Red Hat Customer Portal

Skip to main content

Bug Fix Advisory gfs-kmod bug fix update

Advisory: RHBA-2007:0952-3
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2007-10-02
Last updated on: 2007-10-02
Affected Products: RHEL Cluster-Storage (v. 5 server)


Updated gfs-kmod packages that fix module-loading issues are now
available for Red Hat Enterprise Linux 5, kernel release 2.6.18-8.1.14.el5.

The gfs-kmod packages contain modules that provide the ability to mount
and use GFS file systems.

These updated gfs-kmod packages are in sync with kernel release
2.6.18-8.1.14.el5. The modules in earlier gfs-kmod packages failed to load
because they did not match the running kernel. It was possible to
force-load the modules; however, with this update, users do not need to do so.

Users are advised to upgrade to these latest gfs-kmod packages, which are
updated for use with the 2.6.18-8.1.14.el5 kernel.


Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at

Updated packages

RHEL Cluster-Storage (v. 5 server)

File outdated by:  RHBA-2014:1234
    MD5: 511d42d9ef6e71e495e8a9a6819a117c
File outdated by:  RHBA-2014:1234
    MD5: cecab1e8ec4547edd45b02f8013f6fb0
File outdated by:  RHBA-2014:1234
    MD5: 1af77fe727369d5346a723337e95f73a
File outdated by:  RHBA-2014:1234
    MD5: 9fd3f9c53c4250c97f458b46db2f9f16
File outdated by:  RHBA-2014:1234
    MD5: ef942700d95711c5c4f4c1f4054ded51
File outdated by:  RHBA-2014:1234
    MD5: 625f54ceb1f94798536e953253958166
File outdated by:  RHBA-2014:1234
    MD5: 34270262a85102ec5e148865c30c7326
File outdated by:  RHBA-2014:1234
    MD5: 9de41815017f0b140036213f9621fcf4
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

305961 - Need rebuild for 2.6.18-8.1.14.el5

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is More contact details at