- Issued:
- 2013-01-23
- Updated:
- 2013-01-23
RHBA-2013:0184 - kernel bug fix update
Synopsis
kernel bug fix update
Type/Severity
Bug Fix Advisory
Topic
Updated kernel packages that fix three bugs are now available for Red Hat Enterprise Linux 6 Extended Update Support.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
This update fixes the following bugs:
-
Previously, the IP over Infiniband (IPoIB) driver maintained state information about neighbors on the network by attaching it to the core network's neighbor structure. However, due to a race condition between the freeing of the core network neighbor struct and the freeing of the IPoIB network struct, a use after free condition could happen, resulting in either a kernel oops or 4 or 8 bytes of kernel memory being zeroed when it was not supposed to be. These patches decouple the IPoIB neighbor struct from the core networking stack's neighbor struct so that there is no race between the freeing of one and the freeing of the other. (BZ#880083)
-
Previously, the HP Smart Array, or hpsa, driver used target reset. However, HP Smart Array logical drives do not support target reset. Therefore, if the target reset failed, the logical drive was taken offline with a file system error. The hpsa driver has been updated to use LUN reset instead of target reset, which is supported by these drives. (BZ#884421)
-
Previously, the xdr routines in NFS version 2 and 3 conditionally updated the res->count variable. Read retry attempts after a short NFS read() call could fail to update the res->count variable, resulting in truncated read data being returned. With this update, the res->count variable is updated unconditionally, thus preventing this bug. (BZ#891563)
Users should upgrade to these updated packages, which contain backported patches to fix these bugs. The system must be rebooted for this update to take effect.
Solution
Users should upgrade to these updated packages, which contain backported patches to correct these issues. The system must be rebooted for this update to take effect.
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/knowledge/articles/11258
To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Storage | 2.0 | x86_64 |
| Red Hat Storage for Public Cloud (via RHUI) | 2.0 | x86_64 |
| Red Hat Gluster Storage Server for On-premise | 2.0 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 6.2 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 6.2 | i386 |
| Red Hat Enterprise Linux for Power, big endian - Extended Update Support | 6.2 | ppc64 |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 6.2 | s390x |
| Red Hat Enterprise Linux Server - Extended Update Support from RHUI | 6.2 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Update Support from RHUI | 6.2 | i386 |
| Red Hat Enterprise Linux Server - AUS | 6.2 | x86_64 |
Updated Packages
- python-perf-debuginfo-2.6.32-220.31.1.el6.x86_64.rpm
- kernel-debuginfo-2.6.32-220.31.1.el6.x86_64.rpm
- kernel-headers-2.6.32-220.31.1.el6.i686.rpm
- kernel-devel-2.6.32-220.31.1.el6.i686.rpm
- python-perf-2.6.32-220.31.1.el6.s390x.rpm
- kernel-debuginfo-2.6.32-220.31.1.el6.ppc64.rpm
- perf-2.6.32-220.31.1.el6.ppc64.rpm
- kernel-debuginfo-2.6.32-220.31.1.el6.s390x.rpm
- kernel-doc-2.6.32-220.31.1.el6.noarch.rpm
- kernel-firmware-2.6.32-220.31.1.el6.noarch.rpm
- kernel-headers-2.6.32-220.31.1.el6.ppc64.rpm
- kernel-debuginfo-common-s390x-2.6.32-220.31.1.el6.s390x.rpm
- kernel-debug-debuginfo-2.6.32-220.31.1.el6.x86_64.rpm
- kernel-debug-2.6.32-220.31.1.el6.s390x.rpm
- kernel-bootwrapper-2.6.32-220.31.1.el6.ppc64.rpm
- kernel-headers-2.6.32-220.31.1.el6.x86_64.rpm
- python-perf-2.6.32-220.31.1.el6.ppc64.rpm
- kernel-debug-devel-2.6.32-220.31.1.el6.s390x.rpm
- kernel-headers-2.6.32-220.31.1.el6.s390x.rpm
- perf-debuginfo-2.6.32-220.31.1.el6.ppc64.rpm
- kernel-debug-2.6.32-220.31.1.el6.x86_64.rpm
- kernel-debug-debuginfo-2.6.32-220.31.1.el6.i686.rpm
- python-perf-2.6.32-220.31.1.el6.i686.rpm
- kernel-debuginfo-common-i686-2.6.32-220.31.1.el6.i686.rpm
- python-perf-debuginfo-2.6.32-220.31.1.el6.ppc64.rpm
- perf-debuginfo-2.6.32-220.31.1.el6.x86_64.rpm
- perf-2.6.32-220.31.1.el6.x86_64.rpm
- kernel-debug-debuginfo-2.6.32-220.31.1.el6.ppc64.rpm
- kernel-debuginfo-common-ppc64-2.6.32-220.31.1.el6.ppc64.rpm
- kernel-2.6.32-220.31.1.el6.src.rpm
- kernel-2.6.32-220.31.1.el6.x86_64.rpm
- kernel-debuginfo-2.6.32-220.31.1.el6.i686.rpm
- python-perf-debuginfo-2.6.32-220.31.1.el6.s390x.rpm
- kernel-debug-2.6.32-220.31.1.el6.i686.rpm
- python-perf-2.6.32-220.31.1.el6.x86_64.rpm
- kernel-debug-devel-2.6.32-220.31.1.el6.ppc64.rpm
- kernel-2.6.32-220.31.1.el6.ppc64.rpm
- kernel-debug-2.6.32-220.31.1.el6.ppc64.rpm
- kernel-devel-2.6.32-220.31.1.el6.ppc64.rpm
- python-perf-debuginfo-2.6.32-220.31.1.el6.i686.rpm
- kernel-kdump-devel-2.6.32-220.31.1.el6.s390x.rpm
- kernel-devel-2.6.32-220.31.1.el6.s390x.rpm
- kernel-debug-devel-2.6.32-220.31.1.el6.x86_64.rpm
- perf-2.6.32-220.31.1.el6.i686.rpm
- kernel-debuginfo-common-x86_64-2.6.32-220.31.1.el6.x86_64.rpm
- kernel-2.6.32-220.31.1.el6.s390x.rpm
- perf-2.6.32-220.31.1.el6.s390x.rpm
- perf-debuginfo-2.6.32-220.31.1.el6.s390x.rpm
- kernel-kdump-2.6.32-220.31.1.el6.s390x.rpm
- kernel-kdump-debuginfo-2.6.32-220.31.1.el6.s390x.rpm
- kernel-debug-debuginfo-2.6.32-220.31.1.el6.s390x.rpm
- kernel-debug-devel-2.6.32-220.31.1.el6.i686.rpm
- perf-debuginfo-2.6.32-220.31.1.el6.i686.rpm
- kernel-devel-2.6.32-220.31.1.el6.x86_64.rpm
- kernel-2.6.32-220.31.1.el6.i686.rpm
Fixes
(none)
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.