- Issued:
- 2005-06-09
- Updated:
- 2005-06-09
RHBA-2005:229 - Bug Fix Advisory
Synopsis
kernel-utils bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kernel-utils packages that fix various bugs are now available.
Description
The kernel-utils package contains several utilities that can be used to
control the kernel or machine hardware. Included are:
- dmidecode - gives information about the BIOS and motherboard revisisons
- microcode_ctl - updates the microcode on Intel CPUs
- smartctl - monitor the health of disks
This updated kernel-utils package addresses the following issues:
- The dmidecode utility has been fixed to work on Itanium architectures.
- The microcode_ctl utility had its initscript modified so that it starts
in all runlevels.
- The udev utility changed the location where microcode_ctl looks for its
device node. The microcode_ctl utility has been updated to look for
/dev/cpu/microcode.
- The x86info utility has been updated to recognize several new processors,
and no longer requires an executable stack.
The existing version of salinfo_decode, installed by the kernel-utils
RPM does not decode OEM records.
- The IA64 salinfo utility has been moved out to its own separate package.
The existing version of salinfo_decode, installed by the kernel-utils
RPM does not decode OEM records.
salinfo_decode is a community-developed, Itanium utility that allows
decoding of hardware errors when a Machine Check Exception(MCE) is
generated. In addition to these SAL records, more information in the
form of vendor-specific OEM data maybe included.
The existing Red Hat Enterprise Linux 4 version of salinfo_decode was
developed internally at Red Hat. During testing it was found that this
version did not properly decode OEM records, causing loss of critical
information of why an MCE occured.
All users of kernel-utils should upgrade to these updated packages, which
resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 145608 - microcode_ctl uses wrong device path
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
kernel-utils-2.4-13.1.66.src.rpm | SHA-256: 310db391b828ce3424b69ff08c87fe9d8ff343dfa7419a95fc842f8d3243f230 |
salinfo-0.5-1.9.src.rpm | SHA-256: 1128b48c3bd067d978dad984ff80ed53209ccf0ed1f7c9a09d769a9c0784a9c8 |
x86_64 | |
kernel-utils-2.4-13.1.66.x86_64.rpm | SHA-256: d91bfb7d571a5bc0261a4c557bf4571e1f71b6a27582c2adc4fa7c6c8d9e2daf |
kernel-utils-2.4-13.1.66.x86_64.rpm | SHA-256: d91bfb7d571a5bc0261a4c557bf4571e1f71b6a27582c2adc4fa7c6c8d9e2daf |
ia64 | |
kernel-utils-2.4-13.1.66.ia64.rpm | SHA-256: 5dad796fce9af414853e0b6d2f2994ef98dd6d52dcabd51002f90be63f2ddf1e |
kernel-utils-2.4-13.1.66.ia64.rpm | SHA-256: 5dad796fce9af414853e0b6d2f2994ef98dd6d52dcabd51002f90be63f2ddf1e |
salinfo-0.5-1.9.ia64.rpm | SHA-256: 6b6cf807875810474dbbec68879865cad318081535c1cd05983822bf59d01800 |
salinfo-0.5-1.9.ia64.rpm | SHA-256: 6b6cf807875810474dbbec68879865cad318081535c1cd05983822bf59d01800 |
i386 | |
kernel-utils-2.4-13.1.66.i386.rpm | SHA-256: 8899c34b9e185ff7ed614f6bea244369308325c7dc02c84b1c0e1b669e1a0b30 |
kernel-utils-2.4-13.1.66.i386.rpm | SHA-256: 8899c34b9e185ff7ed614f6bea244369308325c7dc02c84b1c0e1b669e1a0b30 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
kernel-utils-2.4-13.1.66.src.rpm | SHA-256: 310db391b828ce3424b69ff08c87fe9d8ff343dfa7419a95fc842f8d3243f230 |
salinfo-0.5-1.9.src.rpm | SHA-256: 1128b48c3bd067d978dad984ff80ed53209ccf0ed1f7c9a09d769a9c0784a9c8 |
x86_64 | |
kernel-utils-2.4-13.1.66.x86_64.rpm | SHA-256: d91bfb7d571a5bc0261a4c557bf4571e1f71b6a27582c2adc4fa7c6c8d9e2daf |
ia64 | |
kernel-utils-2.4-13.1.66.ia64.rpm | SHA-256: 5dad796fce9af414853e0b6d2f2994ef98dd6d52dcabd51002f90be63f2ddf1e |
salinfo-0.5-1.9.ia64.rpm | SHA-256: 6b6cf807875810474dbbec68879865cad318081535c1cd05983822bf59d01800 |
i386 | |
kernel-utils-2.4-13.1.66.i386.rpm | SHA-256: 8899c34b9e185ff7ed614f6bea244369308325c7dc02c84b1c0e1b669e1a0b30 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
kernel-utils-2.4-13.1.66.src.rpm | SHA-256: 310db391b828ce3424b69ff08c87fe9d8ff343dfa7419a95fc842f8d3243f230 |
x86_64 | |
kernel-utils-2.4-13.1.66.x86_64.rpm | SHA-256: d91bfb7d571a5bc0261a4c557bf4571e1f71b6a27582c2adc4fa7c6c8d9e2daf |
i386 | |
kernel-utils-2.4-13.1.66.i386.rpm | SHA-256: 8899c34b9e185ff7ed614f6bea244369308325c7dc02c84b1c0e1b669e1a0b30 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
kernel-utils-2.4-13.1.66.src.rpm | SHA-256: 310db391b828ce3424b69ff08c87fe9d8ff343dfa7419a95fc842f8d3243f230 |
s390x | |
kernel-utils-2.4-13.1.66.s390x.rpm | SHA-256: 38c9541386f2482613c972295d99376a85d9d6183f21d8c0a30cee8363cabc1b |
s390 | |
kernel-utils-2.4-13.1.66.s390.rpm | SHA-256: 3555c27a9361f2087b33e76a12702998b72f0947625911c15206720a55611115 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
kernel-utils-2.4-13.1.66.src.rpm | SHA-256: 310db391b828ce3424b69ff08c87fe9d8ff343dfa7419a95fc842f8d3243f230 |
ppc | |
kernel-utils-2.4-13.1.66.ppc.rpm | SHA-256: 7416cdb8e7a36da58b511e8d8cfbbd54d4dc340f17d72e915bafc9674bd0e51f |
kernel-utils-2.4-13.1.66.ppc64.rpm | SHA-256: 56baca09069037008430f3c4ad25c071d758c55641a8075e9af79dba566575ff |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.