Skip to navigation

Enhancement Advisory new packages: kmod-tg3

Advisory: RHEA-2012:0576-1
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2012-05-14
Last updated on: 2012-05-14
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

New kmod-tg3 packages are now available for Red Hat Enterprise Linux 6.

The kmod-tg3 packages provide temporary drivers for the following hardware
beyond what was delivered in Red Hat Enterprise Linux 6.2:

Broadcom Tigon3 Ethernet

This enhancement update adds the kmod-tg3 packages to Red Hat Enterprise Linux 6
as part of the Red Hat Enterprise Linux Driver Update Program (DUP). The
kmod-tg3 packages introduced by the RHEA-2012:0564 advisory did not provide
support for IBM POWER architecture. IBM POWER is now supported. (BZ#817614)

Only users requiring temporary driver support for the specific hardware noted
above should install these packages. Unless a system includes the exact hardware
explicitly supported by kmod-tg3, these packages must not be installed.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
tg3-3.122-2.el6_2.src.rpm     MD5: a3edff1e46b42cf726beb29b317536e3
SHA-256: ce715e2295dac52078636d91563d10987f9c62d759873d6b91270ac3e69dff10
 
IA-32:
kmod-tg3-3.122-2.el6_2.i686.rpm     MD5: 70ea52577846e1ea0b309aa69302ae42
SHA-256: 0350a8cf0ff6a193aac30b06dc50a60a1e116e64770a7c864bfe6f1479ac3a17
tg3-debuginfo-3.122-2.el6_2.i686.rpm     MD5: 7bab27bae38651d35429d94799cd34c0
SHA-256: b658654363c9d5f95da04a0f1f6ad153a1eb3627b2b1646164916dc597cb5ce4
 
x86_64:
kmod-tg3-3.122-2.el6_2.x86_64.rpm     MD5: 1257da27d6904b972294c980edd801d6
SHA-256: b0fb1ff6f59ee4e5f144cd192479acaed1be87a46b76bddef66cb0b80a97cf99
tg3-debuginfo-3.122-2.el6_2.x86_64.rpm     MD5: 330af32f1095af7261b1f0dde03960bb
SHA-256: 860a95b2599a18604dc839cdbaacde0f978bcf4bad577c141d5d99d94aa301ab
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
tg3-3.122-2.el6_2.src.rpm     MD5: a3edff1e46b42cf726beb29b317536e3
SHA-256: ce715e2295dac52078636d91563d10987f9c62d759873d6b91270ac3e69dff10
 
x86_64:
kmod-tg3-3.122-2.el6_2.x86_64.rpm     MD5: 1257da27d6904b972294c980edd801d6
SHA-256: b0fb1ff6f59ee4e5f144cd192479acaed1be87a46b76bddef66cb0b80a97cf99
tg3-debuginfo-3.122-2.el6_2.x86_64.rpm     MD5: 330af32f1095af7261b1f0dde03960bb
SHA-256: 860a95b2599a18604dc839cdbaacde0f978bcf4bad577c141d5d99d94aa301ab
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
tg3-3.122-2.el6_2.src.rpm     MD5: a3edff1e46b42cf726beb29b317536e3
SHA-256: ce715e2295dac52078636d91563d10987f9c62d759873d6b91270ac3e69dff10
 
IA-32:
kmod-tg3-3.122-2.el6_2.i686.rpm     MD5: 70ea52577846e1ea0b309aa69302ae42
SHA-256: 0350a8cf0ff6a193aac30b06dc50a60a1e116e64770a7c864bfe6f1479ac3a17
tg3-debuginfo-3.122-2.el6_2.i686.rpm     MD5: 7bab27bae38651d35429d94799cd34c0
SHA-256: b658654363c9d5f95da04a0f1f6ad153a1eb3627b2b1646164916dc597cb5ce4
 
PPC:
kmod-tg3-3.122-2.el6_2.ppc64.rpm     MD5: 0ab75c0ab37bd746e71e346ce8dd7cb1
SHA-256: 0217bf4516ffaeb2c9c522685df9cce82985028617c0b5b41d24e868259aee68
tg3-debuginfo-3.122-2.el6_2.ppc64.rpm     MD5: bd6a68c9514d5086cc96cb6285150925
SHA-256: 3f90bbfd538676ed7d9159c7f04f85f08382f6241e55c3712402e2795b20d9d8
 
x86_64:
kmod-tg3-3.122-2.el6_2.x86_64.rpm     MD5: 1257da27d6904b972294c980edd801d6
SHA-256: b0fb1ff6f59ee4e5f144cd192479acaed1be87a46b76bddef66cb0b80a97cf99
tg3-debuginfo-3.122-2.el6_2.x86_64.rpm     MD5: 330af32f1095af7261b1f0dde03960bb
SHA-256: 860a95b2599a18604dc839cdbaacde0f978bcf4bad577c141d5d99d94aa301ab
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

