Skip to navigation

Bug Fix Advisory gnbd-kernel bug fix update

Advisory: RHBA-2010:0084-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-02-03
Last updated on: 2010-02-03
Affected Products: Global File System EL4
Global File System EL4.8.z

Details

Updated gnbd-kernel packages that fix module-loading issues are now
available for Red Hat Enterprise Linux 4.8, kernel release
2.6.9-89.0.19.EL.

The gnbd-kernel packages contain modules that allow the Global Network
Block Device (GNBD) to communicate with the kernel.

These updated gnbd-kernel packages are in sync with the latest kernel
(2.6.9-89.0.19.EL). The modules in earlier gnbd-kernel packages fail to
load because they do not match the running kernel. It is possible to
force-load the modules; however, with this update, force-loading the
modules is not required. (BZ#557841)

Users are advised to upgrade to these latest gnbd-kernel packages, which
are updated for use with the 2.6.9-89.0.19.EL kernel.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

To update all RPMs for your particular architecture, run:

rpm -Fvh [filenames]

where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains
the
desired RPMs.

Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.

Updated packages

Global File System EL4

SRPMS:
gnbd-kernel-2.6.9-10.56.el4_8.9.src.rpm
File outdated by:  RHBA-2011:0160
    MD5: b3dc997c5cee78dc9c6b126d2b982ad7
 
IA-32:
gnbd-kernel-2.6.9-10.56.el4_8.9.i686.rpm
File outdated by:  RHBA-2012:0112
    MD5: fc60d25f3e42dc56527d008586ad368d
gnbd-kernel-hugemem-2.6.9-10.56.el4_8.9.i686.rpm
File outdated by:  RHBA-2012:0112
    MD5: 3c613b831f05319103f2c81271712495
gnbd-kernel-smp-2.6.9-10.56.el4_8.9.i686.rpm
File outdated by:  RHBA-2012:0112
    MD5: 959e8cff0fb1b4295d680a0772cd2ed1
gnbd-kernel-xenU-2.6.9-10.56.el4_8.9.i686.rpm
File outdated by:  RHBA-2012:0112
    MD5: d462718316e51f6f4138793b0bf184ad
gnbd-kernheaders-2.6.9-10.56.el4_8.9.i686.rpm
File outdated by:  RHBA-2012:0112
    MD5: 8393ec7ea6dc282c90f6ced78331c0c0
 
IA-64:
gnbd-kernel-2.6.9-10.56.el4_8.9.ia64.rpm
File outdated by:  RHBA-2012:0112
    MD5: 6c1419b21a67e0bc233969cdc63f4a86
gnbd-kernheaders-2.6.9-10.56.el4_8.9.ia64.rpm
File outdated by:  RHBA-2012:0112
    MD5: 1e9bf9f5bbb5676eff8d3e3cee86cea1
 
PPC:
gnbd-kernel-2.6.9-10.56.el4_8.9.ppc64.rpm
File outdated by:  RHBA-2012:0112
    MD5: 86b8445144eb05ac49bac94863d61ee4
gnbd-kernel-largesmp-2.6.9-10.56.el4_8.9.ppc64.rpm
File outdated by:  RHBA-2012:0112
    MD5: 271e281b78bcec3b62f8f2d46d19efda
gnbd-kernheaders-2.6.9-10.56.el4_8.9.ppc64.rpm
File outdated by:  RHBA-2012:0112
    MD5: a915dadbfa7ab412cc84e3bb478cfd4d
 
x86_64:
gnbd-kernel-2.6.9-10.56.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2012:0112
    MD5: b765b19418ee67ae36450892e633b7c6
gnbd-kernel-largesmp-2.6.9-10.56.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2012:0112
    MD5: e277d2e906d1211f1e6289069c023a5c
gnbd-kernel-smp-2.6.9-10.56.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2012:0112
    MD5: f3327c10c2753e4c59a187c92d261c5a
gnbd-kernel-xenU-2.6.9-10.56.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2012:0112
    MD5: 0eca8d1fcc2d2a9ed8f2c2f232b2f37f
gnbd-kernheaders-2.6.9-10.56.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2012:0112
    MD5: f279f1c50814ae86caaedbf2807c641f
 
Global File System EL4.8.z

SRPMS:
gnbd-kernel-2.6.9-10.56.el4_8.9.src.rpm
File outdated by:  RHBA-2011:0160
    MD5: b3dc997c5cee78dc9c6b126d2b982ad7
 
IA-32:
gnbd-kernel-2.6.9-10.56.el4_8.9.i686.rpm
File outdated by:  RHBA-2011:0160
    MD5: fc60d25f3e42dc56527d008586ad368d
gnbd-kernel-hugemem-2.6.9-10.56.el4_8.9.i686.rpm
File outdated by:  RHBA-2011:0160
    MD5: 3c613b831f05319103f2c81271712495
gnbd-kernel-smp-2.6.9-10.56.el4_8.9.i686.rpm
File outdated by:  RHBA-2011:0160
    MD5: 959e8cff0fb1b4295d680a0772cd2ed1
gnbd-kernel-xenU-2.6.9-10.56.el4_8.9.i686.rpm
File outdated by:  RHBA-2011:0160
    MD5: d462718316e51f6f4138793b0bf184ad
gnbd-kernheaders-2.6.9-10.56.el4_8.9.i686.rpm
File outdated by:  RHBA-2011:0160
    MD5: 8393ec7ea6dc282c90f6ced78331c0c0
 
IA-64:
gnbd-kernel-2.6.9-10.56.el4_8.9.ia64.rpm
File outdated by:  RHBA-2011:0160
    MD5: 6c1419b21a67e0bc233969cdc63f4a86
gnbd-kernheaders-2.6.9-10.56.el4_8.9.ia64.rpm
File outdated by:  RHBA-2011:0160
    MD5: 1e9bf9f5bbb5676eff8d3e3cee86cea1
 
PPC:
gnbd-kernel-2.6.9-10.56.el4_8.9.ppc64.rpm
File outdated by:  RHBA-2011:0160
    MD5: 86b8445144eb05ac49bac94863d61ee4
gnbd-kernel-largesmp-2.6.9-10.56.el4_8.9.ppc64.rpm
File outdated by:  RHBA-2011:0160
    MD5: 271e281b78bcec3b62f8f2d46d19efda
gnbd-kernheaders-2.6.9-10.56.el4_8.9.ppc64.rpm
File outdated by:  RHBA-2011:0160
    MD5: a915dadbfa7ab412cc84e3bb478cfd4d
 
x86_64:
gnbd-kernel-2.6.9-10.56.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2011:0160
    MD5: b765b19418ee67ae36450892e633b7c6
gnbd-kernel-largesmp-2.6.9-10.56.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2011:0160
    MD5: e277d2e906d1211f1e6289069c023a5c
gnbd-kernel-smp-2.6.9-10.56.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2011:0160
    MD5: f3327c10c2753e4c59a187c92d261c5a
gnbd-kernel-xenU-2.6.9-10.56.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2011:0160
    MD5: 0eca8d1fcc2d2a9ed8f2c2f232b2f37f
gnbd-kernheaders-2.6.9-10.56.el4_8.9.x86_64.rpm
File outdated by:  RHBA-2011:0160
    MD5: f279f1c50814ae86caaedbf2807c641f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

557841 - Need rebuild for 2.6.9-89.0.19.EL kernel



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/