- Issued:
- 2009-05-18
- Updated:
- 2009-05-18
RHBA-2009:0255 - Bug Fix Advisory
Synopsis
isdn4k-utils bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated isdn4k-utils packages that resolve two init script bugs are now
available.
Description
The isdn4k-utils packages contain a collection of utilities needed for
configuring an ISDN subsystem.
These updated isdn4k-utils packages provide fixes for the following bugs:
- the capi and isdn init scripts incorrectly exited with '0' error codes
(program is running or service is OK) in several circumstances. These
updated packages include corrected capi and isdn init scripts that exit
with error codes 5 (program is not installed) and 6 (program is not
configured) as appropriate. The new init scripts also add checks for the
correct privileges and exist with an error code 4 (user had insufficient
privilege) if privileges are not sufficient.
All ISDN users should to upgrade to these updated isdn4k-utils packages,
which fix these bugs.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 242495 - Wrong init script
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
isdn4k-utils-3.2-19.el4.src.rpm | SHA-256: 5aa67c9ee6e7c6e8e2a62131992881be34ce0636bddd7aadd809f6fd29f2a39f |
x86_64 | |
isdn4k-utils-3.2-19.el4.x86_64.rpm | SHA-256: 63623e556317d145ebdb3757e737b69e3a491bba321daadf7e0a8954f4061e1b |
isdn4k-utils-3.2-19.el4.x86_64.rpm | SHA-256: 63623e556317d145ebdb3757e737b69e3a491bba321daadf7e0a8954f4061e1b |
isdn4k-utils-devel-3.2-19.el4.x86_64.rpm | SHA-256: deb5be74eba5c2f70eeeedca0e2e00c451b6de4d7f2a6712eb8148164307006c |
isdn4k-utils-devel-3.2-19.el4.x86_64.rpm | SHA-256: deb5be74eba5c2f70eeeedca0e2e00c451b6de4d7f2a6712eb8148164307006c |
isdn4k-utils-vboxgetty-3.2-19.el4.x86_64.rpm | SHA-256: 8c9d8c5f05f9afcb54fb1990ccb6345293f994a18144773ed0c69949cf459035 |
isdn4k-utils-vboxgetty-3.2-19.el4.x86_64.rpm | SHA-256: 8c9d8c5f05f9afcb54fb1990ccb6345293f994a18144773ed0c69949cf459035 |
xisdnload-3.2-19.el4.x86_64.rpm | SHA-256: 8bf5f33e0366d4e93236ca84b19238cc01a0a782269acbb890c76df0d0976f4f |
xisdnload-3.2-19.el4.x86_64.rpm | SHA-256: 8bf5f33e0366d4e93236ca84b19238cc01a0a782269acbb890c76df0d0976f4f |
ia64 | |
isdn4k-utils-3.2-19.el4.ia64.rpm | SHA-256: 0bf6d63a1cdbf6a842b816574ced849d5a11adb458891742c3cba4f7f284ce2d |
isdn4k-utils-3.2-19.el4.ia64.rpm | SHA-256: 0bf6d63a1cdbf6a842b816574ced849d5a11adb458891742c3cba4f7f284ce2d |
isdn4k-utils-devel-3.2-19.el4.ia64.rpm | SHA-256: 8253133b71f24ad303e5438f2e9a644979f9ede68c7493057cc47ddee30111b1 |
isdn4k-utils-devel-3.2-19.el4.ia64.rpm | SHA-256: 8253133b71f24ad303e5438f2e9a644979f9ede68c7493057cc47ddee30111b1 |
isdn4k-utils-vboxgetty-3.2-19.el4.ia64.rpm | SHA-256: 33264591161f175054c8dbdf0f5301422df42136753daff8586017e126ab2abc |
isdn4k-utils-vboxgetty-3.2-19.el4.ia64.rpm | SHA-256: 33264591161f175054c8dbdf0f5301422df42136753daff8586017e126ab2abc |
xisdnload-3.2-19.el4.ia64.rpm | SHA-256: 1550c836a9897a98e2afaff2cf1e4b3c776ac53915aae70446ceb66b32810d4d |
xisdnload-3.2-19.el4.ia64.rpm | SHA-256: 1550c836a9897a98e2afaff2cf1e4b3c776ac53915aae70446ceb66b32810d4d |
i386 | |
isdn4k-utils-3.2-19.el4.i386.rpm | SHA-256: 4365e5351ba83962f780872889928fa9f179bd9339b6dc7814a9bfa5c922103d |
isdn4k-utils-3.2-19.el4.i386.rpm | SHA-256: 4365e5351ba83962f780872889928fa9f179bd9339b6dc7814a9bfa5c922103d |
isdn4k-utils-devel-3.2-19.el4.i386.rpm | SHA-256: dda949f83736cf503cf4456970dc69079aa9bb559f731a64f6fcb29013626382 |
isdn4k-utils-devel-3.2-19.el4.i386.rpm | SHA-256: dda949f83736cf503cf4456970dc69079aa9bb559f731a64f6fcb29013626382 |
isdn4k-utils-vboxgetty-3.2-19.el4.i386.rpm | SHA-256: a12ac78a4bb4098de2858eaef1bba044ae0b16b6d50ef25146c00da846034abf |
