[RHBA-2003:069-12] Updated 2.4 kernel fixes tg3 driver hang

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



---------------------------------------------------------------------
                   Red Hat, Inc. Red Hat Bug Fix Advisory

Synopsis:          Updated 2.4 kernel fixes tg3 driver hang
Advisory ID:       RHBA-2003:069-12
Issue date:        2003-01-24
Updated on:        2003-02-28
Product:           Red Hat Linux
Keywords:          tg3 broadcom gigabit
Cross references:  
Obsoletes:         RHSA-2003:025
---------------------------------------------------------------------

1. Topic:

Updated kernel packages for Red Hat Linux 7.1, 7.2, 7.3, and 8.0 are now
available that fix a deadlock with the tg3 driver on certain revisions of
the Broadcom 570x gigabit ethernet series

2. Relevant releases/architectures:

Red Hat Linux 7.1 - athlon, i386, i586, i686
Red Hat Linux 7.2 - athlon, i386, i586, i686
Red Hat Linux 7.3 - athlon, i386, i586, i686
Red Hat Linux 8.0 - athlon, i386, i586, i686

3. Problem description:

The Linux kernel handles the basic functions of the operating system. 
This advisory deals with updates to Red Hat Linux 7.1, 7.2, 7.3, and 8.0.  

Only users of Red Hat Linux 7.1, 7.2, 7.3, and 8.0 that have a Broadcom
gigabit ethernet card might need to upgrade to these packages; there are
no other new features present.

4. Solution:

Before applying this update, make sure all previously released errata
relevant to your system have been applied, especially the additional
packages from RHSA-2002:205 and RHSA-2002:206 respectively.

The procedure for upgrading the kernel manually is documented at:

http://www.redhat.com/support/docs/howto/kernel-upgrade/

Please read the directions for your architecture carefully before
proceeding with the kernel upgrade.

Please note that this update is also available via Red Hat Network. Many
people find this to be an easier way to apply updates. To use Red Hat
Network, launch the Red Hat Update Agent with the following command:

up2date

This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system. Note that you need to select the kernel
explicitly on default configurations of up2date.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):

76159 - Errata kernel 2.4.18-17.8.0 fails PCI resource allocation

6. RPMs required:

Red Hat Linux 7.1:

SRPMS:
ftp://updates.redhat.com/7.1/en/os/SRPMS/kernel-2.4.18-26.7.x.src.rpm
ftp://updates.redhat.com/7.1/en/os/SRPMS/kudzu-0.99.42.2.72-1.src.rpm

athlon:
ftp://updates.redhat.com/7.1/en/os/athlon/kernel-2.4.18-26.7.x.athlon.rpm
ftp://updates.redhat.com/7.1/en/os/athlon/kernel-smp-2.4.18-26.7.x.athlon.rpm

i386:
ftp://updates.redhat.com/7.1/en/os/i386/kernel-2.4.18-26.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-source-2.4.18-26.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-doc-2.4.18-26.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kernel-BOOT-2.4.18-26.7.x.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kudzu-0.99.42.2.72-1.i386.rpm
ftp://updates.redhat.com/7.1/en/os/i386/kudzu-devel-0.99.42.2.72-1.i386.rpm

i586:
ftp://updates.redhat.com/7.1/en/os/i586/kernel-2.4.18-26.7.x.i586.rpm
ftp://updates.redhat.com/7.1/en/os/i586/kernel-smp-2.4.18-26.7.x.i586.rpm

i686:
ftp://updates.redhat.com/7.1/en/os/i686/kernel-2.4.18-26.7.x.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-smp-2.4.18-26.7.x.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-bigmem-2.4.18-26.7.x.i686.rpm
ftp://updates.redhat.com/7.1/en/os/i686/kernel-debug-2.4.18-26.7.x.i686.rpm

Red Hat Linux 7.2:

