- Issued:
- 2014-01-02
- Updated:
- 2014-01-02
RHBA-2014:0001 - Bug Fix Advisory
Synopsis
ethtool bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated ethtool packages that fix one bug are now available for Red Hat
Enterprise Linux 6.
Description
Ethtool is a utility that allows querying and changing settings such as speed,
port, autonegotiation, PCI locations and checksum offload on many
network devices, especially of ethernet devices.
This update fixes the following bug:
- Previously, the ethtool utility did not correctly communicate with the network
device driver when attempting to set LRO (Large Receive Offload) options.
Consequently, it was not possible to set the LRO options on devices supporting
LRO. With this update, ethtool has been fixed to communicate correctly with the
device driver, and the LRO options can now be set on network devices.
(BZ#1038953)
Users of ethtool are advised to upgrade to these updated packages, which fix
this bug.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4 x86_64
- Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4 i386
- Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.4 s390x
- Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.4 ppc64
- Red Hat Enterprise Linux High Availability for x86_64 - Extended Update Support 6.4 i386
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4 x86_64
- Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4 i386
- Red Hat Gluster Storage Server for On-premise 2.1 x86_64
- Red Hat Storage for Public Cloud (via RHUI) 2.1 x86_64
- Red Hat Enterprise Linux EUS Compute Node 6.4 x86_64
- Red Hat Enterprise Linux Server - AUS 6.4 x86_64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.4
SRPM | |
---|---|
ethtool-3.5-1.1.el6_4.src.rpm | SHA-256: b29c34cc073c135e79575721aecbf4976fe10984e1687bbffe52e3ba23530f93 |
x86_64 | |
ethtool-3.5-1.1.el6_4.x86_64.rpm | SHA-256: e64498332d2b154ba2af045f7d6d80021937122e2c7db4e6b20123152fefce5c |
ethtool-debuginfo-3.5-1.1.el6_4.x86_64.rpm | SHA-256: 6a6d31d97252cb030d2fb78dcd0af22775feab7b70b58b1ad8772942444088fb |
i386 | |
ethtool-3.5-1.1.el6_4.i686.rpm | SHA-256: 087f2ad367f265490697ca3a02176921ce0cc0dc9a1e0145cddb239015025b3c |
ethtool-debuginfo-3.5-1.1.el6_4.i686.rpm | SHA-256: 99915dfdfe0a45cf57432ae6821a52bf51c28fc6d8dc15e3004053daa03f9934 |
Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.4
SRPM | |
---|---|
ethtool-3.5-1.1.el6_4.src.rpm | SHA-256: b29c34cc073c135e79575721aecbf4976fe10984e1687bbffe52e3ba23530f93 |
s390x | |
ethtool-3.5-1.1.el6_4.s390x.rpm | SHA-256: 7176a8889780339b262bab18b35962be64b46c078b617eb4d4454c53a2d837ec |
ethtool-debuginfo-3.5-1.1.el6_4.s390x.rpm | SHA-256: f18c636ed7dc5f616e198c23da0399112492d71dce74cb80bb84060d55f85d1f |
Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.4
SRPM | |
---|---|
