Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2010:0523 - Bug Fix Advisory
Issued:
2010-07-12
Updated:
2010-07-12

RHBA-2010:0523 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

crash bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated crash packages that fix various bugs are now available.

Description

crash is a self-contained tool that can be used to investigate live systems,
kernel core dumps created from the netdump, diskdump and kdump packages from Red
Hat Linux, the mcore kernel patch offered by Mission Critical Linux, or the LKCD
kernel patch.

These updated packages fix the following bugs:

  • the "bt" subcommand of the crash tool occasionally did not output the

backtrace correctly. The error appeared in x86_64 NMI-interrupted tasks which
had not yet switched their stack pointer from the user-space stack to the kernel
stack. This issue has been resolved. (BZ#601081)

  • a segmentation violation happened when running the "mach -m" command option on

x86 or x86_64 systems whose BIOS-provided e820 map contained an EFI-related
memory type value that has previously not been mapped to an E820 type. This
issue has been resolved. (BZ#601082).

  • the "kmem -s list" subcommand in crash couldn't read the kmem_cache_s.name

string. This issue has been resolved. The list now skips the list_head and only
displays the actual kmem_cache names/addresses. (BZ#601084)

  • if a ppc64 kernel was booted with "smt-enabled=off", the initial system banner

and the "sys" and "mach" commands displayed an incorrect CPU count. They have
been changed to display the number of cpus online. (BZ#601088)

  • the "bt" subcommand of crash could not resolve the stack trace when an x86

NMI-interrupted task had just entered the kernel from user-space, but had not
yet called the requested system call function. The same issue occurred when the
resumption EIP address value of a newly forked x86 task was set to the
"ret_from_fork" entry point by copy_thread(). This issue has been resolved in
both cases. (BZ#601089)

Solution

All users of crash are advised to upgrade to these updated packages, which
resolve these issues.

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 601081 - [5.5] Bt subcommand of crash occasionally does not output the backtrace normally.
  • BZ - 601082 - 'mach -m' causes segmentation fault when analysing live system
  • BZ - 601084 - "kmem -s list" sub-commands in crash utility doesn't work
  • BZ - 601088 - crash tool shows wrong CPU totality when smt=off on RHEL5.5
  • BZ - 601089 - [5.5] backtrace subcommand of crash command fails.

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
crash-4.1.2-4.el5_5.1.src.rpm SHA-256: e98748104102d9486bfe18264113a70497172e292b71d762a3e73a9a4d76c2c1
x86_64
crash-4.1.2-4.el5_5.1.x86_64.rpm SHA-256: 587a2e2bd52e7660436f5ee888ebb12d478a9f0f82fe568185713673a916949b
crash-devel-4.1.2-4.el5_5.1.i386.rpm SHA-256: 5f9214def4a63634c2e96c247a8d57bfb36ad937bb167e08f2f62c6686e9cf66
crash-devel-4.1.2-4.el5_5.1.x86_64.rpm SHA-256: 3d0b4d356fda8a277876ed45b6ca6edfd5291ef6de3edb22720145c4a63df418
ia64
crash-4.1.2-4.el5_5.1.ia64.rpm SHA-256: d0d053b52b75b4619dd27d0afd983a6f955e60b7de325ab45f0e7ce78fc75217
crash-devel-4.1.2-4.el5_5.1.ia64.rpm SHA-256: cd02dc8ded0ca6d69f1a59277685af2eb9dd0bc2328d9a5bbfb1585a8b961ba9
i386
crash-4.1.2-4.el5_5.1.i386.rpm SHA-256: 02e169667e750f8d1602f3fec8852405b8511b69d60e8defd236bdb81d4f9460
crash-devel-4.1.2-4.el5_5.1.i386.rpm SHA-256: 5f9214def4a63634c2e96c247a8d57bfb36ad937bb167e08f2f62c6686e9cf66