SRPMS:
ftp://updates.redhat.com/7.2/en/os/SRPMS/kernel-2.4.18-26.7.x.src.rpm
ftp://updates.redhat.com/7.2/en/os/SRPMS/kudzu-0.99.42.2.72-1.src.rpm

athlon:
ftp://updates.redhat.com/7.2/en/os/athlon/kernel-2.4.18-26.7.x.athlon.rpm
ftp://updates.redhat.com/7.2/en/os/athlon/kernel-smp-2.4.18-26.7.x.athlon.rpm

i386:
ftp://updates.redhat.com/7.2/en/os/i386/kernel-2.4.18-26.7.x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-source-2.4.18-26.7.x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-doc-2.4.18-26.7.x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kernel-BOOT-2.4.18-26.7.x.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kudzu-0.99.42.2.72-1.i386.rpm
ftp://updates.redhat.com/7.2/en/os/i386/kudzu-devel-0.99.42.2.72-1.i386.rpm

i586:
ftp://updates.redhat.com/7.2/en/os/i586/kernel-2.4.18-26.7.x.i586.rpm
ftp://updates.redhat.com/7.2/en/os/i586/kernel-smp-2.4.18-26.7.x.i586.rpm

i686:
ftp://updates.redhat.com/7.2/en/os/i686/kernel-2.4.18-26.7.x.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-smp-2.4.18-26.7.x.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-bigmem-2.4.18-26.7.x.i686.rpm
ftp://updates.redhat.com/7.2/en/os/i686/kernel-debug-2.4.18-26.7.x.i686.rpm

Red Hat Linux 7.3:

SRPMS:
ftp://updates.redhat.com/7.3/en/os/SRPMS/kernel-2.4.18-26.7.x.src.rpm

athlon:
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-2.4.18-26.7.x.athlon.rpm
ftp://updates.redhat.com/7.3/en/os/athlon/kernel-smp-2.4.18-26.7.x.athlon.rpm

i386:
ftp://updates.redhat.com/7.3/en/os/i386/kernel-2.4.18-26.7.x.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-source-2.4.18-26.7.x.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-doc-2.4.18-26.7.x.i386.rpm
ftp://updates.redhat.com/7.3/en/os/i386/kernel-BOOT-2.4.18-26.7.x.i386.rpm

i586:
ftp://updates.redhat.com/7.3/en/os/i586/kernel-2.4.18-26.7.x.i586.rpm
ftp://updates.redhat.com/7.3/en/os/i586/kernel-smp-2.4.18-26.7.x.i586.rpm

i686:
ftp://updates.redhat.com/7.3/en/os/i686/kernel-2.4.18-26.7.x.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-smp-2.4.18-26.7.x.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-bigmem-2.4.18-26.7.x.i686.rpm
ftp://updates.redhat.com/7.3/en/os/i686/kernel-debug-2.4.18-26.7.x.i686.rpm

Red Hat Linux 8.0:

SRPMS:
ftp://updates.redhat.com/8.0/en/os/SRPMS/kernel-2.4.18-26.8.0.src.rpm

athlon:
ftp://updates.redhat.com/8.0/en/os/athlon/kernel-2.4.18-26.8.0.athlon.rpm
ftp://updates.redhat.com/8.0/en/os/athlon/kernel-smp-2.4.18-26.8.0.athlon.rpm

i386:
ftp://updates.redhat.com/8.0/en/os/i386/kernel-2.4.18-26.8.0.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/kernel-source-2.4.18-26.8.0.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/kernel-doc-2.4.18-26.8.0.i386.rpm
ftp://updates.redhat.com/8.0/en/os/i386/kernel-BOOT-2.4.18-26.8.0.i386.rpm

i586:
ftp://updates.redhat.com/8.0/en/os/i586/kernel-2.4.18-26.8.0.i586.rpm
ftp://updates.redhat.com/8.0/en/os/i586/kernel-smp-2.4.18-26.8.0.i586.rpm

i686:
ftp://updates.redhat.com/8.0/en/os/i686/kernel-2.4.18-26.8.0.i686.rpm
ftp://updates.redhat.com/8.0/en/os/i686/kernel-smp-2.4.18-26.8.0.i686.rpm
ftp://updates.redhat.com/8.0/en/os/i686/kernel-bigmem-2.4.18-26.8.0.i686.rpm
ftp://updates.redhat.com/8.0/en/os/i686/kernel-debug-2.4.18-26.8.0.i686.rpm