SRPMS:
tg3-3.122-2.el6_2.src.rpm     MD5: a3edff1e46b42cf726beb29b317536e3
SHA-256: ce715e2295dac52078636d91563d10987f9c62d759873d6b91270ac3e69dff10
 
x86_64:
kmod-tg3-3.122-2.el6_2.x86_64.rpm     MD5: 1257da27d6904b972294c980edd801d6
SHA-256: b0fb1ff6f59ee4e5f144cd192479acaed1be87a46b76bddef66cb0b80a97cf99
tg3-debuginfo-3.122-2.el6_2.x86_64.rpm     MD5: 330af32f1095af7261b1f0dde03960bb
SHA-256: 860a95b2599a18604dc839cdbaacde0f978bcf4bad577c141d5d99d94aa301ab
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

SRPMS:
tg3-3.122-2.el6_2.src.rpm     MD5: a3edff1e46b42cf726beb29b317536e3
SHA-256: ce715e2295dac52078636d91563d10987f9c62d759873d6b91270ac3e69dff10
 
IA-32:
kmod-tg3-3.122-2.el6_2.i686.rpm     MD5: 70ea52577846e1ea0b309aa69302ae42
SHA-256: 0350a8cf0ff6a193aac30b06dc50a60a1e116e64770a7c864bfe6f1479ac3a17
tg3-debuginfo-3.122-2.el6_2.i686.rpm     MD5: 7bab27bae38651d35429d94799cd34c0
SHA-256: b658654363c9d5f95da04a0f1f6ad153a1eb3627b2b1646164916dc597cb5ce4
 
PPC:
kmod-tg3-3.122-2.el6_2.ppc64.rpm     MD5: 0ab75c0ab37bd746e71e346ce8dd7cb1
SHA-256: 0217bf4516ffaeb2c9c522685df9cce82985028617c0b5b41d24e868259aee68
tg3-debuginfo-3.122-2.el6_2.ppc64.rpm     MD5: bd6a68c9514d5086cc96cb6285150925
SHA-256: 3f90bbfd538676ed7d9159c7f04f85f08382f6241e55c3712402e2795b20d9d8
 
x86_64:
kmod-tg3-3.122-2.el6_2.x86_64.rpm     MD5: 1257da27d6904b972294c980edd801d6
SHA-256: b0fb1ff6f59ee4e5f144cd192479acaed1be87a46b76bddef66cb0b80a97cf99
tg3-debuginfo-3.122-2.el6_2.x86_64.rpm     MD5: 330af32f1095af7261b1f0dde03960bb
SHA-256: 860a95b2599a18604dc839cdbaacde0f978bcf4bad577c141d5d99d94aa301ab
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
tg3-3.122-2.el6_2.src.rpm     MD5: a3edff1e46b42cf726beb29b317536e3
SHA-256: ce715e2295dac52078636d91563d10987f9c62d759873d6b91270ac3e69dff10
 
IA-32:
kmod-tg3-3.122-2.el6_2.i686.rpm     MD5: 70ea52577846e1ea0b309aa69302ae42
SHA-256: 0350a8cf0ff6a193aac30b06dc50a60a1e116e64770a7c864bfe6f1479ac3a17
tg3-debuginfo-3.122-2.el6_2.i686.rpm     MD5: 7bab27bae38651d35429d94799cd34c0
SHA-256: b658654363c9d5f95da04a0f1f6ad153a1eb3627b2b1646164916dc597cb5ce4
 
x86_64:
kmod-tg3-3.122-2.el6_2.x86_64.rpm     MD5: 1257da27d6904b972294c980edd801d6
SHA-256: b0fb1ff6f59ee4e5f144cd192479acaed1be87a46b76bddef66cb0b80a97cf99
tg3-debuginfo-3.122-2.el6_2.x86_64.rpm     MD5: 330af32f1095af7261b1f0dde03960bb
SHA-256: 860a95b2599a18604dc839cdbaacde0f978bcf4bad577c141d5d99d94aa301ab
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/