Red Hat Customer Portal

Skip to main content

Bug Fix Advisory gnbd-kmod bug fix update

Advisory: RHBA-2007:0977-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2007-10-24
Last updated on: 2007-10-24
Affected Products: RHEL Cluster-Storage (v. 5 server)


Updated gnbd-kmod packages that fix module loading issues are now available
for Red Hat Enterprise Linux 5, kernel release 2.6.18-8.1.15.el5.

The gnbd-kmod packages contain modules that allow the Global Network Block
Device (GNBD) to communicate with the kernel.

These updated gnbd-kmod packages are in sync with the 2.6.18-8.1.15.el5
kernel. The modules in earlier gnbd-kmod packages failed to load because
they did not match the running kernel. It was possible to force-load the
modules; however, with this update, users do not need to do so.

Users are advised to upgrade to these latest gnbd-kmod packages, which are
updated for use with the 2.6.18-8.1.15.el5 kernel.


Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at

Updated packages

RHEL Cluster-Storage (v. 5 server)

File outdated by:  RHBA-2009:0215
    MD5: 34dde434efbb0bf385cf4c67f0632618
File outdated by:  RHBA-2009:0215
    MD5: 25686e491ea22c547eaa8e6cb1ebcb24
File outdated by:  RHBA-2009:0215
    MD5: 69a0b1138fbf5af02e7d075f5789f70b
File outdated by:  RHBA-2009:0215
    MD5: 4ded5710e88ab5bb38aa1e162657bfa0
File outdated by:  RHBA-2009:0215
    MD5: 5610ed22a460d64611a69a8cb87d0d59
File outdated by:  RHBA-2009:0215
    MD5: e9dd1ccc572cae5c6b117bdab907b38a
File outdated by:  RHBA-2009:0215
    MD5: 7d6a013a2890214b78c6b6c4c1257cf6
File outdated by:  RHBA-2009:0215
    MD5: 6d2bd4e2f9e0ce651eaea61a0b393871
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

334661 - Rebuild for 2.6.18-8.1.15.el5 kernel

These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:

The Red Hat security contact is More contact details at