12-10
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated kexec-tools packages that fix one bug are now available for Red Hat
Enterprise Linux 6.

The kexec-tools packages contain the /sbin/kexec binary and utilities that
together form the user-space component of the kernel's kexec feature. The
/sbin/kexec binary facilitates a new kernel to boot using the kernel's kexec
feature either on a normal or a panic reboot. The kexec fastboot mechanism
allows booting a Linux kernel from the context of an already running kernel.

This update fixes the following bug:

* Previously, the kexec utility incorrectly recognized the Xen DomU (HVM) guest
as the Xen Dom0 management domain. Consequently, the kernel terminated
unexpectedly and the kdump utility generated the vmcore file with no NT_PRSTATUS
notes. The crash also led to NULL pointer dereference. With this update, kexec
collects positions and sizes of NT_PRSTATUS from
/sys/devices/system/cpu/cpuN/crash_notes on Xen DomU and from /proc/iomem on Xen
Dom0. As a result, the crashes no longer occur. (BZ#878371)

All users of kexec-tools are advised to upgrade to these updated packages, which
fix this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
kexec-tools-2.0.0-245.el6_3.1.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: c4ed98d12a223e12faf16e00ccba6bdb
SHA-256: 905ae30c0b7d3a108b1b488a75fb28af67e6370a107ea3ae13bb17b347c70137
 
IA-32:
kexec-tools-2.0.0-245.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 23128f4d48433c98466ebea4d46b54d6
SHA-256: bcf32b848fd88bba9c81e48cec414ecc08adde202459f462450bd3508072485c
kexec-tools-debuginfo-2.0.0-245.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 757406dfc53b808930532014e10758b7
SHA-256: e5beff30002c0cd838a6e89d3904e464c0efa5146e5d2143110a323a5cd3b6c1
 
x86_64:
kexec-tools-2.0.0-245.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 24655cca3108118a41fd073292881089
SHA-256: 95df896424fdab96964cfbecaf20398a260d9c97789ac33af62ff57cb144f1f7
kexec-tools-debuginfo-2.0.0-245.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: a69e324156c95db0975ec3c8e7d5e320
SHA-256: e93df41c2d5494bf7eb4d42624b4b72c0a8c442a73e3529c848be8ebb1eb18a2
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
kexec-tools-2.0.0-245.el6_3.1.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: c4ed98d12a223e12faf16e00ccba6bdb
SHA-256: 905ae30c0b7d3a108b1b488a75fb28af67e6370a107ea3ae13bb17b347c70137
 
x86_64:
kexec-tools-2.0.0-245.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 24655cca3108118a41fd073292881089
SHA-256: 95df896424fdab96964cfbecaf20398a260d9c97789ac33af62ff57cb144f1f7
kexec-tools-debuginfo-2.0.0-245.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: a69e324156c95db0975ec3c8e7d5e320
SHA-256: e93df41c2d5494bf7eb4d42624b4b72c0a8c442a73e3529c848be8ebb1eb18a2
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
kexec-tools-2.0.0-245.el6_3.1.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: c4ed98d12a223e12faf16e00ccba6bdb
SHA-256: 905ae30c0b7d3a108b1b488a75fb28af67e6370a107ea3ae13bb17b347c70137
 
IA-32:
kexec-tools-2.0.0-245.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 23128f4d48433c98466ebea4d46b54d6
SHA-256: bcf32b848fd88bba9c81e48cec414ecc08adde202459f462450bd3508072485c
kexec-tools-debuginfo-2.0.0-245.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 757406dfc53b808930532014e10758b7
SHA-256: e5beff30002c0cd838a6e89d3904e464c0efa5146e5d2143110a323a5cd3b6c1
 
PPC:
kexec-tools-2.0.0-245.el6_3.1.ppc64.rpm
File outdated by:  RHBA-2013:1576
    MD5: a2ff7a6b7990e2f93ca7a0882dbbfe8a
SHA-256: 65561d2fa2756fcb4ac06385ffff4e38f1e048ac325e9d95e58d10c00a9cf73a
kexec-tools-debuginfo-2.0.0-245.el6_3.1.ppc64.rpm
File outdated by:  RHBA-2013:1576
    MD5: e9649c298dd9ce6011dbbe255397d988
SHA-256: c64a929a0c0147b52c960bbf9aeb9d8e4030a5c6bd1c6854aeb7d564df1d5d5c
 
s390x:
kexec-tools-2.0.0-245.el6_3.1.s390x.rpm
File outdated by:  RHBA-2013:1576
    MD5: c26a7358d7106293b931e16dd64c1969
SHA-256: d976bc3ec107c653d58631531ac5bbedf3d8b0957a5b2072f87b254389d3f5a8
kexec-tools-debuginfo-2.0.0-245.el6_3.1.s390x.rpm
File outdated by:  RHBA-2013:1576
    MD5: 93c8a6d74bb21e0d944379cc24ad6136
SHA-256: 8965d1dbab05e16cc5f059f36a7a67593aa1af1e81f4686715ba453b22709b35
 
