Bug Fix Advisory bfa-firmware bug fix and enhancement update

Advisory: RHBA-2013:1549-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-11-20
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated bfa-firmware packages that fix several bugs and add various enhancements
are now available for Red Hat Enterprise Linux 6.

The bfa-firmware package contains the Brocade Fibre Channel Host Bus
Adapter (HBA) Firmware to run Brocade Fibre Channel and CNA adapters. This
package also supports the Brocade BNA network adapter.

The bfa-firmware packages have been upgraded to upstream version 3.2.21-1,
which provides a number of bug fixes and enhancements over the previous
version. (BZ#928990, BZ#1007100)

All users of bfa-firmware are advised to upgrade to these updated packages,
which fix these bugs and add these enhancements.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
bfa-firmware-3.2.21.1-2.el6.src.rpm
File outdated by:  RHBA-2014:1486
    MD5: cd96e604e274792da6f628cd37b77ac0
SHA-256: 79766d948f9e13c2cc7f8d932b88ba33e3ee18c18ba305af2e0859cef692c753
 
IA-32:
bfa-firmware-3.2.21.1-2.el6.noarch.rpm
File outdated by:  RHBA-2014:1486
    MD5: f41541b18aa0d030b5e04c1ad860b795
SHA-256: 241969f34c2a4fa69929abc8eb09cee90e9b565eb168e385594b731c2bdb6c3a
 
x86_64:
bfa-firmware-3.2.21.1-2.el6.noarch.rpm
File outdated by:  RHBA-2014:1486
    MD5: f41541b18aa0d030b5e04c1ad860b795
SHA-256: 241969f34c2a4fa69929abc8eb09cee90e9b565eb168e385594b731c2bdb6c3a
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
bfa-firmware-3.2.21.1-2.el6.src.rpm
File outdated by:  RHBA-2014:1486
    MD5: cd96e604e274792da6f628cd37b77ac0
SHA-256: 79766d948f9e13c2cc7f8d932b88ba33e3ee18c18ba305af2e0859cef692c753
 
x86_64:
bfa-firmware-3.2.21.1-2.el6.noarch.rpm
File outdated by:  RHBA-2014:1486
    MD5: f41541b18aa0d030b5e04c1ad860b795
SHA-256: 241969f34c2a4fa69929abc8eb09cee90e9b565eb168e385594b731c2bdb6c3a
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
bfa-firmware-3.2.21.1-2.el6.src.rpm
File outdated by:  RHBA-2014:1486
    MD5: cd96e604e274792da6f628cd37b77ac0
SHA-256: 79766d948f9e13c2cc7f8d932b88ba33e3ee18c18ba305af2e0859cef692c753
 
IA-32:
bfa-firmware-3.2.21.1-2.el6.noarch.rpm
File outdated by:  RHBA-2014:1486
    MD5: f41541b18aa0d030b5e04c1ad860b795
SHA-256: 241969f34c2a4fa69929abc8eb09cee90e9b565eb168e385594b731c2bdb6c3a
 
PPC:
bfa-firmware-3.2.21.1-2.el6.noarch.rpm
File outdated by:  RHBA-2014:1486
    MD5: f41541b18aa0d030b5e04c1ad860b795
SHA-256: 241969f34c2a4fa69929abc8eb09cee90e9b565eb168e385594b731c2bdb6c3a
 
x86_64:
bfa-firmware-3.2.21.1-2.el6.noarch.rpm
File outdated by:  RHBA-2014:1486
    MD5: f41541b18aa0d030b5e04c1ad860b795
SHA-256: 241969f34c2a4fa69929abc8eb09cee90e9b565eb168e385594b731c2bdb6c3a
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
bfa-firmware-3.2.21.1-2.el6.src.rpm
File outdated by:  RHBA-2014:1486
    MD5: cd96e604e274792da6f628cd37b77ac0
SHA-256: 79766d948f9e13c2cc7f8d932b88ba33e3ee18c18ba305af2e0859cef692c753
 
IA-32:
bfa-firmware-3.2.21.1-2.el6.noarch.rpm
File outdated by:  RHBA-2014:1486
    MD5: f41541b18aa0d030b5e04c1ad860b795
SHA-256: 241969f34c2a4fa69929abc8eb09cee90e9b565eb168e385594b731c2bdb6c3a
 
x86_64:
bfa-firmware-3.2.21.1-2.el6.noarch.rpm
File outdated by:  RHBA-2014:1486
    MD5: f41541b18aa0d030b5e04c1ad860b795
SHA-256: 241969f34c2a4fa69929abc8eb09cee90e9b565eb168e385594b731c2bdb6c3a
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/