- Issued:
- 2015-05-19
- Updated:
- 2015-05-19
RHBA-2015:1017 - kernel bug fix update
Synopsis
kernel bug fix update
Type/Severity
Bug Fix Advisory
Topic
Updated kernel packages that fix several bugs are now available for Red Hat Enterprise Linux 6.5 Extended Update Support.
Description
The kernel packages contain the Linux kernel, the core of any Linux operating system.
This update fixes the following bugs:
-
When repeating a Coordinated Universal Time (UTC) value during a leap second (when the UTC time should be 23:59:60), the International Atomic Time (TAI) timescale previously stopped as the kernel NTP code incremented the TAI offset one second later than expected. A patch has been provided, which fixes the bug by incrementing the offset during the leap second itself. Now, the correct TAI is set during the leap second. (BZ#1201673)
-
When using 4th Generation Intel Core or Intel Xeo v3 Processor perf counters, such as perf or perftop, spurious Nonmaskable Interrupts (NMIs) were previously received, even under moderate load, filling the logs with NMI messages. In addition, if kdump was configured, a kernel panic occurred and a kernel dump was saved. The perf code has been fixed, and the system no longer panics in this scenario. (BZ#1204808)
-
After configuring a parent interface to disable the ARP kernel module, letting the ARP entry expire and then re-enabling it, a ping to an external IP address on the same subnet as an alias (for example, eth0:0) failed. This bug has been fixed, and when ARP is re-enabled, the ping utility now immediately triggers an ARP again, and pinging an external IP address now works as intended. (BZ#1207351)
-
Previously, the open() system call in some cases failed with an EBUSY error if the opened file was also being renamed at the same time. With this update, the kernel automatically retries open() when this failure occurs, and if the retry is not successful either, open() now fails with an ESTALE error. (BZ#1207814)
-
Due to a race condition in the build_id_cache__add_s() function, system files could be truncated. The underlying source code has been patched, and system files are no longer truncated in the aforementioned situation. (BZ#1210592)
-
Due to a code simplification in the flow_cache_flush() function, the operating system became very slow when creating or deleting IPsec tunnels. This update makes sure that flow_cache_flush() no longer interrupts every core but just the ones that have cache entries, and thus no longer slows down the system performance. (BZ#1210594)
All users are advised to upgrade to these updated packages, which fix these bugs. The system must be rebooted for this update to take effect.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/articles/11258
To install kernel packages manually, use "rpm -ivh [package]". Do not use "rpm -Uvh" as that will remove the running kernel binaries from your system. You may use "rpm -e" to remove old kernels after determining that the new kernel functions properly on your system.
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 6.5 | x86_64 |
| Red Hat Enterprise Linux for x86_64 - Extended Update Support | 6.5 | i386 |
| Red Hat Enterprise Linux for Power, big endian - Extended Update Support | 6.5 | ppc64 |
