- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHBA-2009:0076 - Bug Fix Advisory
Synopsis
udev bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated udev packages that fix several bugs and add an enhancement are now
available.
Description
The udev packages implement a dynamic device-directory, providing only the
devices present on the system. This dynamic directory runs in user-space,
dynamically creates and removes devices, provides consistent naming, and a
user-space API. udev replaces devfs, providing greater hot plug
functionality.
These updated packages fix the following bugs:
- race conditions in "scsi_id", which may have resulted in devices not
being created as per udev rules, have been resolved.
- the udev spec file had "%{dist}" on the "Release" line, instead of
"%{?dist}".
- there was only one symbolic link in "/dev/disk/by-path/" for each iSCSI
target. If there were multiple LUNs in a target, each LUN may have used the
same symbolic link, causing overlaps. In this update, a symbolic link is
created for each target, with the LUN number included in each link, which
resolves this issue.
- "floppy" is hardcoded in the "/etc/sysconfig/modules/udev-stw.modules"
file, causing modules for floppy drives to be loaded, even if such drives
are not present. This may have resulted in commands, such as "grubby",
taking a long time to load. In this update, the "udev-stw.modules" file
checks "/etc/sysconfig/udev-stw" to see which modules to load at start-up,
allowing administrators to use the "udev-stw" file to add and remove
modules (such as "floppy"). Note: on certain systems, floppy drives may
also have to be disabled in the BIOS to prevent floppy modules loading.
- Zaptel device-node rules were included in udev packages. These rules
are in the "/etc/udev/rules.d/50-udev.rules" file, and prevented rules from
the zaptel package, "/etc/udev/rules.d/zaptel.rules", from being executed.
When running Asterisk as the "asterisk" user, Asterisk was unable to access
Zaptel-based devices. In this update, Zaptel device-node rules have been
removed from the udev packages, allowing rules from the zaptel package to
be executed, which resolves this issue.
- segmentation faults occurred when "vol_id" parsed malformed "/etc/passwd"
and "/etc/group" files. This was most noticeable when these files contained
a "#" at the start of the first line. Also, this issue may have resulted in
long start-up and shutdown times, and "vol_id" using large amounts of CPU.
In this update, more robust parsing has been added to "vol_id", which
resolves this issue.
- the "dasd_id" command returned the device's hexadecimal ID_SERIAL number.
This number is not persistent. Multipath can use "dasd_id", which may have
caused problems. In this update, "dasd_id" returns the device's persistent
UID, which resolves this issue.
Also, ext4dev support was added to "vol_id", which is used to provide udev
with information, such as file system types.
Users of udev are advised to upgrade to these updated packages, which
resolve these issues and add this enhancement.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 294061 - udev creates zaptel devices with the wrong file permissions
- BZ - 413831 - udev timeout at boot; vol_id process stuck when /sbin/start_udev is run
- BZ - 427640 - /dev/disk/by-path symlinks broken for iSCSI targets
- BZ - 440631 - there should be %{?dist} instead of %{dist} in the *.spec on the Release: line
- BZ - 444528 - RFE: ext4/ext4dev support in udev for RHEL5
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
udev-095-14.19.el5.src.rpm | SHA-256: 94d63999376f4a09274e865799213bc245931ac8a4d2902d963f276cea06a8a1 |
x86_64 | |
libvolume_id-095-14.19.el5.i386.rpm | SHA-256: a6a19c15b94e7e54788ff69dfc276dded670dfecbfcef03d5842d69ac2d699cf |
libvolume_id-095-14.19.el5.x86_64.rpm | SHA-256: c10f8a01ef07d37e3b1cb0bd04369a15ebd0db7011e306c46fc832c6c5a77765 |
libvolume_id-devel-095-14.19.el5.i386.rpm | SHA-256: 95559c3107f80b459c0c8516c3d3a1008ed3109bf2266496f497ba46016a333c |
libvolume_id-devel-095-14.19.el5.x86_64.rpm | SHA-256: a3d3e6cc6caee71f5d6c6f02c76f1f7df954dfc6bbd422648a2810fac8c63e0d |
udev-095-14.19.el5.x86_64.rpm | SHA-256: fbfa2f3c4577caa2687a3f248e20058c9e882816a15bda5a0a2cb74d7aa36fea |
ia64 | |
libvolume_id-095-14.19.el5.ia64.rpm | SHA-256: d490da75533d0fb001b3ff2cbeec3056d442942cfa09c5de020ea6e7223671c4 |
libvolume_id-devel-095-14.19.el5.ia64.rpm | SHA-256: 9bc38feb1969e94fa16f6f149620356a643a4e3ee1600a4d4a2e68b6ca131ea9 |
udev-095-14.19.el5.ia64.rpm | SHA-256: 22fb1740902572b3ec00d8e40193b7034fd10e49485336c9062aa5d2389f7504 |
i386 | |
libvolume_id-095-14.19.el5.i386.rpm | SHA-256: a6a19c15b94e7e54788ff69dfc276dded670dfecbfcef03d5842d69ac2d699cf |
libvolume_id-devel-095-14.19.el5.i386.rpm | SHA-256: 95559c3107f80b459c0c8516c3d3a1008ed3109bf2266496f497ba46016a333c |
udev-095-14.19.el5.i386.rpm | SHA-256: 26518cef04a33f854e877948a9db57f5009cedaf0a87c269508ce02f282eeea4 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
udev-095-14.19.el5.src.rpm | SHA-256: 94d63999376f4a09274e865799213bc245931ac8a4d2902d963f276cea06a8a1 |
x86_64 | |
libvolume_id-095-14.19.el5.i386.rpm | SHA-256: a6a19c15b94e7e54788ff69dfc276dded670dfecbfcef03d5842d69ac2d699cf |
libvolume_id-095-14.19.el5.x86_64.rpm | SHA-256: c10f8a01ef07d37e3b1cb0bd04369a15ebd0db7011e306c46fc832c6c5a77765 |
libvolume_id-devel-095-14.19.el5.i386.rpm | SHA-256: 95559c3107f80b459c0c8516c3d3a1008ed3109bf2266496f497ba46016a333c |
libvolume_id-devel-095-14.19.el5.x86_64.rpm | SHA-256: a3d3e6cc6caee71f5d6c6f02c76f1f7df954dfc6bbd422648a2810fac8c63e0d |
udev-095-14.19.el5.x86_64.rpm | SHA-256: fbfa2f3c4577caa2687a3f248e20058c9e882816a15bda5a0a2cb74d7aa36fea |
i386 | |
libvolume_id-095-14.19.el5.i386.rpm | SHA-256: a6a19c15b94e7e54788ff69dfc276dded670dfecbfcef03d5842d69ac2d699cf |
libvolume_id-devel-095-14.19.el5.i386.rpm | SHA-256: 95559c3107f80b459c0c8516c3d3a1008ed3109bf2266496f497ba46016a333c |
udev-095-14.19.el5.i386.rpm | SHA-256: 26518cef04a33f854e877948a9db57f5009cedaf0a87c269508ce02f282eeea4 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
udev-095-14.19.el5.src.rpm | SHA-256: 94d63999376f4a09274e865799213bc245931ac8a4d2902d963f276cea06a8a1 |
x86_64 | |
libvolume_id-095-14.19.el5.i386.rpm | SHA-256: a6a19c15b94e7e54788ff69dfc276dded670dfecbfcef03d5842d69ac2d699cf |
