- Issued:
- 2022-10-18
- Updated:
- 2022-10-18
RHBA-2022:6987 - Bug Fix Advisory
Synopsis
stalld bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An update for stalld is now available for Red Hat Enterprise Linux 8.4 Extended Update Support.
Description
The stalld program monitors the set of system threads, looking for threads that are ready-to-run but have not been given processor time for some threshold period. When a starving thread is found, it is given a temporary boost using the SCHED_DEADLINE policy. The default is to allow 10 microseconds of runtime for 1 second of clock time.
Bug Fix(es) and Enhancement(s):
- Stalld is running in unconfined_service_t type. (BZ#2126496)
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4 x86_64
- Red Hat Enterprise Linux Server - AUS 8.4 x86_64
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4 s390x
- Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4 ppc64le
- Red Hat Enterprise Linux Server - TUS 8.4 x86_64
- Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4 aarch64
- Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4 ppc64le
- Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4 x86_64
Fixes
- BZ - 2126496 - Stalld is running in unconfined_service_t type [rhel-8.4.0.z]
CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 8.4
SRPM | |
---|---|
stalld-1.15-3.el8_4.src.rpm | SHA-256: 00fc6f1a19e9b9dff48fb878bcb4717579c6d3c38b2adba622ba6549d11a7f8a |
x86_64 | |
stalld-1.15-3.el8_4.x86_64.rpm | SHA-256: c3e19e3a5581639cf20748c8ff9ce6e3d2a3d1bf67f0a76483c466cc3d138d47 |
stalld-debuginfo-1.15-3.el8_4.x86_64.rpm | SHA-256: 83777da304890699b536e021da3e7c645fe0af681f28fd775202c0d355709841 |
stalld-debugsource-1.15-3.el8_4.x86_64.rpm | SHA-256: 58843f19d4606f6bbc1640407ac8831c113607e71b1dfcf0cfe4c88b0a55fc81 |
Red Hat Enterprise Linux Server - AUS 8.4
SRPM | |
---|---|
stalld-1.15-3.el8_4.src.rpm | SHA-256: 00fc6f1a19e9b9dff48fb878bcb4717579c6d3c38b2adba622ba6549d11a7f8a |
x86_64 | |
stalld-1.15-3.el8_4.x86_64.rpm | SHA-256: c3e19e3a5581639cf20748c8ff9ce6e3d2a3d1bf67f0a76483c466cc3d138d47 |
stalld-debuginfo-1.15-3.el8_4.x86_64.rpm | SHA-256: 83777da304890699b536e021da3e7c645fe0af681f28fd775202c0d355709841 |
stalld-debugsource-1.15-3.el8_4.x86_64.rpm | SHA-256: 58843f19d4606f6bbc1640407ac8831c113607e71b1dfcf0cfe4c88b0a55fc81 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 8.4
SRPM | |
---|---|
stalld-1.15-3.el8_4.src.rpm | SHA-256: 00fc6f1a19e9b9dff48fb878bcb4717579c6d3c38b2adba622ba6549d11a7f8a |
s390x | |
stalld-1.15-3.el8_4.s390x.rpm | SHA-256: df25a147475665bef385423e077653328996895e265ab0622874b1074c21e406 |
stalld-debuginfo-1.15-3.el8_4.s390x.rpm | SHA-256: bf530c5ef9c5826bce1f4d484724c9b58818eb31fd82d3a29d03ac643488d11d |
stalld-debugsource-1.15-3.el8_4.s390x.rpm | SHA-256: cdabfc10eed78d2a8b0ef07b2eaf452d1c9b1662cb240cac737e42f1423075aa |
