- Issued:
- 2019-02-19
- Updated:
- 2019-02-19
RHBA-2019:0376 - Bug Fix Advisory
Synopsis
kernel bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel packages that fix one bug are now available for Red Hat Enterprise Linux 6.5 Advanced Update Support.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
Bug Fix:
- Previously backported upstream patch caused a change in the behavior of page fault handler. As a consequence, applications compiled through GNU Compiler Collection (GCC) version 4.4.7 sometimes generated stack access exceeding the 64K limit. Running such applications subsequently triggered a segmentation fault. With this update, the 64k limit check in the page fault handler has been removed. As a result, running the affected applications no longer triggers the segmentation fault in the described scenario.
Note that removing the limit check does not impact the integrity of the kernel itself. (BZ#1668786)
Users of kernel are advised to upgrade to these updated packages, which fix this bug.
Solution
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
Affected Products
- Red Hat Enterprise Linux Server - AUS 6.5 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server - AUS 6.5
SRPM | |
---|---|
kernel-2.6.32-431.94.1.el6.src.rpm | SHA-256: adfd385f90c3980fa01dc7aff2e89e1f84a713b9f85f5d3d89c6db16eb2109d8 |
x86_64 | |
kernel-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: fe45c35b6d91316fc2d4c0b61473769c458961ac8940182db588afe1b06b5b7b |
kernel-abi-whitelists-2.6.32-431.94.1.el6.noarch.rpm | SHA-256: 1d67609dba782d42b30be5053be3a3a12dfc92829f747c97f0d68bc5eabb981d |
kernel-debug-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: 014dbbd8ab931e6fe4b2084e73103888f261602f0a73f597f1d9dd1414ecb81c |
kernel-debug-debuginfo-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: c8e64f3458ab86e92eda7d219839f1779b35e65754f3d33865465f3aa7005c7e |
kernel-debug-debuginfo-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: c8e64f3458ab86e92eda7d219839f1779b35e65754f3d33865465f3aa7005c7e |
kernel-debug-devel-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: ac9ae5255d22a616f9339976f51bbfa7a74c24bff29460928a596cc41b24dc01 |
kernel-debuginfo-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: 73ef559613c30eea0db1703b009443430bcccdc44436f6a4979b96b2a0f5bd2c |
kernel-debuginfo-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: 73ef559613c30eea0db1703b009443430bcccdc44436f6a4979b96b2a0f5bd2c |
kernel-debuginfo-common-x86_64-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: 0a5ec1446c96c34c4cec5982923095847851d43bb30e3998b221d98a564a5cd3 |
kernel-debuginfo-common-x86_64-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: 0a5ec1446c96c34c4cec5982923095847851d43bb30e3998b221d98a564a5cd3 |
kernel-devel-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: 10e1c20674bd4f8fbeafc531b22f9f2591d32feccbd1dbec1e6de482f9a9b85d |
kernel-doc-2.6.32-431.94.1.el6.noarch.rpm | SHA-256: 898dc739228ff7cf52a8e5eaa1d259a4737ecf23ec468fa4dcdb6d6e6c33db0f |
kernel-firmware-2.6.32-431.94.1.el6.noarch.rpm | SHA-256: 784cf2e3360fd5ee6652a3240674f343b7ce0a1c2e78ab61f3d87582be4f005b |
kernel-headers-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: 64c9eca8c3f3c45d02a55a0712013beb702f4ad88967c70500267c34e2601536 |
perf-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: 333a3226b66cab17aa779e4dcbe28ba3a83a8f1955f6a81c1a9587fe7c8dbfca |
perf-debuginfo-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: c03dfd948e3ff1638702978317d2329a7cd18036a15c890b616434399f194b1f |
perf-debuginfo-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: c03dfd948e3ff1638702978317d2329a7cd18036a15c890b616434399f194b1f |
python-perf-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: 647337f7da74b896961d50b35b24ecfa67fe41d92a565c37a47aed4930fa9975 |
python-perf-debuginfo-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: 7c8969974ceb038cc1a66ba24056a5a158623ef4f07d097951e58d7508c944e2 |
python-perf-debuginfo-2.6.32-431.94.1.el6.x86_64.rpm | SHA-256: 7c8969974ceb038cc1a66ba24056a5a158623ef4f07d097951e58d7508c944e2 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.