Skip to navigation

Enhancement Advisory new packages: kmod-pch_gbe

Advisory: RHEA-2012:1576-1
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2012-12-17
Last updated on: 2012-12-17
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

New kmod-pch_gbe packages are now available for Red Hat Enterprise Linux 6.

The kmod-pch_gbe packages provide kernel modules for controlling Ethernet
adapter in Intel EG20T Platform Controller Hub and OKI Semiconductor ML7223
Input/Output Hub.

The kmod-pch_gbe packages provide temporary drivers for the following hardware
beyond what was delivered in Red Hat Enterprise Linux 6.3:

* Intel EG20T PCH / OKI Semiconductor ML7223 IOH Gigabit Ethernet

This enhancement update adds the kmod-pch_gbe packages to Red Hat Enterprise
Linux 6 as part of the Red Hat Enterprise Linux Driver Update Program (DUP).
(BZ#878375)

Only users requiring temporary driver support for the specific hardware noted
above should install these packages. Unless a system includes the exact hardware
explicitly supported by kmod-pch_gbe packages, these packages must not be
installed.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
pch_gbe-1.01-2.el6_3.src.rpm     MD5: c352f17596247d46ff351654f11a0948
SHA-256: f2d933e6ee815ce9cd355ac4ab0755945d69aa5dcf1fd3c102dfc525153fcaa0
 
IA-32:
kmod-pch_gbe-1.01-2.el6_3.i686.rpm     MD5: 8f5bedd0a70665496cb5a66e06145e23
SHA-256: 879754f5f9267d86eaf66887ba8b4552edeb32d3100a869df10230f1b84f94f3
pch_gbe-debuginfo-1.01-2.el6_3.i686.rpm     MD5: 6ec552d30abb3d4ae13ddf0ed6332ecb
SHA-256: b16e00b016043840b248d7e677b17de05497c2b814d1e60a604add6d61275abc
 
x86_64:
kmod-pch_gbe-1.01-2.el6_3.x86_64.rpm     MD5: 2f66427e17b53c671b8523dda00d47fa
SHA-256: 2ba2475cf2a4766c59269836f9a7d7ddb545313a755320d3c94299c89f4c928f
pch_gbe-debuginfo-1.01-2.el6_3.x86_64.rpm     MD5: 6501c0e9ed839ae00e040922a8872c82
SHA-256: f90c82236b04759b4cf1b0f5768a6c546256f13a7d2dcee4898c27ec76b41d5e
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
pch_gbe-1.01-2.el6_3.src.rpm     MD5: c352f17596247d46ff351654f11a0948
SHA-256: f2d933e6ee815ce9cd355ac4ab0755945d69aa5dcf1fd3c102dfc525153fcaa0
 
x86_64:
kmod-pch_gbe-1.01-2.el6_3.x86_64.rpm     MD5: 2f66427e17b53c671b8523dda00d47fa
SHA-256: 2ba2475cf2a4766c59269836f9a7d7ddb545313a755320d3c94299c89f4c928f
pch_gbe-debuginfo-1.01-2.el6_3.x86_64.rpm     MD5: 6501c0e9ed839ae00e040922a8872c82
SHA-256: f90c82236b04759b4cf1b0f5768a6c546256f13a7d2dcee4898c27ec76b41d5e
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
pch_gbe-1.01-2.el6_3.src.rpm     MD5: c352f17596247d46ff351654f11a0948
SHA-256: f2d933e6ee815ce9cd355ac4ab0755945d69aa5dcf1fd3c102dfc525153fcaa0
 
IA-32:
kmod-pch_gbe-1.01-2.el6_3.i686.rpm     MD5: 8f5bedd0a70665496cb5a66e06145e23
SHA-256: 879754f5f9267d86eaf66887ba8b4552edeb32d3100a869df10230f1b84f94f3
pch_gbe-debuginfo-1.01-2.el6_3.i686.rpm     MD5: 6ec552d30abb3d4ae13ddf0ed6332ecb
SHA-256: b16e00b016043840b248d7e677b17de05497c2b814d1e60a604add6d61275abc
 
x86_64:
kmod-pch_gbe-1.01-2.el6_3.x86_64.rpm     MD5: 2f66427e17b53c671b8523dda00d47fa
SHA-256: 2ba2475cf2a4766c59269836f9a7d7ddb545313a755320d3c94299c89f4c928f
pch_gbe-debuginfo-1.01-2.el6_3.x86_64.rpm     MD5: 6501c0e9ed839ae00e040922a8872c82
SHA-256: f90c82236b04759b4cf1b0f5768a6c546256f13a7d2dcee4898c27ec76b41d5e
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
pch_gbe-1.01-2.el6_3.src.rpm     MD5: c352f17596247d46ff351654f11a0948
SHA-256: f2d933e6ee815ce9cd355ac4ab0755945d69aa5dcf1fd3c102dfc525153fcaa0
 
IA-32:
kmod-pch_gbe-1.01-2.el6_3.i686.rpm     MD5: 8f5bedd0a70665496cb5a66e06145e23
SHA-256: 879754f5f9267d86eaf66887ba8b4552edeb32d3100a869df10230f1b84f94f3
pch_gbe-debuginfo-1.01-2.el6_3.i686.rpm     MD5: 6ec552d30abb3d4ae13ddf0ed6332ecb
SHA-256: b16e00b016043840b248d7e677b17de05497c2b814d1e60a604add6d61275abc
 
x86_64:
kmod-pch_gbe-1.01-2.el6_3.x86_64.rpm     MD5: 2f66427e17b53c671b8523dda00d47fa
SHA-256: 2ba2475cf2a4766c59269836f9a7d7ddb545313a755320d3c94299c89f4c928f
pch_gbe-debuginfo-1.01-2.el6_3.x86_64.rpm     MD5: 6501c0e9ed839ae00e040922a8872c82
SHA-256: f90c82236b04759b4cf1b0f5768a6c546256f13a7d2dcee4898c27ec76b41d5e
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
pch_gbe-1.01-2.el6_3.src.rpm     MD5: c352f17596247d46ff351654f11a0948
SHA-256: f2d933e6ee815ce9cd355ac4ab0755945d69aa5dcf1fd3c102dfc525153fcaa0
 
IA-32:
kmod-pch_gbe-1.01-2.el6_3.i686.rpm     MD5: 8f5bedd0a70665496cb5a66e06145e23
SHA-256: 879754f5f9267d86eaf66887ba8b4552edeb32d3100a869df10230f1b84f94f3
pch_gbe-debuginfo-1.01-2.el6_3.i686.rpm     MD5: 6ec552d30abb3d4ae13ddf0ed6332ecb
SHA-256: b16e00b016043840b248d7e677b17de05497c2b814d1e60a604add6d61275abc
 
x86_64:
kmod-pch_gbe-1.01-2.el6_3.x86_64.rpm     MD5: 2f66427e17b53c671b8523dda00d47fa
SHA-256: 2ba2475cf2a4766c59269836f9a7d7ddb545313a755320d3c94299c89f4c928f
pch_gbe-debuginfo-1.01-2.el6_3.x86_64.rpm     MD5: 6501c0e9ed839ae00e040922a8872c82
SHA-256: f90c82236b04759b4cf1b0f5768a6c546256f13a7d2dcee4898c27ec76b41d5e
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/