- Issued:
- 2011-07-21
- Updated:
- 2011-07-21
RHBA-2011:0377 - Bug Fix Advisory
Synopsis
mcelog bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated mcelog package that fixes a bug is now available for Red Hat
Enterprise Linux 5.
Description
The mcelog daemon collects and decodes Machine Check Exception (MCE) data on
64-bit x86 machines.
This update fixes the following bug:
- The mcelog daemon shipped with Red Hat Enterprise Linux 5 does not support all
processors. Previously, mcelog did not check whether the system is supported or
not before adding a cronjob. Consequent to this, an attempt to use it on an
unsupported system caused the following email message to be sent to a system
administrator every hour:
mcelog: Unknown Intel CPU type family [cpu_family] model [model]
With this update, mcelog has been adapted to ensure that the system is supported
before adding a cronjob, so that system administrators no longer receive these
messages. (BZ#621669)
Users of mcelog are advised to upgrade to this updated package, which resolves
this issue.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
Fixes
- BZ - 621669 - mcelog: Unknown Intel CPU type for Xeon X5650
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
mcelog-0.9pre-1.30.el5.src.rpm | SHA-256: b41f07da61e5312cdfc5b5a5d1e9e8d492848b2e584dd667e02f66437dfc35d9 |
x86_64 | |
mcelog-0.9pre-1.30.el5.x86_64.rpm | SHA-256: 096766a8477ec5a09fc618ed2fcb87f0af007170c2a944826109a2a9706c5bd0 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
mcelog-0.9pre-1.30.el5.src.rpm | SHA-256: b41f07da61e5312cdfc5b5a5d1e9e8d492848b2e584dd667e02f66437dfc35d9 |
x86_64 | |
mcelog-0.9pre-1.30.el5.x86_64.rpm | SHA-256: 096766a8477ec5a09fc618ed2fcb87f0af007170c2a944826109a2a9706c5bd0 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
mcelog-0.9pre-1.30.el5.src.rpm | SHA-256: b41f07da61e5312cdfc5b5a5d1e9e8d492848b2e584dd667e02f66437dfc35d9 |
x86_64 | |
mcelog-0.9pre-1.30.el5.x86_64.rpm | SHA-256: 096766a8477ec5a09fc618ed2fcb87f0af007170c2a944826109a2a9706c5bd0 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
mcelog-0.9pre-1.30.el5.src.rpm | SHA-256: b41f07da61e5312cdfc5b5a5d1e9e8d492848b2e584dd667e02f66437dfc35d9 |
x86_64 | |
mcelog-0.9pre-1.30.el5.x86_64.rpm | SHA-256: 096766a8477ec5a09fc618ed2fcb87f0af007170c2a944826109a2a9706c5bd0 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.