- Issued:
- 2007-11-07
- Updated:
- 2007-11-07
RHBA-2007:0659 - Bug Fix Advisory
Synopsis
module-init-tools bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated module-init-tools packages that address several bugs and add
enhancements are now available.
Description
module-init-tools is a kernel-related package that provides utilities for
automatically loading and unloading drivers, as well as finding out about
drivers that are installed on a given Red Hat Enterprise Linux system.
These updated packages fix the following issues:
- previously, old initrd images were not cleaned up correctly after
uninstalling a kernel. This could cause incorrect kernel modules to be
loaded during boot, which would inherit any problems contained in older
initrd images. These updated packages correctly clean up initrd images.
- module options specified in /etc/modprobe.conf are passed to modules as
they are loaded by the initial ramdisk (initrd). The insmod command is used
by initrd to load modules. However, insmod was unable to handle arguments
containing multiple white spaces. This resulted in model options specified
in /etc/modprobe.conf not matching a real device. These updated packages
allow insmod to handle arguments containing multiple white spaces.
- the driver update program no longer assumes modules are located in
subdirectories of /lib/modules/<kernel-version>/extra/, allowing greater
interoperability with other Linux distributions using a different on-disk
module layout.
- certain third-party tape-management software used to flash firmware on
tape devices failed due to the sg.ko module not being loaded. However, the
tool would successfully run after the "modprobe sg" command was executed.
It was also reported that other tape management commands (eject, forward,
rewind, etc) for the DAT72 tape drive would fail if the sg.ko module was
not loaded. These updated packages update the modprobe.conf.dist file to
automatically load the required SCSI generic (sg) module whenever a SCSI
tape drive is in use.
- weak-modules failed to handle inter-module symbols on the Itanium
architecture. This caused problems for the xenpv-kmod packages, with only
xen-platform-pci.ko showing up in
/lib/modules/<kernel-release>/weak-updates, instead of all the other
modules requiring symbols from xen-platform-pci.ko. This made the
weak-modules mechanism non-existent for the xen pv-on-hvm drivers. These
updated packages resolve this issue.
This update also adds the following enhancements:
- if a module is signed using GPG during build time, modinfo will now
display the GPG key used.
- the modprobe.conf.dist file was updated to automatically load the LAN
channel station (LCS) module whenever the cu3088 module is loaded, since
circular module dependencies built into modules are not possible.
- the weak-modules script now has an option to not make an initrd.
All module-init-tools users should update to these updated packages, which
resolves these issues and add these enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 228047 - cleanup initrds in /boot on kernel removal
- BZ - 229512 - weak-modules doesn't have an option not to make an initrd
- BZ - 247986 - /sbin/weak-modules fails to handle inter-module symbol references.
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.34.el5.src.rpm | SHA-256: f142d5facc182a65c6fbc99e6502ee615024aaa17ce77d56e9489f33f5ef10da |
x86_64 | |
module-init-tools-3.3-0.pre3.1.34.el5.x86_64.rpm | SHA-256: 2a04754ed6ceb0253e581393b79af4032cf60dae784878d2bbc2a8b57e7ae63a |
ia64 | |
module-init-tools-3.3-0.pre3.1.34.el5.ia64.rpm | SHA-256: 360ed31d064b3e4b2ce6724baee8ed5a529ca0aa8419cfc0150515ef5a793c12 |
i386 | |
module-init-tools-3.3-0.pre3.1.34.el5.i386.rpm | SHA-256: 01e4c1d85ddab4c2aa4ba749bd9dd553df3bbd197f12b70a2a2269ca7f759887 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.34.el5.src.rpm | SHA-256: f142d5facc182a65c6fbc99e6502ee615024aaa17ce77d56e9489f33f5ef10da |
x86_64 | |
module-init-tools-3.3-0.pre3.1.34.el5.x86_64.rpm | SHA-256: 2a04754ed6ceb0253e581393b79af4032cf60dae784878d2bbc2a8b57e7ae63a |
i386 | |
module-init-tools-3.3-0.pre3.1.34.el5.i386.rpm | SHA-256: 01e4c1d85ddab4c2aa4ba749bd9dd553df3bbd197f12b70a2a2269ca7f759887 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.34.el5.src.rpm | SHA-256: f142d5facc182a65c6fbc99e6502ee615024aaa17ce77d56e9489f33f5ef10da |
x86_64 | |
module-init-tools-3.3-0.pre3.1.34.el5.x86_64.rpm | SHA-256: 2a04754ed6ceb0253e581393b79af4032cf60dae784878d2bbc2a8b57e7ae63a |
i386 | |
module-init-tools-3.3-0.pre3.1.34.el5.i386.rpm | SHA-256: 01e4c1d85ddab4c2aa4ba749bd9dd553df3bbd197f12b70a2a2269ca7f759887 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.34.el5.src.rpm | SHA-256: f142d5facc182a65c6fbc99e6502ee615024aaa17ce77d56e9489f33f5ef10da |
s390x | |
module-init-tools-3.3-0.pre3.1.34.el5.s390x.rpm | SHA-256: 6f55b5e05efc854c253291970c4270fe15db80f26e40b5dfee956895ec1d314d |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.34.el5.src.rpm | SHA-256: f142d5facc182a65c6fbc99e6502ee615024aaa17ce77d56e9489f33f5ef10da |
ppc | |
module-init-tools-3.3-0.pre3.1.34.el5.ppc.rpm | SHA-256: 88cdb628e16389a61764fd4a54416408e46ff7162cf0d154ee3b2370bd37ee3c |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.34.el5.src.rpm | SHA-256: f142d5facc182a65c6fbc99e6502ee615024aaa17ce77d56e9489f33f5ef10da |
x86_64 | |
module-init-tools-3.3-0.pre3.1.34.el5.x86_64.rpm | SHA-256: 2a04754ed6ceb0253e581393b79af4032cf60dae784878d2bbc2a8b57e7ae63a |
i386 | |
module-init-tools-3.3-0.pre3.1.34.el5.i386.rpm | SHA-256: 01e4c1d85ddab4c2aa4ba749bd9dd553df3bbd197f12b70a2a2269ca7f759887 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.