Skip to navigation

Enhancement Advisory pciutils enhancement and bug fix update

Advisory: RHEA-2011:0045-1
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2011-01-12
Last updated on: 2011-01-12
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An enhanced pciutils package that fixes various bugs and provides an enhancement
is now available.

The pciutils package contains various utilities for inspecting and manipulating
devices connected to the PCI bus.

This updated pciutils package has been enhanced by being upgraded to upstream
version 3.1.7, which provides fixes for the following bugs:

* Several pciutils utilities were unable to recognize newer PCIe capabilities,
and therefore returned an "UNKNOWN" message instead of a proper description.
With this update, the PCI utilities are now aware of PCIe capabilities, and
return a proper description. (BZ#511992)

* The lspci command was unable to report which PCI slot a certain device was
plugged into. With this updated package, lspci reports which PCI slot a device
is using given that the information is available. (#563286)

All users of pciutils are advised to upgrade to this updated package, which
resolves these issues and provides this enhancement.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
pciutils-3.1.7-3.el5.src.rpm
File outdated by:  RHBA-2012:0251
    MD5: 5cb3248e548de4045b2f6dc27926761d
SHA-256: a971490e35719ef1b5e7f143c16cb97ef6626bcdf3aa58d102901d93b6aa646d
 
IA-32:
pciutils-devel-3.1.7-3.el5.i386.rpm
File outdated by:  RHBA-2012:0251
    MD5: ea81ff4e83c157f7932f8f8282b7b25e
SHA-256: ddc14229886fc05be006d15a6bb12f33651e2b65ad5d0de1ea7f028518a0cbdd
 
x86_64:
pciutils-devel-3.1.7-3.el5.i386.rpm
File outdated by:  RHBA-2012:0251
    MD5: ea81ff4e83c157f7932f8f8282b7b25e
SHA-256: ddc14229886fc05be006d15a6bb12f33651e2b65ad5d0de1ea7f028518a0cbdd
pciutils-devel-3.1.7-3.el5.x86_64.rpm
File outdated by:  RHBA-2012:0251
    MD5: e5225c1cc2d75b9cd031d3119205ecb4
SHA-256: d8daf3aeb09821dba1cc79abf945779a9112fefc79d601f28236647b6be662d0
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
pciutils-3.1.7-3.el5.src.rpm
File outdated by:  RHBA-2012:0251
    MD5: 5cb3248e548de4045b2f6dc27926761d
SHA-256: a971490e35719ef1b5e7f143c16cb97ef6626bcdf3aa58d102901d93b6aa646d
 
IA-32:
pciutils-3.1.7-3.el5.i386.rpm
File outdated by:  RHBA-2012:0251
    MD5: b2e79f6b2e232ac5a19f7c22a6168f8c
SHA-256: 9669cf53c28212efa3cfcc5879ee9b8c869ec5d9175f8e7f8806ce2149fbd2bb
pciutils-devel-3.1.7-3.el5.i386.rpm
File outdated by:  RHBA-2012:0251
    MD5: ea81ff4e83c157f7932f8f8282b7b25e
SHA-256: ddc14229886fc05be006d15a6bb12f33651e2b65ad5d0de1ea7f028518a0cbdd
 
IA-64:
pciutils-3.1.7-3.el5.ia64.rpm
File outdated by:  RHBA-2012:0251
    MD5: 5d63fca2820b45f9d18ed42a9d48509e
SHA-256: eb238074b2a02880f2571cefc9e346c5a8464f4b8d065ec530e9c723f18ba922
pciutils-devel-3.1.7-3.el5.ia64.rpm
File outdated by:  RHBA-2012:0251
    MD5: 34eec33534d6a0127e79d7f5c0d7b0ac
SHA-256: ed6fae9634918625b333042035899384eadc8ade3c5f9904f0914ce5b45d8d29
 
