- Issued:
- 2010-03-30
- Updated:
- 2010-03-30
RHBA-2010:0247 - Bug Fix Advisory
Synopsis
mcelog bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated mcelog package that restricts mcelog operation on
para-virtualized guests running under the Xen hypervisor is now available.
Description
mcelog is a daemon that collects and decodes Machine Check Exception data
on AMD64- and Intel 64-based systems.
This update addresses the following issue:
- in some circumstances, mcelog can run on para-virtualized guest operating
systems (domU) running under the Xen hypervisor (dom0). This results in
near 100% cpu usage on the guest, with the mcelog process blocking all
other proccesses. This update adds a check to /etc/cron.hourly/mcelog.cron:
if the check finds it is running on a para-virtualized guest, it exits,
ensuring mcelog does not execute in such circumstances. (BZ#522827)
All mcelog users should install this this new mcelog package, which adds
the check to resolve this issue.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
Fixes
- BZ - 522827 - Hourly cron job causes high system load under Xen kernel (dom0) without XenStoreD running
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
mcelog-0.9pre-1.29.el5.src.rpm | SHA-256: 9313dd8ed645fa89b3431a1bc1b6e0b775c3bc26192afea85c29d20ee5da2996 |
x86_64 | |
mcelog-0.9pre-1.29.el5.x86_64.rpm | SHA-256: 52e344371ca40287a9fe20c0e6927d6f7319f39d6b71e5f251c3a48a73a47734 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
mcelog-0.9pre-1.29.el5.src.rpm | SHA-256: 9313dd8ed645fa89b3431a1bc1b6e0b775c3bc26192afea85c29d20ee5da2996 |
x86_64 | |
mcelog-0.9pre-1.29.el5.x86_64.rpm | SHA-256: 52e344371ca40287a9fe20c0e6927d6f7319f39d6b71e5f251c3a48a73a47734 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
mcelog-0.9pre-1.29.el5.src.rpm | SHA-256: 9313dd8ed645fa89b3431a1bc1b6e0b775c3bc26192afea85c29d20ee5da2996 |
x86_64 | |
mcelog-0.9pre-1.29.el5.x86_64.rpm | SHA-256: 52e344371ca40287a9fe20c0e6927d6f7319f39d6b71e5f251c3a48a73a47734 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
mcelog-0.9pre-1.29.el5.src.rpm | SHA-256: 9313dd8ed645fa89b3431a1bc1b6e0b775c3bc26192afea85c29d20ee5da2996 |
x86_64 | |
mcelog-0.9pre-1.29.el5.x86_64.rpm | SHA-256: 52e344371ca40287a9fe20c0e6927d6f7319f39d6b71e5f251c3a48a73a47734 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.