x86_64:
kexec-tools-2.0.0-245.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 24655cca3108118a41fd073292881089
SHA-256: 95df896424fdab96964cfbecaf20398a260d9c97789ac33af62ff57cb144f1f7
kexec-tools-debuginfo-2.0.0-245.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: a69e324156c95db0975ec3c8e7d5e320
SHA-256: e93df41c2d5494bf7eb4d42624b4b72c0a8c442a73e3529c848be8ebb1eb18a2
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
kexec-tools-2.0.0-245.el6_3.1.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: c4ed98d12a223e12faf16e00ccba6bdb
SHA-256: 905ae30c0b7d3a108b1b488a75fb28af67e6370a107ea3ae13bb17b347c70137
 
IA-32:
kexec-tools-2.0.0-245.el6_3.1.i686.rpm     MD5: 23128f4d48433c98466ebea4d46b54d6
SHA-256: bcf32b848fd88bba9c81e48cec414ecc08adde202459f462450bd3508072485c
kexec-tools-debuginfo-2.0.0-245.el6_3.1.i686.rpm     MD5: 757406dfc53b808930532014e10758b7
SHA-256: e5beff30002c0cd838a6e89d3904e464c0efa5146e5d2143110a323a5cd3b6c1
 
PPC:
kexec-tools-2.0.0-245.el6_3.1.ppc64.rpm     MD5: a2ff7a6b7990e2f93ca7a0882dbbfe8a
SHA-256: 65561d2fa2756fcb4ac06385ffff4e38f1e048ac325e9d95e58d10c00a9cf73a
kexec-tools-debuginfo-2.0.0-245.el6_3.1.ppc64.rpm     MD5: e9649c298dd9ce6011dbbe255397d988
SHA-256: c64a929a0c0147b52c960bbf9aeb9d8e4030a5c6bd1c6854aeb7d564df1d5d5c
 
s390x:
kexec-tools-2.0.0-245.el6_3.1.s390x.rpm     MD5: c26a7358d7106293b931e16dd64c1969
SHA-256: d976bc3ec107c653d58631531ac5bbedf3d8b0957a5b2072f87b254389d3f5a8
kexec-tools-debuginfo-2.0.0-245.el6_3.1.s390x.rpm     MD5: 93c8a6d74bb21e0d944379cc24ad6136
SHA-256: 8965d1dbab05e16cc5f059f36a7a67593aa1af1e81f4686715ba453b22709b35
 
x86_64:
kexec-tools-2.0.0-245.el6_3.1.x86_64.rpm     MD5: 24655cca3108118a41fd073292881089
SHA-256: 95df896424fdab96964cfbecaf20398a260d9c97789ac33af62ff57cb144f1f7
kexec-tools-debuginfo-2.0.0-245.el6_3.1.x86_64.rpm     MD5: a69e324156c95db0975ec3c8e7d5e320
SHA-256: e93df41c2d5494bf7eb4d42624b4b72c0a8c442a73e3529c848be8ebb1eb18a2
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
kexec-tools-2.0.0-245.el6_3.1.src.rpm
File outdated by:  RHBA-2013:1576
    MD5: c4ed98d12a223e12faf16e00ccba6bdb
SHA-256: 905ae30c0b7d3a108b1b488a75fb28af67e6370a107ea3ae13bb17b347c70137
 
IA-32:
kexec-tools-2.0.0-245.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 23128f4d48433c98466ebea4d46b54d6
SHA-256: bcf32b848fd88bba9c81e48cec414ecc08adde202459f462450bd3508072485c
kexec-tools-debuginfo-2.0.0-245.el6_3.1.i686.rpm
File outdated by:  RHBA-2013:1576
    MD5: 757406dfc53b808930532014e10758b7
SHA-256: e5beff30002c0cd838a6e89d3904e464c0efa5146e5d2143110a323a5cd3b6c1
 
x86_64:
kexec-tools-2.0.0-245.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: 24655cca3108118a41fd073292881089
SHA-256: 95df896424fdab96964cfbecaf20398a260d9c97789ac33af62ff57cb144f1f7
kexec-tools-debuginfo-2.0.0-245.el6_3.1.x86_64.rpm
File outdated by:  RHBA-2013:1576
    MD5: a69e324156c95db0975ec3c8e7d5e320
SHA-256: e93df41c2d5494bf7eb4d42624b4b72c0a8c442a73e3529c848be8ebb1eb18a2
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/