| Red Hat Enterprise Linux for IBM z Systems - Extended Update Support | 6.5 | s390x |
| Red Hat Enterprise Linux Server - TUS | 6.5 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Update Support from RHUI | 6.5 | x86_64 |
| Red Hat Enterprise Linux Server - Extended Update Support from RHUI | 6.5 | i386 |
| Red Hat Enterprise Linux Server - AUS | 6.5 | x86_64 |
| Red Hat Enterprise Linux EUS Compute Node | 6.5 | x86_64 |
Updated Packages
- python-perf-2.6.32-431.56.1.el6.s390x.rpm
- kernel-debug-debuginfo-2.6.32-431.56.1.el6.ppc64.rpm
- kernel-bootwrapper-2.6.32-431.56.1.el6.ppc64.rpm
- perf-debuginfo-2.6.32-431.56.1.el6.ppc64.rpm
- python-perf-debuginfo-2.6.32-431.56.1.el6.s390x.rpm
- kernel-abi-whitelists-2.6.32-431.56.1.el6.noarch.rpm
- kernel-debug-2.6.32-431.56.1.el6.i686.rpm
- kernel-debug-2.6.32-431.56.1.el6.ppc64.rpm
- perf-2.6.32-431.56.1.el6.i686.rpm
- python-perf-debuginfo-2.6.32-431.56.1.el6.ppc64.rpm
- kernel-2.6.32-431.56.1.el6.ppc64.rpm
- kernel-kdump-devel-2.6.32-431.56.1.el6.s390x.rpm
- kernel-debug-devel-2.6.32-431.56.1.el6.s390x.rpm
- kernel-debuginfo-2.6.32-431.56.1.el6.i686.rpm
- perf-debuginfo-2.6.32-431.56.1.el6.i686.rpm
- kernel-kdump-2.6.32-431.56.1.el6.s390x.rpm
- python-perf-2.6.32-431.56.1.el6.i686.rpm
- perf-debuginfo-2.6.32-431.56.1.el6.s390x.rpm
- kernel-devel-2.6.32-431.56.1.el6.i686.rpm
- perf-debuginfo-2.6.32-431.56.1.el6.x86_64.rpm
- python-perf-debuginfo-2.6.32-431.56.1.el6.x86_64.rpm
- kernel-doc-2.6.32-431.56.1.el6.noarch.rpm
- kernel-debuginfo-common-x86_64-2.6.32-431.56.1.el6.x86_64.rpm
- kernel-firmware-2.6.32-431.56.1.el6.noarch.rpm
- kernel-debug-debuginfo-2.6.32-431.56.1.el6.x86_64.rpm
- kernel-devel-2.6.32-431.56.1.el6.x86_64.rpm
- python-perf-2.6.32-431.56.1.el6.ppc64.rpm
- kernel-debuginfo-common-i686-2.6.32-431.56.1.el6.i686.rpm
- kernel-headers-2.6.32-431.56.1.el6.i686.rpm
- kernel-headers-2.6.32-431.56.1.el6.x86_64.rpm
- kernel-debuginfo-2.6.32-431.56.1.el6.ppc64.rpm
- kernel-debug-2.6.32-431.56.1.el6.x86_64.rpm
- kernel-2.6.32-431.56.1.el6.x86_64.rpm
- kernel-debuginfo-common-s390x-2.6.32-431.56.1.el6.s390x.rpm
- kernel-2.6.32-431.56.1.el6.src.rpm
- perf-2.6.32-431.56.1.el6.x86_64.rpm
- kernel-headers-2.6.32-431.56.1.el6.s390x.rpm
- kernel-debug-devel-2.6.32-431.56.1.el6.ppc64.rpm
- kernel-debuginfo-2.6.32-431.56.1.el6.s390x.rpm
- kernel-kdump-debuginfo-2.6.32-431.56.1.el6.s390x.rpm
- perf-2.6.32-431.56.1.el6.s390x.rpm
- python-perf-debuginfo-2.6.32-431.56.1.el6.i686.rpm
- kernel-debug-debuginfo-2.6.32-431.56.1.el6.s390x.rpm
- kernel-debuginfo-2.6.32-431.56.1.el6.x86_64.rpm
- kernel-debug-2.6.32-431.56.1.el6.s390x.rpm
- kernel-debug-devel-2.6.32-431.56.1.el6.x86_64.rpm
- kernel-devel-2.6.32-431.56.1.el6.ppc64.rpm
- python-perf-2.6.32-431.56.1.el6.x86_64.rpm
- kernel-headers-2.6.32-431.56.1.el6.ppc64.rpm
- perf-2.6.32-431.56.1.el6.ppc64.rpm
- kernel-2.6.32-431.56.1.el6.i686.rpm
- kernel-devel-2.6.32-431.56.1.el6.s390x.rpm
- kernel-2.6.32-431.56.1.el6.s390x.rpm
- kernel-debug-devel-2.6.32-431.56.1.el6.i686.rpm
- kernel-debuginfo-common-ppc64-2.6.32-431.56.1.el6.ppc64.rpm
- kernel-debug-debuginfo-2.6.32-431.56.1.el6.i686.rpm
Fixes
(none)
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.