Red Hat Enterprise Linux for Power, little endian - Extended Update Support 8.4
SRPM | |
---|---|
stalld-1.15-3.el8_4.src.rpm | SHA-256: 00fc6f1a19e9b9dff48fb878bcb4717579c6d3c38b2adba622ba6549d11a7f8a |
ppc64le | |
stalld-1.15-3.el8_4.ppc64le.rpm | SHA-256: 9511244b67fedc9fe1bf4b2c8181a90cbf00ec3e408e2b51a29890493730fe92 |
stalld-debuginfo-1.15-3.el8_4.ppc64le.rpm | SHA-256: 04d1ccc43241cb6c01be93020cbbd3fc4efa21e48608f717bc7c15171cb7ae49 |
stalld-debugsource-1.15-3.el8_4.ppc64le.rpm | SHA-256: 2aa66d16960e8cacc7bb1b74fae5a97c88c67291630d0c9c0dd4bc3c42cb2f76 |
Red Hat Enterprise Linux Server - TUS 8.4
SRPM | |
---|---|
stalld-1.15-3.el8_4.src.rpm | SHA-256: 00fc6f1a19e9b9dff48fb878bcb4717579c6d3c38b2adba622ba6549d11a7f8a |
x86_64 | |
stalld-1.15-3.el8_4.x86_64.rpm | SHA-256: c3e19e3a5581639cf20748c8ff9ce6e3d2a3d1bf67f0a76483c466cc3d138d47 |
stalld-debuginfo-1.15-3.el8_4.x86_64.rpm | SHA-256: 83777da304890699b536e021da3e7c645fe0af681f28fd775202c0d355709841 |
stalld-debugsource-1.15-3.el8_4.x86_64.rpm | SHA-256: 58843f19d4606f6bbc1640407ac8831c113607e71b1dfcf0cfe4c88b0a55fc81 |
Red Hat Enterprise Linux for ARM 64 - Extended Update Support 8.4
SRPM | |
---|---|
stalld-1.15-3.el8_4.src.rpm | SHA-256: 00fc6f1a19e9b9dff48fb878bcb4717579c6d3c38b2adba622ba6549d11a7f8a |
aarch64 | |
stalld-1.15-3.el8_4.aarch64.rpm | SHA-256: 02f2c8e513381f22cbd1b1b8f04027feeb519b5ec0ce02c5a7beb34c968b1ed0 |
stalld-debuginfo-1.15-3.el8_4.aarch64.rpm | SHA-256: 088acceee894aa6c45b5f42e2c092e39bcb4f0ef102acac948b769fd03eefa65 |
stalld-debugsource-1.15-3.el8_4.aarch64.rpm | SHA-256: 7089cc22e1b1e895e50357bf785d66c18eed80cb52a0e3ec95b383a684529c99 |
Red Hat Enterprise Linux Server for Power LE - Update Services for SAP Solutions 8.4
SRPM | |
---|---|
stalld-1.15-3.el8_4.src.rpm | SHA-256: 00fc6f1a19e9b9dff48fb878bcb4717579c6d3c38b2adba622ba6549d11a7f8a |
ppc64le | |
stalld-1.15-3.el8_4.ppc64le.rpm | SHA-256: 9511244b67fedc9fe1bf4b2c8181a90cbf00ec3e408e2b51a29890493730fe92 |
stalld-debuginfo-1.15-3.el8_4.ppc64le.rpm | SHA-256: 04d1ccc43241cb6c01be93020cbbd3fc4efa21e48608f717bc7c15171cb7ae49 |
stalld-debugsource-1.15-3.el8_4.ppc64le.rpm | SHA-256: 2aa66d16960e8cacc7bb1b74fae5a97c88c67291630d0c9c0dd4bc3c42cb2f76 |
Red Hat Enterprise Linux for x86_64 - Update Services for SAP Solutions 8.4
SRPM | |
---|---|
stalld-1.15-3.el8_4.src.rpm | SHA-256: 00fc6f1a19e9b9dff48fb878bcb4717579c6d3c38b2adba622ba6549d11a7f8a |
x86_64 | |
stalld-1.15-3.el8_4.x86_64.rpm | SHA-256: c3e19e3a5581639cf20748c8ff9ce6e3d2a3d1bf67f0a76483c466cc3d138d47 |
stalld-debuginfo-1.15-3.el8_4.x86_64.rpm | SHA-256: 83777da304890699b536e021da3e7c645fe0af681f28fd775202c0d355709841 |
stalld-debugsource-1.15-3.el8_4.x86_64.rpm | SHA-256: 58843f19d4606f6bbc1640407ac8831c113607e71b1dfcf0cfe4c88b0a55fc81 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.