7. Verification:

MD5 sum                          Package Name
--------------------------------------------------------------------------
a4bf4dcdfd8be2cb723bd5572a704cde 7.1/en/os/SRPMS/kernel-2.4.18-26.7.x.src.rpm
697eba84022e58fed4501203b6febea9 7.1/en/os/SRPMS/kudzu-0.99.42.2.72-1.src.rpm
1b1fead014d5df103038565f89b0684c 7.1/en/os/athlon/kernel-2.4.18-26.7.x.athlon.rpm
901727f00300f28cf536910e49ac6436 7.1/en/os/athlon/kernel-smp-2.4.18-26.7.x.athlon.rpm
87730f56e51b747653f52870b5dd0eac 7.1/en/os/i386/kernel-2.4.18-26.7.x.i386.rpm
e98b3379e79e71e20a6fae5470a8843b 7.1/en/os/i386/kernel-BOOT-2.4.18-26.7.x.i386.rpm
2d8bbd94e5a63a277082c43c653d7f8b 7.1/en/os/i386/kernel-doc-2.4.18-26.7.x.i386.rpm
eb4111cbbf19648a1146d2d184b7b23b 7.1/en/os/i386/kernel-source-2.4.18-26.7.x.i386.rpm
a2675be58b025860ffa81ca5bf586e07 7.1/en/os/i386/kudzu-0.99.42.2.72-1.i386.rpm
7d249abd93019469809b7dfcdd1dfa0e 7.1/en/os/i386/kudzu-devel-0.99.42.2.72-1.i386.rpm
d053a4c252b7e2392fa9e89f892e08b3 7.1/en/os/i586/kernel-2.4.18-26.7.x.i586.rpm
7eafe585c4ca21b0d5074703db5b9b50 7.1/en/os/i586/kernel-smp-2.4.18-26.7.x.i586.rpm
d85e2d8e7c1d36a20eb3d4e0f88a98e4 7.1/en/os/i686/kernel-2.4.18-26.7.x.i686.rpm
c17b2a32c19a7a05ef6da033174c0557 7.1/en/os/i686/kernel-bigmem-2.4.18-26.7.x.i686.rpm
1dbf3001c4b807c9dfcd9c0be55ddae8 7.1/en/os/i686/kernel-debug-2.4.18-26.7.x.i686.rpm
f1929429de7d66e7bf44dbc3074d5ca5 7.1/en/os/i686/kernel-smp-2.4.18-26.7.x.i686.rpm
a4bf4dcdfd8be2cb723bd5572a704cde 7.2/en/os/SRPMS/kernel-2.4.18-26.7.x.src.rpm
697eba84022e58fed4501203b6febea9 7.2/en/os/SRPMS/kudzu-0.99.42.2.72-1.src.rpm
1b1fead014d5df103038565f89b0684c 7.2/en/os/athlon/kernel-2.4.18-26.7.x.athlon.rpm
901727f00300f28cf536910e49ac6436 7.2/en/os/athlon/kernel-smp-2.4.18-26.7.x.athlon.rpm
87730f56e51b747653f52870b5dd0eac 7.2/en/os/i386/kernel-2.4.18-26.7.x.i386.rpm
e98b3379e79e71e20a6fae5470a8843b 7.2/en/os/i386/kernel-BOOT-2.4.18-26.7.x.i386.rpm
2d8bbd94e5a63a277082c43c653d7f8b 7.2/en/os/i386/kernel-doc-2.4.18-26.7.x.i386.rpm
eb4111cbbf19648a1146d2d184b7b23b 7.2/en/os/i386/kernel-source-2.4.18-26.7.x.i386.rpm
a2675be58b025860ffa81ca5bf586e07 7.2/en/os/i386/kudzu-0.99.42.2.72-1.i386.rpm
7d249abd93019469809b7dfcdd1dfa0e 7.2/en/os/i386/kudzu-devel-0.99.42.2.72-1.i386.rpm
d053a4c252b7e2392fa9e89f892e08b3 7.2/en/os/i586/kernel-2.4.18-26.7.x.i586.rpm
7eafe585c4ca21b0d5074703db5b9b50 7.2/en/os/i586/kernel-smp-2.4.18-26.7.x.i586.rpm
d85e2d8e7c1d36a20eb3d4e0f88a98e4 7.2/en/os/i686/kernel-2.4.18-26.7.x.i686.rpm
c17b2a32c19a7a05ef6da033174c0557 7.2/en/os/i686/kernel-bigmem-2.4.18-26.7.x.i686.rpm
1dbf3001c4b807c9dfcd9c0be55ddae8 7.2/en/os/i686/kernel-debug-2.4.18-26.7.x.i686.rpm
f1929429de7d66e7bf44dbc3074d5ca5 7.2/en/os/i686/kernel-smp-2.4.18-26.7.x.i686.rpm
a4bf4dcdfd8be2cb723bd5572a704cde 7.3/en/os/SRPMS/kernel-2.4.18-26.7.x.src.rpm
1b1fead014d5df103038565f89b0684c 7.3/en/os/athlon/kernel-2.4.18-26.7.x.athlon.rpm