isdn4k-utils-vboxgetty-3.2-19.el4.i386.rpm | SHA-256: a12ac78a4bb4098de2858eaef1bba044ae0b16b6d50ef25146c00da846034abf |
xisdnload-3.2-19.el4.i386.rpm | SHA-256: fafd57e8ac4470f1b9ecd335482bf6bff4d9f56a56f27e36fa6d948b59d3b2b1 |
xisdnload-3.2-19.el4.i386.rpm | SHA-256: fafd57e8ac4470f1b9ecd335482bf6bff4d9f56a56f27e36fa6d948b59d3b2b1 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
isdn4k-utils-3.2-19.el4.src.rpm | SHA-256: 5aa67c9ee6e7c6e8e2a62131992881be34ce0636bddd7aadd809f6fd29f2a39f |
x86_64 | |
isdn4k-utils-3.2-19.el4.x86_64.rpm | SHA-256: 63623e556317d145ebdb3757e737b69e3a491bba321daadf7e0a8954f4061e1b |
isdn4k-utils-devel-3.2-19.el4.x86_64.rpm | SHA-256: deb5be74eba5c2f70eeeedca0e2e00c451b6de4d7f2a6712eb8148164307006c |
isdn4k-utils-vboxgetty-3.2-19.el4.x86_64.rpm | SHA-256: 8c9d8c5f05f9afcb54fb1990ccb6345293f994a18144773ed0c69949cf459035 |
xisdnload-3.2-19.el4.x86_64.rpm | SHA-256: 8bf5f33e0366d4e93236ca84b19238cc01a0a782269acbb890c76df0d0976f4f |
ia64 | |
isdn4k-utils-3.2-19.el4.ia64.rpm | SHA-256: 0bf6d63a1cdbf6a842b816574ced849d5a11adb458891742c3cba4f7f284ce2d |
isdn4k-utils-devel-3.2-19.el4.ia64.rpm | SHA-256: 8253133b71f24ad303e5438f2e9a644979f9ede68c7493057cc47ddee30111b1 |
isdn4k-utils-vboxgetty-3.2-19.el4.ia64.rpm | SHA-256: 33264591161f175054c8dbdf0f5301422df42136753daff8586017e126ab2abc |
xisdnload-3.2-19.el4.ia64.rpm | SHA-256: 1550c836a9897a98e2afaff2cf1e4b3c776ac53915aae70446ceb66b32810d4d |
i386 | |
isdn4k-utils-3.2-19.el4.i386.rpm | SHA-256: 4365e5351ba83962f780872889928fa9f179bd9339b6dc7814a9bfa5c922103d |
isdn4k-utils-devel-3.2-19.el4.i386.rpm | SHA-256: dda949f83736cf503cf4456970dc69079aa9bb559f731a64f6fcb29013626382 |
isdn4k-utils-vboxgetty-3.2-19.el4.i386.rpm | SHA-256: a12ac78a4bb4098de2858eaef1bba044ae0b16b6d50ef25146c00da846034abf |
xisdnload-3.2-19.el4.i386.rpm | SHA-256: fafd57e8ac4470f1b9ecd335482bf6bff4d9f56a56f27e36fa6d948b59d3b2b1 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
isdn4k-utils-3.2-19.el4.src.rpm | SHA-256: 5aa67c9ee6e7c6e8e2a62131992881be34ce0636bddd7aadd809f6fd29f2a39f |
x86_64 | |
isdn4k-utils-3.2-19.el4.x86_64.rpm | SHA-256: 63623e556317d145ebdb3757e737b69e3a491bba321daadf7e0a8954f4061e1b |
isdn4k-utils-devel-3.2-19.el4.x86_64.rpm | SHA-256: deb5be74eba5c2f70eeeedca0e2e00c451b6de4d7f2a6712eb8148164307006c |
isdn4k-utils-vboxgetty-3.2-19.el4.x86_64.rpm | SHA-256: 8c9d8c5f05f9afcb54fb1990ccb6345293f994a18144773ed0c69949cf459035 |
xisdnload-3.2-19.el4.x86_64.rpm | SHA-256: 8bf5f33e0366d4e93236ca84b19238cc01a0a782269acbb890c76df0d0976f4f |
i386 | |
isdn4k-utils-3.2-19.el4.i386.rpm | SHA-256: 4365e5351ba83962f780872889928fa9f179bd9339b6dc7814a9bfa5c922103d |
isdn4k-utils-devel-3.2-19.el4.i386.rpm | SHA-256: dda949f83736cf503cf4456970dc69079aa9bb559f731a64f6fcb29013626382 |
isdn4k-utils-vboxgetty-3.2-19.el4.i386.rpm | SHA-256: a12ac78a4bb4098de2858eaef1bba044ae0b16b6d50ef25146c00da846034abf |
xisdnload-3.2-19.el4.i386.rpm | SHA-256: fafd57e8ac4470f1b9ecd335482bf6bff4d9f56a56f27e36fa6d948b59d3b2b1 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
isdn4k-utils-3.2-19.el4.src.rpm | SHA-256: 5aa67c9ee6e7c6e8e2a62131992881be34ce0636bddd7aadd809f6fd29f2a39f |
ppc | |
isdn4k-utils-3.2-19.el4.ppc.rpm | SHA-256: 7c4765edc397e3a88c49f00a0e84fa510250c5859acac55efe2210809f44c748 |
isdn4k-utils-devel-3.2-19.el4.ppc.rpm | SHA-256: 5d0a89b1d58ddee791330d7e82ae0d55dc0ebcadd0676112109e8ef437116cb9 |
isdn4k-utils-vboxgetty-3.2-19.el4.ppc.rpm | SHA-256: b5a3fb291dfccd5ea5ca21480718b3e84375b6427eda65b567476022487aff4f |
xisdnload-3.2-19.el4.ppc.rpm | SHA-256: 35008e38d918a3edd6c179ce80b63f76823b2d968f9f24fddefcb7ca0ec80b04 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.