- Issued:
- 2014-08-29
- Updated:
- 2014-08-29
RHBA-2014:1109 - Bug Fix Advisory
Synopsis
sysstat bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated sysstat packages that fix one bug are now available for Red Hat
Enterprise Linux 6 Extended Update Support.
Description
The sysstat packages provide the sar and iostat commands. These commands enable
system monitoring of disk, network, and other I/O activity.
This update fixes the following bug:
- The dynamic ticks kernel feature can currently make the /proc/stat file
unreliable because the stopped CPU cannot provide reliable statistics. Even
though the kernel is trying to provide the best guess, the statistics are not
always accurate. As a consequence, some sysstat commands could show overflowed
values. This update detects values going backwards in sysstat, and sysstat
commands no longer show overflowed values. (BZ#1127068)
Users of sysstat are advised to upgrade to these updated packages, which fix
this bug.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.4 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.4 ppc64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4 i386
- Red Hat Gluster Storage Server for On-premise 2.1 x86_64
- Red Hat Storage for Public Cloud (via RHUI) 2.1 x86_64
- Red Hat Enterprise Linux EUS Compute Node 6.4 x86_64
- Red Hat Enterprise Linux Server - AUS 6.4 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4
SRPM | |
---|---|
sysstat-9.0.4-20.el6_4.1.src.rpm | SHA-256: 263e21f288d22b529fcc2a07024b54f8ba426da099cff0b58f9ed73b054b8fda |
x86_64 | |
sysstat-9.0.4-20.el6_4.1.x86_64.rpm | SHA-256: e1ad14e2f9b29886662be343cffbcceab314944bedb17155c3d11df482843677 |
sysstat-debuginfo-9.0.4-20.el6_4.1.x86_64.rpm | SHA-256: 41605add260b6b15dec6ce6cb8de46fbfe55d1d5de8d4c0866be424fc5093a7c |
i386 | |
sysstat-9.0.4-20.el6_4.1.i686.rpm | SHA-256: cd1839c4cd969decd59d6e9f4db1e584fb9e7a5245793a0f248ff1dc99f8cb29 |
sysstat-debuginfo-9.0.4-20.el6_4.1.i686.rpm | SHA-256: 3da4ed3f660d6ae51d5ececbaf729500dda7113558ecf89699cedd11b974aa47 |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.4
SRPM | |
---|---|
sysstat-9.0.4-20.el6_4.1.src.rpm | SHA-256: 263e21f288d22b529fcc2a07024b54f8ba426da099cff0b58f9ed73b054b8fda |
ppc64 | |
sysstat-9.0.4-20.el6_4.1.ppc64.rpm | SHA-256: 277f95f076eb050659cb56d1cf47f28f216a63ac9283fdb93dc5e0ee8ff82e1e |
sysstat-debuginfo-9.0.4-20.el6_4.1.ppc64.rpm | SHA-256: 35dcbfe3a01da6e3783bc2a45b4f88f58de611c1f6d5ea889cf769c0105cfd65 |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4
SRPM | |
---|---|
sysstat-9.0.4-20.el6_4.1.src.rpm | SHA-256: 263e21f288d22b529fcc2a07024b54f8ba426da099cff0b58f9ed73b054b8fda |
x86_64 | |
sysstat-9.0.4-20.el6_4.1.x86_64.rpm | SHA-256: e1ad14e2f9b29886662be343cffbcceab314944bedb17155c3d11df482843677 |
sysstat-debuginfo-9.0.4-20.el6_4.1.x86_64.rpm | SHA-256: 41605add260b6b15dec6ce6cb8de46fbfe55d1d5de8d4c0866be424fc5093a7c |
i386 | |
sysstat-9.0.4-20.el6_4.1.i686.rpm | SHA-256: cd1839c4cd969decd59d6e9f4db1e584fb9e7a5245793a0f248ff1dc99f8cb29 |
sysstat-debuginfo-9.0.4-20.el6_4.1.i686.rpm | SHA-256: 3da4ed3f660d6ae51d5ececbaf729500dda7113558ecf89699cedd11b974aa47 |
Red Hat Gluster Storage Server for On-premise 2.1
SRPM | |
---|---|
sysstat-9.0.4-20.el6_4.1.src.rpm | SHA-256: 263e21f288d22b529fcc2a07024b54f8ba426da099cff0b58f9ed73b054b8fda |
x86_64 | |
sysstat-9.0.4-20.el6_4.1.x86_64.rpm | SHA-256: e1ad14e2f9b29886662be343cffbcceab314944bedb17155c3d11df482843677 |
sysstat-debuginfo-9.0.4-20.el6_4.1.x86_64.rpm | SHA-256: 41605add260b6b15dec6ce6cb8de46fbfe55d1d5de8d4c0866be424fc5093a7c |
Red Hat Storage for Public Cloud (via RHUI) 2.1
SRPM | |
---|---|
sysstat-9.0.4-20.el6_4.1.src.rpm | SHA-256: 263e21f288d22b529fcc2a07024b54f8ba426da099cff0b58f9ed73b054b8fda |
x86_64 | |
sysstat-9.0.4-20.el6_4.1.x86_64.rpm | SHA-256: e1ad14e2f9b29886662be343cffbcceab314944bedb17155c3d11df482843677 |
sysstat-debuginfo-9.0.4-20.el6_4.1.x86_64.rpm | SHA-256: 41605add260b6b15dec6ce6cb8de46fbfe55d1d5de8d4c0866be424fc5093a7c |
Red Hat Enterprise Linux EUS Compute Node 6.4
SRPM | |
---|---|
sysstat-9.0.4-20.el6_4.1.src.rpm | SHA-256: 263e21f288d22b529fcc2a07024b54f8ba426da099cff0b58f9ed73b054b8fda |
x86_64 | |
sysstat-9.0.4-20.el6_4.1.x86_64.rpm | SHA-256: e1ad14e2f9b29886662be343cffbcceab314944bedb17155c3d11df482843677 |
sysstat-debuginfo-9.0.4-20.el6_4.1.x86_64.rpm | SHA-256: 41605add260b6b15dec6ce6cb8de46fbfe55d1d5de8d4c0866be424fc5093a7c |
Red Hat Enterprise Linux Server - AUS 6.4
SRPM | |
---|---|
sysstat-9.0.4-20.el6_4.1.src.rpm | SHA-256: 263e21f288d22b529fcc2a07024b54f8ba426da099cff0b58f9ed73b054b8fda |
x86_64 | |
sysstat-9.0.4-20.el6_4.1.x86_64.rpm | SHA-256: e1ad14e2f9b29886662be343cffbcceab314944bedb17155c3d11df482843677 |
sysstat-debuginfo-9.0.4-20.el6_4.1.x86_64.rpm | SHA-256: 41605add260b6b15dec6ce6cb8de46fbfe55d1d5de8d4c0866be424fc5093a7c |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.4
SRPM | |
---|---|
sysstat-9.0.4-20.el6_4.1.src.rpm | SHA-256: 263e21f288d22b529fcc2a07024b54f8ba426da099cff0b58f9ed73b054b8fda |
s390x | |
sysstat-9.0.4-20.el6_4.1.s390x.rpm | SHA-256: df5985262cd0b8facf1059ad9a17caaa9169335d62c24e981dfb15a519f21efa |
sysstat-debuginfo-9.0.4-20.el6_4.1.s390x.rpm | SHA-256: d6ca38f9d4114bf814ddc1dfe3f51d71466a6ac361454a99f66547fce3f4cd33 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.