901727f00300f28cf536910e49ac6436 7.3/en/os/athlon/kernel-smp-2.4.18-26.7.x.athlon.rpm
87730f56e51b747653f52870b5dd0eac 7.3/en/os/i386/kernel-2.4.18-26.7.x.i386.rpm
e98b3379e79e71e20a6fae5470a8843b 7.3/en/os/i386/kernel-BOOT-2.4.18-26.7.x.i386.rpm
2d8bbd94e5a63a277082c43c653d7f8b 7.3/en/os/i386/kernel-doc-2.4.18-26.7.x.i386.rpm
eb4111cbbf19648a1146d2d184b7b23b 7.3/en/os/i386/kernel-source-2.4.18-26.7.x.i386.rpm
d053a4c252b7e2392fa9e89f892e08b3 7.3/en/os/i586/kernel-2.4.18-26.7.x.i586.rpm
7eafe585c4ca21b0d5074703db5b9b50 7.3/en/os/i586/kernel-smp-2.4.18-26.7.x.i586.rpm
d85e2d8e7c1d36a20eb3d4e0f88a98e4 7.3/en/os/i686/kernel-2.4.18-26.7.x.i686.rpm
c17b2a32c19a7a05ef6da033174c0557 7.3/en/os/i686/kernel-bigmem-2.4.18-26.7.x.i686.rpm
1dbf3001c4b807c9dfcd9c0be55ddae8 7.3/en/os/i686/kernel-debug-2.4.18-26.7.x.i686.rpm
f1929429de7d66e7bf44dbc3074d5ca5 7.3/en/os/i686/kernel-smp-2.4.18-26.7.x.i686.rpm
2f9f5125bd283a30b58fc09ba2617199 8.0/en/os/SRPMS/kernel-2.4.18-26.8.0.src.rpm
806137856db0137b84a01681bbd7baa9 8.0/en/os/athlon/kernel-2.4.18-26.8.0.athlon.rpm
30606acc3f571a793bbddd362ae786a1 8.0/en/os/athlon/kernel-smp-2.4.18-26.8.0.athlon.rpm
d39f740929c4837bd46692082f01f078 8.0/en/os/i386/kernel-2.4.18-26.8.0.i386.rpm
22f251ea64680484815cd45c23af361b 8.0/en/os/i386/kernel-BOOT-2.4.18-26.8.0.i386.rpm
02c83b6c0ce35d6c6f4a50fbce1e11ab 8.0/en/os/i386/kernel-doc-2.4.18-26.8.0.i386.rpm
685afb53b2f9c5620eb962280f69aab1 8.0/en/os/i386/kernel-source-2.4.18-26.8.0.i386.rpm
f0d573d7132082166e1f9b74f2cd7b1a 8.0/en/os/i586/kernel-2.4.18-26.8.0.i586.rpm
0a76b2d8345c2e8ec6dc2cc6fb5ea7fe 8.0/en/os/i586/kernel-smp-2.4.18-26.8.0.i586.rpm
52fe12f03e137c8f1ed49b454d47cfb5 8.0/en/os/i686/kernel-2.4.18-26.8.0.i686.rpm
3a2024d645bffb40af8ab588a99aeb2d 8.0/en/os/i686/kernel-bigmem-2.4.18-26.8.0.i686.rpm
d0df581064a08d2d5272d176a557b15e 8.0/en/os/i686/kernel-debug-2.4.18-26.8.0.i686.rpm
1035e625be0caac09d8ee8c3e3a1adb0 8.0/en/os/i686/kernel-smp-2.4.18-26.8.0.i686.rpm


These packages are GPG signed by Red Hat, Inc. for security.  Our key
is available at http://www.redhat.com/about/contact/pgpkey.html

You can verify each package with the following command:
    
    rpm --checksig -v <filename>

If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
    
    md5sum <filename>

8. Contact:

The Red Hat security contact is <security@redhat.com>.  More contact
details at http://www.redhat.com/solutions/security/news/contact.html

Copyright 2003 Red Hat, Inc.



_______________________________________________
Redhat-watch-list mailing list
To unsubscribe, visit: https://listman.redhat.com/mailman/listinfo/redhat-watch-list

[Index of Archives]     [Red Hat General]     [Fedora Legacy]     [Red Hat Development]     [Red Hat Install]     [Kernel]     [Netfilter]     [Linux Security]     [Fedora Announce]

Powered by Linux