- Issued:
- 2009-05-18
- Updated:
- 2009-05-18
RHBA-2009:1005 - Bug Fix Advisory
Synopsis
firstboot bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated firstboot package that fixes a bug is now available.
Description
The firstboot utility runs after system installation. It guides the user
through a series of steps that allows for easier configuration of the machine.
This updated package fixes the following bug:
- on systems with two or more processors, a race condition existed between
the X server starting and firstboot detecting it had started. If setxkbmap
started and finished before metacity started, a "-terminate" command line
argument sent to the X server by firstrun.py caused the X server to exit
when the last running X client exited. By the time metacity was ready to
start, no X server was available, so metacity would exit with an error
message ("unable to open X display :1"). Firstboot no longer includes the
"- terminate" command line argument, thus avoiding this race.
Users should upgrade to this updated package, which resolves this issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 155016 - firstboot fails "could not open display"
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
firstboot-1.3.39-7.src.rpm | SHA-256: 5821d517c9ae32e7bc51e48a2b903efdc187b80e53f78882255eefef052a6d31 |
x86_64 | |
firstboot-1.3.39-7.noarch.rpm | SHA-256: 9d894b48bed84e6fd55eb6d908e68fd9823ad56ad55c2277d69b6228a23443b2 |
firstboot-1.3.39-7.noarch.rpm | SHA-256: 9d894b48bed84e6fd55eb6d908e68fd9823ad56ad55c2277d69b6228a23443b2 |
ia64 | |
firstboot-1.3.39-7.noarch.rpm | SHA-256: 9d894b48bed84e6fd55eb6d908e68fd9823ad56ad55c2277d69b6228a23443b2 |
firstboot-1.3.39-7.noarch.rpm | SHA-256: 9d894b48bed84e6fd55eb6d908e68fd9823ad56ad55c2277d69b6228a23443b2 |
i386 | |
firstboot-1.3.39-7.noarch.rpm | SHA-256: 9d894b48bed84e6fd55eb6d908e68fd9823ad56ad55c2277d69b6228a23443b2 |
firstboot-1.3.39-7.noarch.rpm | SHA-256: 9d894b48bed84e6fd55eb6d908e68fd9823ad56ad55c2277d69b6228a23443b2 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
firstboot-1.3.39-7.src.rpm | SHA-256: 5821d517c9ae32e7bc51e48a2b903efdc187b80e53f78882255eefef052a6d31 |
x86_64 | |
firstboot-1.3.39-7.noarch.rpm | SHA-256: 9d894b48bed84e6fd55eb6d908e68fd9823ad56ad55c2277d69b6228a23443b2 |
ia64 | |
firstboot-1.3.39-7.noarch.rpm | SHA-256: 9d894b48bed84e6fd55eb6d908e68fd9823ad56ad55c2277d69b6228a23443b2 |
i386 | |
firstboot-1.3.39-7.noarch.rpm | SHA-256: 9d894b48bed84e6fd55eb6d908e68fd9823ad56ad55c2277d69b6228a23443b2 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
firstboot-1.3.39-7.src.rpm | SHA-256: 5821d517c9ae32e7bc51e48a2b903efdc187b80e53f78882255eefef052a6d31 |
x86_64 | |
firstboot-1.3.39-7.noarch.rpm | SHA-256: 9d894b48bed84e6fd55eb6d908e68fd9823ad56ad55c2277d69b6228a23443b2 |
i386 | |
firstboot-1.3.39-7.noarch.rpm | SHA-256: 9d894b48bed84e6fd55eb6d908e68fd9823ad56ad55c2277d69b6228a23443b2 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
firstboot-1.3.39-7.src.rpm | SHA-256: 5821d517c9ae32e7bc51e48a2b903efdc187b80e53f78882255eefef052a6d31 |
ppc | |
firstboot-1.3.39-7.noarch.rpm | SHA-256: 9d894b48bed84e6fd55eb6d908e68fd9823ad56ad55c2277d69b6228a23443b2 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.