- Issued:
- 2007-10-24
- Updated:
- 2007-10-24
RHBA-2007:0978 - Bug Fix Advisory
Synopsis
gfs-kmod bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated gfs-kmod packages that fix a bug and module-loading issues
are now available for Red Hat Enterprise Linux 5, kernel release
2.6.18-8.1.15.el5.
Description
The gfs-kmod packages contain modules that provide the ability to mount and
use GFS file systems.
These updated packages fix the following bug:
- a kernel panic when running the SPECsfs NFS testbed has been resolved.
As well, these updated gfs-kmod packages are in sync with kernel release
2.6.18-8.1.15.el5. The modules in earlier gfs-kmod packages failed to load
because they did not match the running kernel. It was possible to force
load the modules; however, with this update, users no longer need to.
Users are advised to upgrade to these latest gfs-kmod packages, which are
updated for use with the 2.6.18-8.1.15.el5 kernel.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 x86_64
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 ia64
- Red Hat Enterprise Linux Resilient Storage for x86_64 5 i386
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 x86_64
- Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5 i386
Fixes
- BZ - 334671 - Rebuild for 2.6.18-8.1.15.el5 kernel
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Resilient Storage for x86_64 5
SRPM | |
---|---|
gfs-kmod-0.1.16-6.2.6.18_8.1.15.el5.src.rpm | SHA-256: 9daa4e3e4d860a1514f30eba62ca719f9493fdda2dcafc95bea75313e89d22c3 |
x86_64 | |
kmod-gfs-0.1.16-6.2.6.18_8.1.15.el5.x86_64.rpm | SHA-256: 2de86121bf9560390dc676ce11be54df2598701162ec2ec06c7ea2c629767209 |
kmod-gfs-xen-0.1.16-6.2.6.18_8.1.15.el5.x86_64.rpm | SHA-256: fb276060036ce11cced81e441c0609e9d05f72205cdc1234813cfc43528ca3dd |
ia64 | |
kmod-gfs-0.1.16-6.2.6.18_8.1.15.el5.ia64.rpm | SHA-256: cb921f9e4037d134b3f380774195fa173b4e09eb7693144b1178124af8926c77 |
kmod-gfs-xen-0.1.16-6.2.6.18_8.1.15.el5.ia64.rpm | SHA-256: 65fb57a9e664849adbc6e85e1a0d2dc166cd703193c7826479feca6bb9c87236 |
i386 | |
kmod-gfs-0.1.16-6.2.6.18_8.1.15.el5.i686.rpm | SHA-256: dad60a2b1aeb517288b8c5e080f472b000caa6f0908c8557e9074f6b3c9b0480 |
kmod-gfs-PAE-0.1.16-6.2.6.18_8.1.15.el5.i686.rpm | SHA-256: 65623ed50216ebf0bc505cd206660545dda8f5f76c9e45c6f3338bbf1878afde |
kmod-gfs-xen-0.1.16-6.2.6.18_8.1.15.el5.i686.rpm | SHA-256: c1cf40107d1781fd05681927ae9aeafa9f88ebf0a8dd403abc57796c3b11e1c5 |
Red Hat Enterprise Linux Resilient Storage (for RHEL Server) from RHUI 5
SRPM | |
---|---|
gfs-kmod-0.1.16-6.2.6.18_8.1.15.el5.src.rpm | SHA-256: 9daa4e3e4d860a1514f30eba62ca719f9493fdda2dcafc95bea75313e89d22c3 |
x86_64 | |
kmod-gfs-0.1.16-6.2.6.18_8.1.15.el5.x86_64.rpm | SHA-256: 2de86121bf9560390dc676ce11be54df2598701162ec2ec06c7ea2c629767209 |
kmod-gfs-xen-0.1.16-6.2.6.18_8.1.15.el5.x86_64.rpm | SHA-256: fb276060036ce11cced81e441c0609e9d05f72205cdc1234813cfc43528ca3dd |
i386 | |
kmod-gfs-0.1.16-6.2.6.18_8.1.15.el5.i686.rpm | SHA-256: dad60a2b1aeb517288b8c5e080f472b000caa6f0908c8557e9074f6b3c9b0480 |
kmod-gfs-PAE-0.1.16-6.2.6.18_8.1.15.el5.i686.rpm | SHA-256: 65623ed50216ebf0bc505cd206660545dda8f5f76c9e45c6f3338bbf1878afde |
kmod-gfs-xen-0.1.16-6.2.6.18_8.1.15.el5.i686.rpm | SHA-256: c1cf40107d1781fd05681927ae9aeafa9f88ebf0a8dd403abc57796c3b11e1c5 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.