Chapter 1. Package Updates
command could not link back to a PID 0 swapper task that was interrupted by an Itanium INIT or
MCA exception, and displayed the error message: "bt: unwind: failed to locate return link (ip=0x0)!"
Crash now uses a different method to obtain the CPU number for the interrupted task, and the
backtrace correctly transitions back to the interrupted task.
• the starting backtrace location of active, non-crashing, xen dom0 tasks are not available in kdump
dumpfiles, nor is there anything that can be searched for in their respective stacks. Therefore,
for these tasks, the "bt" command would show either an empty backtrace or an invalid backtrace
starting at the last location where schedule() had been called. Instead, the "bt" command now
provides an error message for these tasks that indicated "bt: starting backtrace locations of the
active (non-crashing) xen tasks cannot be determined: try -t or -T options".
• Running the "bt" command against an x86 Xen kernel vmcore, the transition from the IRQ stack
back to the process stack led to a segmentation fault.
The upstream changelog referenced below details additional bug fixes and enhancements provided by
the rebase of this package.
All users of crash are advised to upgrade to these updated packages, which resolve these issues.
1.27. cryptsetup-luks
1.27.1. RHBA-2009:1349: bug fix update
Updated cryptsetup-luks packages that fix various bugs are now available.
The cryptsetup-luks packages provide a utility for setting up encrypted devices using Device Mapper
and the dm-crypt target.
This update provides the following bug fixes:
• the cryptsetup luksFormat command now properly wipes old filesystem signatures.
• the exit code for cryptsetup status command is no longer incorrect.
• the cryptsetup password entry message now includes the device name for which the user is being
prompted.
(BZ#437261
All users of cryptsetup-luks should upgrade to these updated packages, which resolve these issues.
1.28. cscope
1.28.1. RHSA-2009:1102: Moderate security update
Important
This update has already been released (prior to the GA of this release) as the security
RHSA-2009:1102
errata
An updated cscope package that fixes multiple security issues is now available for Red Hat Enterprise
Linux 5.
32
201
)
202
196
(BZ#487429
)
(BZ#495586
198
(BZ#478904
)
(BZ#439191
197
)
199
(BZ#468910
)
200
)
Need help?
Do you have a question about the ENTERPRISE LINUX 5.4 - TECHNICAL NOTES and is the answer not in the manual?
Questions and answers