Updated dmidecode packages that fix one bug are now available for Red HatEnterprise Linux 6.

The dmidecode packages provide utilities for extracting x86 and Intel Itaniumhardware information from the system BIOS or EFI, depending on the SMBIOS/DMIstandard. This information typically includes system manufacturer, model name,serial number, BIOS version, and asset tag.This update fixes the following bug:* Prior to this update, the dmidecode utility did not support the DDR4 memorytype. Consequently, when running dmidecode on hardware that was using DDR4, thetype of the memory device was not recognized and was identified as “out ofspec”. With this update, dmidecode identifies the DDR4 correctly in thedescribed situation. (BZ#1229722)Users of dmidecode are advised to upgrade to these updated packages, which fixthis bug.
Before applying this update, make sure all previously released errata relevantto your system have been applied.For details on how to apply this update, refer to:https://access.redhat.com/articles/11258Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
dmidecode-2.12-5.el6_6.1.src.rpm
    MD5: 70207c742a39ab9ee9d31ec859970a21SHA-256: d9d5579a708692ae598bb79c88d2425d90aae3a786514ad958c79b38356a0b6b
 
IA-32:
dmidecode-2.12-5.el6_6.1.i686.rpm
    MD5: 4806a7814676d74ab75934b7ecb7eaddSHA-256: 4ccc29d1d96d9f3c4d10b246bd084e9e730c6c708f00957b78b95e1c019aacb0
dmidecode-debuginfo-2.12-5.el6_6.1.i686.rpm
    MD5: 93a5df9c479183e87db90603cc006e72SHA-256: c787a75b52fdb68ff285944179d61b6de3f90253418a59793a0d3b8d190f954e
 
x86_64:
dmidecode-2.12-5.el6_6.1.x86_64.rpm
    MD5: a3aa85f8d6dd4b9d5742f67115950722SHA-256: 5a392bc254c9bc80d4bce0458d88e8383061d59a608c9ca30e796b022545fa71
dmidecode-debuginfo-2.12-5.el6_6.1.x86_64.rpm
    MD5: 618f7fc51ff69fa125843a2b0d8fc9eaSHA-256: 7142c8b680eebe632b8456a86c45bcc100c2209360f10544e881b9a7fa16a0c9
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
dmidecode-2.12-5.el6_6.1.src.rpm
    MD5: 70207c742a39ab9ee9d31ec859970a21SHA-256: d9d5579a708692ae598bb79c88d2425d90aae3a786514ad958c79b38356a0b6b
 
x86_64:
dmidecode-2.12-5.el6_6.1.x86_64.rpm
    MD5: a3aa85f8d6dd4b9d5742f67115950722SHA-256: 5a392bc254c9bc80d4bce0458d88e8383061d59a608c9ca30e796b022545fa71
dmidecode-debuginfo-2.12-5.el6_6.1.x86_64.rpm
    MD5: 618f7fc51ff69fa125843a2b0d8fc9eaSHA-256: 7142c8b680eebe632b8456a86c45bcc100c2209360f10544e881b9a7fa16a0c9
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
dmidecode-2.12-5.el6_6.1.src.rpm
    MD5: 70207c742a39ab9ee9d31ec859970a21SHA-256: d9d5579a708692ae598bb79c88d2425d90aae3a786514ad958c79b38356a0b6b
 
IA-32:
dmidecode-2.12-5.el6_6.1.i686.rpm
    MD5: 4806a7814676d74ab75934b7ecb7eaddSHA-256: 4ccc29d1d96d9f3c4d10b246bd084e9e730c6c708f00957b78b95e1c019aacb0
dmidecode-debuginfo-2.12-5.el6_6.1.i686.rpm
    MD5: 93a5df9c479183e87db90603cc006e72SHA-256: c787a75b52fdb68ff285944179d61b6de3f90253418a59793a0d3b8d190f954e
 
x86_64:
dmidecode-2.12-5.el6_6.1.x86_64.rpm
    MD5: a3aa85f8d6dd4b9d5742f67115950722SHA-256: 5a392bc254c9bc80d4bce0458d88e8383061d59a608c9ca30e796b022545fa71
dmidecode-debuginfo-2.12-5.el6_6.1.x86_64.rpm
    MD5: 618f7fc51ff69fa125843a2b0d8fc9eaSHA-256: 7142c8b680eebe632b8456a86c45bcc100c2209360f10544e881b9a7fa16a0c9
 
Red Hat Enterprise Linux Server EUS (v. 6.6.z)

SRPMS:
dmidecode-2.12-5.el6_6.1.src.rpm
    MD5: 70207c742a39ab9ee9d31ec859970a21SHA-256: d9d5579a708692ae598bb79c88d2425d90aae3a786514ad958c79b38356a0b6b
 
IA-32:
dmidecode-2.12-5.el6_6.1.i686.rpm
    MD5: 4806a7814676d74ab75934b7ecb7eaddSHA-256: 4ccc29d1d96d9f3c4d10b246bd084e9e730c6c708f00957b78b95e1c019aacb0
dmidecode-debuginfo-2.12-5.el6_6.1.i686.rpm
    MD5: 93a5df9c479183e87db90603cc006e72SHA-256: c787a75b52fdb68ff285944179d61b6de3f90253418a59793a0d3b8d190f954e
 
x86_64:
dmidecode-2.12-5.el6_6.1.x86_64.rpm
    MD5: a3aa85f8d6dd4b9d5742f67115950722SHA-256: 5a392bc254c9bc80d4bce0458d88e8383061d59a608c9ca30e796b022545fa71
dmidecode-debuginfo-2.12-5.el6_6.1.x86_64.rpm
    MD5: 618f7fc51ff69fa125843a2b0d8fc9eaSHA-256: 7142c8b680eebe632b8456a86c45bcc100c2209360f10544e881b9a7fa16a0c9
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
dmidecode-2.12-5.el6_6.1.src.rpm
    MD5: 70207c742a39ab9ee9d31ec859970a21SHA-256: d9d5579a708692ae598bb79c88d2425d90aae3a786514ad958c79b38356a0b6b
 
IA-32:
dmidecode-2.12-5.el6_6.1.i686.rpm
    MD5: 4806a7814676d74ab75934b7ecb7eaddSHA-256: 4ccc29d1d96d9f3c4d10b246bd084e9e730c6c708f00957b78b95e1c019aacb0
dmidecode-debuginfo-2.12-5.el6_6.1.i686.rpm
    MD5: 93a5df9c479183e87db90603cc006e72SHA-256: c787a75b52fdb68ff285944179d61b6de3f90253418a59793a0d3b8d190f954e
 
x86_64:
dmidecode-2.12-5.el6_6.1.x86_64.rpm
    MD5: a3aa85f8d6dd4b9d5742f67115950722SHA-256: 5a392bc254c9bc80d4bce0458d88e8383061d59a608c9ca30e796b022545fa71
dmidecode-debuginfo-2.12-5.el6_6.1.x86_64.rpm
    MD5: 618f7fc51ff69fa125843a2b0d8fc9eaSHA-256: 7142c8b680eebe632b8456a86c45bcc100c2209360f10544e881b9a7fa16a0c9
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply