- Issued:
- 2008-07-24
- Updated:
- 2008-07-24
RHBA-2008:0757 - Bug Fix Advisory
Synopsis
edac-utils bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated edac-utils packages that fix a bug and add an enhancement are now
available.
Description
EDAC is the current set of drivers in the Linux kernel that handle
detection of ECC errors from memory controllers for most chipsets on i386
and x86_64 architectures. This userspace component consists of an init
script which makes sure EDAC drivers and DIMM labels are loaded at system
startup, as well as a library and utility for reporting current error
counts from the EDAC sysfs files.
These updated edac-utils packages fix a bug in which the '--print-labels'
option did not handle uninitialized labels correctly.
In addition, these updated edac-utils packages provide an enhancement to
the labels database: the HP Proliant DL585G1 is now supported.
Users are advised to upgrade to these updated edac-utils packages, which
resolve this issue and add this enhancement.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
edac-utils-0.9-9_el4.src.rpm | SHA-256: 97582e8ca7d22b4ba08638e0990848c833ac85e3af59d5c73a17204486043993 |
x86_64 | |
edac-utils-0.9-9_el4.x86_64.rpm | SHA-256: 1b5127eac7371d35ef96b31395524e5a5940f394dc612ff4db16d272703aa506 |
edac-utils-0.9-9_el4.x86_64.rpm | SHA-256: 1b5127eac7371d35ef96b31395524e5a5940f394dc612ff4db16d272703aa506 |
edac-utils-devel-0.9-9_el4.x86_64.rpm | SHA-256: b129b0b68293926a84d3ffa0beb6b95d617192a3fed867d119c2362a9a298eff |
edac-utils-devel-0.9-9_el4.x86_64.rpm | SHA-256: b129b0b68293926a84d3ffa0beb6b95d617192a3fed867d119c2362a9a298eff |
i386 | |
edac-utils-0.9-9_el4.i386.rpm | SHA-256: 88110d67540b2afe20af090cf049236cd00a1bfad81f1c92def6932b5b25482d |
edac-utils-0.9-9_el4.i386.rpm | SHA-256: 88110d67540b2afe20af090cf049236cd00a1bfad81f1c92def6932b5b25482d |
edac-utils-devel-0.9-9_el4.i386.rpm | SHA-256: 46948117409414818705688ec496e965d6bd6ef5eb27c6140c2d282c1cb0c8be |
edac-utils-devel-0.9-9_el4.i386.rpm | SHA-256: 46948117409414818705688ec496e965d6bd6ef5eb27c6140c2d282c1cb0c8be |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
edac-utils-0.9-9_el4.src.rpm | SHA-256: 97582e8ca7d22b4ba08638e0990848c833ac85e3af59d5c73a17204486043993 |
x86_64 | |
edac-utils-0.9-9_el4.x86_64.rpm | SHA-256: 1b5127eac7371d35ef96b31395524e5a5940f394dc612ff4db16d272703aa506 |
edac-utils-devel-0.9-9_el4.x86_64.rpm | SHA-256: b129b0b68293926a84d3ffa0beb6b95d617192a3fed867d119c2362a9a298eff |
i386 | |
edac-utils-0.9-9_el4.i386.rpm | SHA-256: 88110d67540b2afe20af090cf049236cd00a1bfad81f1c92def6932b5b25482d |
edac-utils-devel-0.9-9_el4.i386.rpm | SHA-256: 46948117409414818705688ec496e965d6bd6ef5eb27c6140c2d282c1cb0c8be |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
edac-utils-0.9-9_el4.src.rpm | SHA-256: 97582e8ca7d22b4ba08638e0990848c833ac85e3af59d5c73a17204486043993 |
x86_64 | |
edac-utils-0.9-9_el4.x86_64.rpm | SHA-256: 1b5127eac7371d35ef96b31395524e5a5940f394dc612ff4db16d272703aa506 |
edac-utils-devel-0.9-9_el4.x86_64.rpm | SHA-256: b129b0b68293926a84d3ffa0beb6b95d617192a3fed867d119c2362a9a298eff |
i386 | |
edac-utils-0.9-9_el4.i386.rpm | SHA-256: 88110d67540b2afe20af090cf049236cd00a1bfad81f1c92def6932b5b25482d |
edac-utils-devel-0.9-9_el4.i386.rpm | SHA-256: 46948117409414818705688ec496e965d6bd6ef5eb27c6140c2d282c1cb0c8be |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.