Red Hat Enterprise Linux Workstation 5

SRPM
crash-4.1.2-4.el5_5.1.src.rpm SHA-256: e98748104102d9486bfe18264113a70497172e292b71d762a3e73a9a4d76c2c1
x86_64
crash-4.1.2-4.el5_5.1.x86_64.rpm SHA-256: 587a2e2bd52e7660436f5ee888ebb12d478a9f0f82fe568185713673a916949b
crash-devel-4.1.2-4.el5_5.1.i386.rpm SHA-256: 5f9214def4a63634c2e96c247a8d57bfb36ad937bb167e08f2f62c6686e9cf66
crash-devel-4.1.2-4.el5_5.1.x86_64.rpm SHA-256: 3d0b4d356fda8a277876ed45b6ca6edfd5291ef6de3edb22720145c4a63df418
i386
crash-4.1.2-4.el5_5.1.i386.rpm SHA-256: 02e169667e750f8d1602f3fec8852405b8511b69d60e8defd236bdb81d4f9460
crash-devel-4.1.2-4.el5_5.1.i386.rpm SHA-256: 5f9214def4a63634c2e96c247a8d57bfb36ad937bb167e08f2f62c6686e9cf66

Red Hat Enterprise Linux Desktop 5

SRPM
crash-4.1.2-4.el5_5.1.src.rpm SHA-256: e98748104102d9486bfe18264113a70497172e292b71d762a3e73a9a4d76c2c1
x86_64
crash-4.1.2-4.el5_5.1.x86_64.rpm SHA-256: 587a2e2bd52e7660436f5ee888ebb12d478a9f0f82fe568185713673a916949b
i386
crash-4.1.2-4.el5_5.1.i386.rpm SHA-256: 02e169667e750f8d1602f3fec8852405b8511b69d60e8defd236bdb81d4f9460

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
crash-4.1.2-4.el5_5.1.src.rpm SHA-256: e98748104102d9486bfe18264113a70497172e292b71d762a3e73a9a4d76c2c1
s390x
crash-4.1.2-4.el5_5.1.s390x.rpm SHA-256: 968e241927a7121f18f568315a678168647a356594ce0b8b945c7403f3cc682c
crash-devel-4.1.2-4.el5_5.1.s390.rpm SHA-256: 0b63fa5735b37d6572174d6247a6621f84313e1da62d0e5529292adad1059463
crash-devel-4.1.2-4.el5_5.1.s390x.rpm SHA-256: 16d2eea1209f0d66975607db4f637ecca1e4523f6e292d8290527e6a90bbab16

Red Hat Enterprise Linux for Power, big endian 5

SRPM
crash-4.1.2-4.el5_5.1.src.rpm SHA-256: e98748104102d9486bfe18264113a70497172e292b71d762a3e73a9a4d76c2c1
ppc
crash-4.1.2-4.el5_5.1.ppc64.rpm SHA-256: d76cb00ca19acd7f20a238b84c6f08f7a64447e97154b004993fc44b4992b795
crash-devel-4.1.2-4.el5_5.1.ppc64.rpm SHA-256: 948b19661c6a8a8340dcdc6f4d97a55823326f84960baf0dcf8dd859952b691b

Red Hat Enterprise Linux Server from RHUI 5

SRPM
crash-4.1.2-4.el5_5.1.src.rpm SHA-256: e98748104102d9486bfe18264113a70497172e292b71d762a3e73a9a4d76c2c1
x86_64
crash-4.1.2-4.el5_5.1.x86_64.rpm SHA-256: 587a2e2bd52e7660436f5ee888ebb12d478a9f0f82fe568185713673a916949b
crash-devel-4.1.2-4.el5_5.1.i386.rpm SHA-256: 5f9214def4a63634c2e96c247a8d57bfb36ad937bb167e08f2f62c6686e9cf66
crash-devel-4.1.2-4.el5_5.1.x86_64.rpm SHA-256: 3d0b4d356fda8a277876ed45b6ca6edfd5291ef6de3edb22720145c4a63df418
i386
crash-4.1.2-4.el5_5.1.i386.rpm SHA-256: 02e169667e750f8d1602f3fec8852405b8511b69d60e8defd236bdb81d4f9460
crash-devel-4.1.2-4.el5_5.1.i386.rpm SHA-256: 5f9214def4a63634c2e96c247a8d57bfb36ad937bb167e08f2f62c6686e9cf66

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility