Updated crash packages that fix one bug are now available for Red Hat EnterpriseLinux 5.

The crash packages provide the core analysis suite, which is a self-containedtool that can be used to investigate live systems, kernel core dumps createdfrom the netdump, diskdump and kdump packages from Red Hat Linux, as well as themcore kernel patch offered by Mission Critical Linux, or the LKCD kernel patch.This update fixes the following bug:* Kernel CVE-2014-9322 removed the stackfault exception stack, which in turncaused the crash utility to generate incorrect backtraces for any active taskswhose backtrace started from a kernel exception stack. A patch has been providedto fix this bug, and crash now produces valid backtraces. (BZ#1192396) Users of crash are advised to upgrade to these updated packages, which fix thisbug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258RHEL Desktop Workstation (v. 5 client)

SRPMS:
crash-5.1.8-3.el5_11.src.rpm
    MD5: 4da2e6686382dcca4e58a495f5496aa5SHA-256: b66cf3cb13869ccf632916ec3bbbd83dfbb40e740edbeea1b4cd06f9a1e83799
 
IA-32:
crash-debuginfo-5.1.8-3.el5_11.i386.rpm
    MD5: fac73edc710e05ee34e67a60e339e2b8SHA-256: ad5ef7004b732cc529e902839497e659115dba02ae38c1959dd6c067f0fbb690
crash-devel-5.1.8-3.el5_11.i386.rpm
    MD5: 71a393983aa96c03a994608afef007dcSHA-256: 2af27959874471ea5ea7a30c8c95cea6a6fe6f8766e45afc885caedb93ac9b3a
 
x86_64:
crash-debuginfo-5.1.8-3.el5_11.i386.rpm
    MD5: fac73edc710e05ee34e67a60e339e2b8SHA-256: ad5ef7004b732cc529e902839497e659115dba02ae38c1959dd6c067f0fbb690
crash-debuginfo-5.1.8-3.el5_11.x86_64.rpm
    MD5: d0b5395dc2d29748b763bb32b43b0d2eSHA-256: 2184b6d02b2bdb18a3b49087c5939c76d63ed973d416830876799c9f37737375
crash-devel-5.1.8-3.el5_11.i386.rpm
    MD5: 71a393983aa96c03a994608afef007dcSHA-256: 2af27959874471ea5ea7a30c8c95cea6a6fe6f8766e45afc885caedb93ac9b3a
crash-devel-5.1.8-3.el5_11.x86_64.rpm
    MD5: 338ba449c8464a78b63052563edacf2aSHA-256: 2d39bcb8bdf9295514de21bfa977d9cfd040b1ed1365c0cde17450964a70c7c9
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
crash-5.1.8-3.el5_11.src.rpm
    MD5: 4da2e6686382dcca4e58a495f5496aa5SHA-256: b66cf3cb13869ccf632916ec3bbbd83dfbb40e740edbeea1b4cd06f9a1e83799
 
IA-32:
crash-5.1.8-3.el5_11.i386.rpm
    MD5: 211ddde6034565e0c513867c50d631ccSHA-256: 7f61c15c88aea1edd1b4ab2ae96dcde756f39bcc4d331be52e995b7d7b7ed132
crash-debuginfo-5.1.8-3.el5_11.i386.rpm
    MD5: fac73edc710e05ee34e67a60e339e2b8SHA-256: ad5ef7004b732cc529e902839497e659115dba02ae38c1959dd6c067f0fbb690
crash-devel-5.1.8-3.el5_11.i386.rpm
    MD5: 71a393983aa96c03a994608afef007dcSHA-256: 2af27959874471ea5ea7a30c8c95cea6a6fe6f8766e45afc885caedb93ac9b3a
 
IA-64:
crash-5.1.8-3.el5_11.ia64.rpm
    MD5: c3d37f838bd4ff146d46df5b06b09322SHA-256: 70c960bfcf91291236bdecf10b3c6d2324ee1882d6b64887b0bdea5c5e2a3321
crash-debuginfo-5.1.8-3.el5_11.ia64.rpm
    MD5: a60868c6acbcfaf88913e17aad0849c4SHA-256: aee01d17638765bd7465efaf8f705660640084a139aea3e218a81d7000b95369
crash-devel-5.1.8-3.el5_11.ia64.rpm
    MD5: 69ea7c735bfd890f8fb1e50e656cc6dfSHA-256: fd8957b06c58b5c2060d33cd49d38911b0eb8e04cf4522396db8b96174d02a90
 
PPC:
crash-5.1.8-3.el5_11.ppc64.rpm
    MD5: e8bd4fc5a31b637d4858daad955de92fSHA-256: 1d499c490b711f88e5003220bef3fa24c6dc1a0f78a8885080847b128f308a67
crash-debuginfo-5.1.8-3.el5_11.ppc64.rpm
    MD5: 54ce44563be72320aa51e8a341d30299SHA-256: b59dc84cfbb6ebc4c9a996cc82a66456362e4c5ce7897f02e2b36567f0861529
crash-devel-5.1.8-3.el5_11.ppc64.rpm
    MD5: bb307d353f155535f4250ff0081fb5e6SHA-256: 4e546f521fca75f4204193af2681f76cf78cb834840bbe102a9762c85848b187
 
s390x:
crash-5.1.8-3.el5_11.s390x.rpm
    MD5: 39890a6bef38dab2d61d14bfe8fed0b0SHA-256: c1914194a567d6bf6473d156a23f8246807061ebdaef9a0d7ca6ca6c9cf4be7d
crash-debuginfo-5.1.8-3.el5_11.s390.rpm
    MD5: 762b467c38073be9d671cafa0ac55d23SHA-256: dc63572eaf8ec276df90dbfc458b4ed1a323549658aefe197d6780a7a9d6cdf5
crash-debuginfo-5.1.8-3.el5_11.s390x.rpm
    MD5: 6d6425789434bda367afff5b6046f5bfSHA-256: 3dfe47e5adfba125f1124491c17358ebfafd9a3f91cfe2061309675f097ab84b
crash-devel-5.1.8-3.el5_11.s390.rpm
    MD5: 25cd5d5aabb7a7202e21c93d2ad6186dSHA-256: b89c5a916820c1a4330bd7fa242247c72ceb4c9dc272badffa3990b6c92729d7
crash-devel-5.1.8-3.el5_11.s390x.rpm
    MD5: 8a51c51b0fee0fbdc307052c295c939eSHA-256: 87951c096dc88900e77c86c56ff3462038bb80395e4b03c83dcc419a987d6636
 
x86_64:
crash-5.1.8-3.el5_11.x86_64.rpm
    MD5: e17a631013e17175b0a760b244202df0SHA-256: 57f461c75dfff03dee6cf3db26f510102923c29504ba2220d9ce464259cfc2b8
crash-debuginfo-5.1.8-3.el5_11.i386.rpm
    MD5: fac73edc710e05ee34e67a60e339e2b8SHA-256: ad5ef7004b732cc529e902839497e659115dba02ae38c1959dd6c067f0fbb690
crash-debuginfo-5.1.8-3.el5_11.x86_64.rpm
    MD5: d0b5395dc2d29748b763bb32b43b0d2eSHA-256: 2184b6d02b2bdb18a3b49087c5939c76d63ed973d416830876799c9f37737375
crash-devel-5.1.8-3.el5_11.i386.rpm
    MD5: 71a393983aa96c03a994608afef007dcSHA-256: 2af27959874471ea5ea7a30c8c95cea6a6fe6f8766e45afc885caedb93ac9b3a
crash-devel-5.1.8-3.el5_11.x86_64.rpm
    MD5: 338ba449c8464a78b63052563edacf2aSHA-256: 2d39bcb8bdf9295514de21bfa977d9cfd040b1ed1365c0cde17450964a70c7c9
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
crash-5.1.8-3.el5_11.src.rpm
    MD5: 4da2e6686382dcca4e58a495f5496aa5SHA-256: b66cf3cb13869ccf632916ec3bbbd83dfbb40e740edbeea1b4cd06f9a1e83799
 
IA-32:
crash-5.1.8-3.el5_11.i386.rpm
    MD5: 211ddde6034565e0c513867c50d631ccSHA-256: 7f61c15c88aea1edd1b4ab2ae96dcde756f39bcc4d331be52e995b7d7b7ed132
crash-debuginfo-5.1.8-3.el5_11.i386.rpm
    MD5: fac73edc710e05ee34e67a60e339e2b8SHA-256: ad5ef7004b732cc529e902839497e659115dba02ae38c1959dd6c067f0fbb690
 
x86_64:
crash-5.1.8-3.el5_11.x86_64.rpm
    MD5: e17a631013e17175b0a760b244202df0SHA-256: 57f461c75dfff03dee6cf3db26f510102923c29504ba2220d9ce464259cfc2b8
crash-debuginfo-5.1.8-3.el5_11.x86_64.rpm
    MD5: d0b5395dc2d29748b763bb32b43b0d2eSHA-256: 2184b6d02b2bdb18a3b49087c5939c76d63ed973d416830876799c9f37737375
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply