- Issued:
- 2018-03-13
- Updated:
- 2018-03-13
RHBA-2018:0509 - Bug Fix Advisory
Synopsis
kernel bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix two bugs are now available for Red Hat
Enterprise Linux 6.4 Advanced Update Support.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
This update fixes the following bugs:
Previously, the corrupted Executable and Linkable Format (ELF) header of the /proc/vmcore ELF file caused that this file could not be read correctly. As a consequence, the kdump service terminated unexpectedly, resulting in a kernel panic. The provided patch fixes the ELF header, and kdump now succeeds as expected. (BZ#1534617)
The Return Trampoline (Retpoline) mechanism mitigates the branch target injection, also known as the Spectre variant 2 vulnerability. With this update, Retpoline has been implemented into the Red Hat Enterprise Linux kernel. (BZ#1542848)
Users of kernel are advised to upgrade to these updated packages, which fix these bugs. The system must be rebooted for this update to take effect.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server - AUS 6.4 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server - AUS 6.4
SRPM | |
---|---|
kernel-2.6.32-358.87.1.el6.src.rpm | SHA-256: 3cf7969ca3c2fe1c8078027729911895f3dfe9db5568812f9343e20146734aa7 |
x86_64 | |
kernel-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: cfe202cd9bc4629be6073ad330aa174e7ecb5df434962b6196a19fda3ba32638 |
kernel-debug-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: 21f9e7ab969ed0b7ffd9fde12b918546e3b17201d291ea325f8d9894807f0bc1 |
kernel-debug-debuginfo-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: b11d664492d900f9098081cdeb8fdc4a7c502157ff15b7bab54e4867ef7a50c9 |
kernel-debug-debuginfo-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: b11d664492d900f9098081cdeb8fdc4a7c502157ff15b7bab54e4867ef7a50c9 |
kernel-debug-devel-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: 199e6dba5a82f617a342b96014499acc3c8120e73ee9523408aacc88df3194c2 |
kernel-debuginfo-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: 7abe573ab854bc7c8b7dac298fd59fa5f4f41ed2ebd6b254b68e8db23f5b09fa |
kernel-debuginfo-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: 7abe573ab854bc7c8b7dac298fd59fa5f4f41ed2ebd6b254b68e8db23f5b09fa |
kernel-debuginfo-common-x86_64-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: 98619a449b505d63dd746bcc279d73fa7ac6b82813a60e4a7bf3a607650ba1dd |
kernel-debuginfo-common-x86_64-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: 98619a449b505d63dd746bcc279d73fa7ac6b82813a60e4a7bf3a607650ba1dd |
kernel-devel-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: 5e83c12fee024406a95f69884689271ad626f554fb50a90740ad667ad5bf5168 |
kernel-doc-2.6.32-358.87.1.el6.noarch.rpm | SHA-256: 481bfb60ec59415768be71de969c8b6bde408b3243a9126524849fd3c16b2cb6 |
kernel-firmware-2.6.32-358.87.1.el6.noarch.rpm | SHA-256: 0275350fa2685af70d3bcece6c3df43c8d21e968a7000884b0911602322d6946 |
kernel-headers-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: f9064a402fd12891af9d8723925cf03e63c65a96916162aaaf2759520259e40f |
perf-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: f07681c9d141d5e7a96dd53db34d6f27df2617b20aaa76ead84b11a67917d5fd |
perf-debuginfo-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: 34492c7e02f16e0c5c8fa7e1ef1912172b27c10b68e7d3e8c37613617dbf5ffe |
perf-debuginfo-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: 34492c7e02f16e0c5c8fa7e1ef1912172b27c10b68e7d3e8c37613617dbf5ffe |
python-perf-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: 2bfa721a30657cb9f0940f22880b5414910c1b58a36a2edf847c4d83d6b87299 |
python-perf-debuginfo-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: 2e41ae8762837c9b16c7829daa2703aeb18a8cbd393f705e878441fb0dae40bc |
python-perf-debuginfo-2.6.32-358.87.1.el6.x86_64.rpm | SHA-256: 2e41ae8762837c9b16c7829daa2703aeb18a8cbd393f705e878441fb0dae40bc |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.