libvolume_id-095-14.19.el5.x86_64.rpm | SHA-256: c10f8a01ef07d37e3b1cb0bd04369a15ebd0db7011e306c46fc832c6c5a77765 |
udev-095-14.19.el5.x86_64.rpm | SHA-256: fbfa2f3c4577caa2687a3f248e20058c9e882816a15bda5a0a2cb74d7aa36fea |
i386 | |
libvolume_id-095-14.19.el5.i386.rpm | SHA-256: a6a19c15b94e7e54788ff69dfc276dded670dfecbfcef03d5842d69ac2d699cf |
udev-095-14.19.el5.i386.rpm | SHA-256: 26518cef04a33f854e877948a9db57f5009cedaf0a87c269508ce02f282eeea4 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
udev-095-14.19.el5.src.rpm | SHA-256: 94d63999376f4a09274e865799213bc245931ac8a4d2902d963f276cea06a8a1 |
s390x | |
libvolume_id-095-14.19.el5.s390.rpm | SHA-256: 5c585480a365711044682fcaf7e4ccb5590f74f8d9ea662227bd9a662e0fc9b7 |
libvolume_id-095-14.19.el5.s390x.rpm | SHA-256: e33e16e12e3d4eafcde21ef6af2a5eff75efc039f6dde81332460b0186760046 |
libvolume_id-devel-095-14.19.el5.s390.rpm | SHA-256: 75caef151615f67846bd02321e6961040b75ab33b729c887a5ba5154ef8f938a |
libvolume_id-devel-095-14.19.el5.s390x.rpm | SHA-256: 4150ad1daa8135c00d67f4103d1fe016de993afc027ebd8c39559f97d2ffdba5 |
udev-095-14.19.el5.s390x.rpm | SHA-256: acce1eccc77cdf634b2eb93d718d50b7af1b0e727f9943927c0a55af57f799ff |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
udev-095-14.19.el5.src.rpm | SHA-256: 94d63999376f4a09274e865799213bc245931ac8a4d2902d963f276cea06a8a1 |
ppc | |
libvolume_id-095-14.19.el5.ppc.rpm | SHA-256: 1cdd28e95687890e633f14e30e43a21695dc9965a68b05c50252b55b5780c845 |
libvolume_id-095-14.19.el5.ppc64.rpm | SHA-256: d0604075bbfd112172b5ba5a343b45fc186d324c9fe77dcbef9e43f5b7885866 |
libvolume_id-devel-095-14.19.el5.ppc.rpm | SHA-256: c0cd740d0824ff72157480114021be8a32263e92878eb19a3edfc9e660198bd7 |
libvolume_id-devel-095-14.19.el5.ppc64.rpm | SHA-256: bc79afad13b4adaa01b2640f561db453a8b891c76f8f3d29718c2952b5e1328a |
udev-095-14.19.el5.ppc.rpm | SHA-256: c3438a68ba65313f476f800f160bf035da986444b44e869bb1b0b73ced0d535a |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
udev-095-14.19.el5.src.rpm | SHA-256: 94d63999376f4a09274e865799213bc245931ac8a4d2902d963f276cea06a8a1 |
x86_64 | |
libvolume_id-095-14.19.el5.i386.rpm | SHA-256: a6a19c15b94e7e54788ff69dfc276dded670dfecbfcef03d5842d69ac2d699cf |
libvolume_id-095-14.19.el5.x86_64.rpm | SHA-256: c10f8a01ef07d37e3b1cb0bd04369a15ebd0db7011e306c46fc832c6c5a77765 |
libvolume_id-devel-095-14.19.el5.i386.rpm | SHA-256: 95559c3107f80b459c0c8516c3d3a1008ed3109bf2266496f497ba46016a333c |
libvolume_id-devel-095-14.19.el5.x86_64.rpm | SHA-256: a3d3e6cc6caee71f5d6c6f02c76f1f7df954dfc6bbd422648a2810fac8c63e0d |
udev-095-14.19.el5.x86_64.rpm | SHA-256: fbfa2f3c4577caa2687a3f248e20058c9e882816a15bda5a0a2cb74d7aa36fea |
i386 | |
libvolume_id-095-14.19.el5.i386.rpm | SHA-256: a6a19c15b94e7e54788ff69dfc276dded670dfecbfcef03d5842d69ac2d699cf |
libvolume_id-devel-095-14.19.el5.i386.rpm | SHA-256: 95559c3107f80b459c0c8516c3d3a1008ed3109bf2266496f497ba46016a333c |
udev-095-14.19.el5.i386.rpm | SHA-256: 26518cef04a33f854e877948a9db57f5009cedaf0a87c269508ce02f282eeea4 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.