ethtool-3.5-1.1.el6_4.src.rpm | SHA-256: b29c34cc073c135e79575721aecbf4976fe10984e1687bbffe52e3ba23530f93 |
ppc64 | |
ethtool-3.5-1.1.el6_4.ppc64.rpm | SHA-256: bd1bc98ad1b0cb508f97becb2994899313ea3d9b0b3a12724cb6ffd36612ec26 |
ethtool-debuginfo-3.5-1.1.el6_4.ppc64.rpm | SHA-256: 9a138364aa53ef1fee28958c9f67f5de71192e765736ce6ce6d2dea987301632 |
Red Hat Enterprise Linux High Availability for x86_64 - Extended Update Support 6.4
SRPM | |
---|---|
i386 |
Red Hat Enterprise Linux Server - Extended Update Support from RHUI 6.4
SRPM | |
---|---|
ethtool-3.5-1.1.el6_4.src.rpm | SHA-256: b29c34cc073c135e79575721aecbf4976fe10984e1687bbffe52e3ba23530f93 |
x86_64 | |
ethtool-3.5-1.1.el6_4.x86_64.rpm | SHA-256: e64498332d2b154ba2af045f7d6d80021937122e2c7db4e6b20123152fefce5c |
ethtool-debuginfo-3.5-1.1.el6_4.x86_64.rpm | SHA-256: 6a6d31d97252cb030d2fb78dcd0af22775feab7b70b58b1ad8772942444088fb |
i386 | |
ethtool-3.5-1.1.el6_4.i686.rpm | SHA-256: 087f2ad367f265490697ca3a02176921ce0cc0dc9a1e0145cddb239015025b3c |
ethtool-debuginfo-3.5-1.1.el6_4.i686.rpm | SHA-256: 99915dfdfe0a45cf57432ae6821a52bf51c28fc6d8dc15e3004053daa03f9934 |
Red Hat Gluster Storage Server for On-premise 2.1
SRPM | |
---|---|
ethtool-3.5-1.1.el6_4.src.rpm | SHA-256: b29c34cc073c135e79575721aecbf4976fe10984e1687bbffe52e3ba23530f93 |
x86_64 | |
ethtool-3.5-1.1.el6_4.x86_64.rpm | SHA-256: e64498332d2b154ba2af045f7d6d80021937122e2c7db4e6b20123152fefce5c |
ethtool-debuginfo-3.5-1.1.el6_4.x86_64.rpm | SHA-256: 6a6d31d97252cb030d2fb78dcd0af22775feab7b70b58b1ad8772942444088fb |
Red Hat Storage for Public Cloud (via RHUI) 2.1
SRPM | |
---|---|
ethtool-3.5-1.1.el6_4.src.rpm | SHA-256: b29c34cc073c135e79575721aecbf4976fe10984e1687bbffe52e3ba23530f93 |
x86_64 | |
ethtool-3.5-1.1.el6_4.x86_64.rpm | SHA-256: e64498332d2b154ba2af045f7d6d80021937122e2c7db4e6b20123152fefce5c |
ethtool-debuginfo-3.5-1.1.el6_4.x86_64.rpm | SHA-256: 6a6d31d97252cb030d2fb78dcd0af22775feab7b70b58b1ad8772942444088fb |
Red Hat Enterprise Linux EUS Compute Node 6.4
SRPM | |
---|---|
ethtool-3.5-1.1.el6_4.src.rpm | SHA-256: b29c34cc073c135e79575721aecbf4976fe10984e1687bbffe52e3ba23530f93 |
x86_64 | |
ethtool-3.5-1.1.el6_4.x86_64.rpm | SHA-256: e64498332d2b154ba2af045f7d6d80021937122e2c7db4e6b20123152fefce5c |
ethtool-debuginfo-3.5-1.1.el6_4.x86_64.rpm | SHA-256: 6a6d31d97252cb030d2fb78dcd0af22775feab7b70b58b1ad8772942444088fb |
Red Hat Enterprise Linux Server - AUS 6.4
SRPM | |
---|---|
ethtool-3.5-1.1.el6_4.src.rpm | SHA-256: b29c34cc073c135e79575721aecbf4976fe10984e1687bbffe52e3ba23530f93 |
x86_64 | |
ethtool-3.5-1.1.el6_4.x86_64.rpm | SHA-256: e64498332d2b154ba2af045f7d6d80021937122e2c7db4e6b20123152fefce5c |
ethtool-debuginfo-3.5-1.1.el6_4.x86_64.rpm | SHA-256: 6a6d31d97252cb030d2fb78dcd0af22775feab7b70b58b1ad8772942444088fb |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.