PPC:
pciutils-3.1.7-3.el5.ppc.rpm
File outdated by:  RHBA-2012:0251
    MD5: 129964d7afa803cff19175164faf0902
SHA-256: 1e8094e7c4318f9461e281880a7c3d13477b31d290fdd036d790ad0a6fe7f037
pciutils-devel-3.1.7-3.el5.ppc.rpm
File outdated by:  RHBA-2012:0251
    MD5: 749b96da869ff53c72902b8ff1175d63
SHA-256: 629c39b4cc7605bc173072cfa011f86d5191b1c9575954da019d94dbf5b7f963
pciutils-devel-3.1.7-3.el5.ppc64.rpm
File outdated by:  RHBA-2012:0251
    MD5: 17e19515d9fe4d3d4bde9b7c0a3b31f6
SHA-256: 74aae8d338a9c3250856f4ad832effc8da779c11022c77ced26baeb00d16b499
 
s390x:
pciutils-3.1.7-3.el5.s390x.rpm
File outdated by:  RHBA-2012:0251
    MD5: 0320ecf4ed460cff9874fa933e4cfac5
SHA-256: 52a100c99f191131078ff26ec96be6bb40702ce75b9928f7807164c7ed5bc200
pciutils-devel-3.1.7-3.el5.s390.rpm
File outdated by:  RHBA-2012:0251
    MD5: 3aa2551c4b481265d391a6f6a0d92d33
SHA-256: b973b0db7081b9c97ea51f365fe815333efd5cc02a3e9f9a5efb6bec6055a427
pciutils-devel-3.1.7-3.el5.s390x.rpm
File outdated by:  RHBA-2012:0251
    MD5: fed02e01dd98ad1fd30a4b8d22ee0849
SHA-256: df398950d00e90b450842b1280ce2cc74ee43fbebe211d3c7f225776c894f5c5
 
x86_64:
pciutils-3.1.7-3.el5.x86_64.rpm
File outdated by:  RHBA-2012:0251
    MD5: e53ad094e875cf7dbfb3ca5ed5b7d2e0
SHA-256: 9e6980f14140091288c2422494d5b6a7408bc3b838658ff25e22335e27ecaf1d
pciutils-devel-3.1.7-3.el5.i386.rpm
File outdated by:  RHBA-2012:0251
    MD5: ea81ff4e83c157f7932f8f8282b7b25e
SHA-256: ddc14229886fc05be006d15a6bb12f33651e2b65ad5d0de1ea7f028518a0cbdd
pciutils-devel-3.1.7-3.el5.x86_64.rpm
File outdated by:  RHBA-2012:0251
    MD5: e5225c1cc2d75b9cd031d3119205ecb4
SHA-256: d8daf3aeb09821dba1cc79abf945779a9112fefc79d601f28236647b6be662d0
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
pciutils-3.1.7-3.el5.src.rpm
File outdated by:  RHBA-2012:0251
    MD5: 5cb3248e548de4045b2f6dc27926761d
SHA-256: a971490e35719ef1b5e7f143c16cb97ef6626bcdf3aa58d102901d93b6aa646d
 
IA-32:
pciutils-3.1.7-3.el5.i386.rpm
File outdated by:  RHBA-2012:0251
    MD5: b2e79f6b2e232ac5a19f7c22a6168f8c
SHA-256: 9669cf53c28212efa3cfcc5879ee9b8c869ec5d9175f8e7f8806ce2149fbd2bb
 
x86_64:
pciutils-3.1.7-3.el5.x86_64.rpm
File outdated by:  RHBA-2012:0251
    MD5: e53ad094e875cf7dbfb3ca5ed5b7d2e0
SHA-256: 9e6980f14140091288c2422494d5b6a7408bc3b838658ff25e22335e27ecaf1d
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

629555 - update-pciids: mv: `/usr/share/hwdata/.neww' and `/usr/share/hwdata/.neww' are the same file
646884 - kudzu fails to build after pciutils rebase: libpci.a(names-net.o): In function `pci_id_net_lookup': (.text+0x167): undefined reference to `__res_query'



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/