- Issued:
- 2018-07-03
- Updated:
- 2018-07-03
RHBA-2018:2124 - Bug Fix Advisory
Synopsis
kernel bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix various bugs are now available for Red Hat
Enterprise Linux 6.4 Advanced Update Support.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
This update fixes the following bugs:
- Previously, the support of the Page Table Isolation (PTI) kernel feature on the 32-bit Intel architecture kernels introduced conflicts between the kernel entry code and the kernel debugger. As a consequence, the debugger was not able to pause correctly. This update fixes the kernel entry code not to conflict with the debugger. As a result, the debugger now works correctly as before the support of PTI. (BZ#1577778)
- Previously, microcode updates on 32 and 64-bit AMD and Intel architectures were not synchronized. As a consequence, it was not possible to apply the microcode updates. This fix adds the synchronization to the microcode updates so that processors of the stated architectures receive updates at the same time. As a result, microcode updates are now synchronized. (BZ#1578302)
- The initial Speculative Store Bypass Disable (SSBD) mitigation on AMD 32 and 64-bit architecture kernels required the use of a non-architectural model-specific register (MSR) that was not supported by KVM. As a consequence, SSBD caused a fault in the boot process inside of a virtual machine (VM) guest. Subsequently, the operating system was not able to handle the fault gracefully and the kernel panicked. This update temporarily disables SSBD mitigation for the AMD 32 and 64-bit architecture kernels when running as a VM guest. As a result, the kernel no longer panics. Note that the engineering team is going to re-enable the SSBD mitigation in the future version of AMD 32 and 64-bit architecture kernels. (BZ#1582419)
Users of kernel are advised to upgrade to these updated packages, which fix
these bugs. The system must be rebooted for this update to take effect.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux Server - AUS 6.4 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server - AUS 6.4
SRPM | |
---|---|
kernel-2.6.32-358.90.1.el6.src.rpm | SHA-256: 3ab439875b2a274e62363ec199952a225a83f5d75d188db3287937859b2f6afb |
x86_64 | |
kernel-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: 430a164789937e9edadebd8cbe232ceeb4a0a6fbac635201e10ce947a232cc00 |
kernel-debug-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: d7ede84364bc8f9af4adec5c92bbcf3994862a68218d6fb32e2584fdb76eb0a3 |
kernel-debug-debuginfo-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: a960d36b592d0072565737878660d8cf9ef794aa568725232a8e1ef6882f960b |
kernel-debug-debuginfo-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: a960d36b592d0072565737878660d8cf9ef794aa568725232a8e1ef6882f960b |
kernel-debug-devel-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: 48615e9766cb6fa35385a5d175ecb1933271845b7d414fe10910885c6f4b1594 |
kernel-debuginfo-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: bf211d5961864488335394e1cebae32a0bd219a02d7b2d0ebef4137190c6b667 |
kernel-debuginfo-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: bf211d5961864488335394e1cebae32a0bd219a02d7b2d0ebef4137190c6b667 |
kernel-debuginfo-common-x86_64-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: 8ff78353a2a74acb7cefd77b7c6967fbd7d773779a667be82d12e58bcb9d1089 |
kernel-debuginfo-common-x86_64-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: 8ff78353a2a74acb7cefd77b7c6967fbd7d773779a667be82d12e58bcb9d1089 |
kernel-devel-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: 342b30b4c0650d9056bcd51a8c376bf370d39a6a6501cca1012f3f0567cc741d |
kernel-doc-2.6.32-358.90.1.el6.noarch.rpm | SHA-256: 1fc037095eee9a2bee62690793ff2133edce30aac8ccd1f892e54c01195eb9e4 |
kernel-firmware-2.6.32-358.90.1.el6.noarch.rpm | SHA-256: a79a9b0a82e9f594d06ba45cc52323427ba270da936d6c1f10c9826f27e26842 |
kernel-headers-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: 1196d6da8c7f82bd7bc98282c2423e214b614624b1adc104b9de0d1b5f8b24c3 |
perf-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: b3f797be979bb7918ed2259834fa23004b51fe581f96aaf310e0f12675d579e8 |
perf-debuginfo-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: e389d7487bcce0201be36977c6dfc777ef2ac84598161b002f51b875ed9bd6c7 |
perf-debuginfo-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: e389d7487bcce0201be36977c6dfc777ef2ac84598161b002f51b875ed9bd6c7 |
python-perf-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: 4e88b8f7a5a17c96378a07d3f870e5521b600bc48b92bba5b22a1114760e9e06 |
python-perf-debuginfo-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: d34a12c5769bee82a7ac57a67a7a8fb70b65da67436b7127d05ca25be2955b85 |
python-perf-debuginfo-2.6.32-358.90.1.el6.x86_64.rpm | SHA-256: d34a12c5769bee82a7ac57a67a7a8fb70b65da67436b7127d05ca25be2955b85 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.