- Issued:
- 2009-09-02
- Updated:
- 2009-09-02
RHBA-2009:1346 - Bug Fix Advisory
Synopsis
udev bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated udev packages that fix a bug and add an enhancement are now
available.
Description
The udev packages implement a dynamic device-directory, providing only the
devices present on the system. This dynamic directory runs in user-space,
dynamically creates and removes devices, provides consistent naming, and a
user-space API. udev replaces devfs, providing greater hot plug
functionality.
These updated packages fix the following bug:
- leftover queue files from the udev instance of the initrd, caused a stall
in the udev started from rc.sysinit. In this update the files are removed
before starting the daemon in rc.sysinit. (BZ#487858)
These updated packages add the following enhancement:
- scsi_id was extended to query the ID of cciss devices, which do not
provide information in the /sys filesystem. This enables the creation of
persistent symbolic links in /dev/disk for cciss devices. (BZ#449057)
Users of udev are advised to upgrade to these updated packages, which
resolve this issue and add this enhancement.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 487858 - Should clean up before starting
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
udev-095-14.21.el5.src.rpm | SHA-256: d992999976cf2fa35185fd445cc40c988cf0b7c3557e974daa7947f977427894 |
x86_64 | |
libvolume_id-095-14.21.el5.i386.rpm | SHA-256: f8426a167e1c1b9e1af4275bd048930fffbc592d60f2020f19ad40addee449f8 |
libvolume_id-095-14.21.el5.x86_64.rpm | SHA-256: 3688769f8af9f6088f0b33b5e9306948434242715b024d27f6fb939c923e8c04 |
libvolume_id-devel-095-14.21.el5.i386.rpm | SHA-256: d226e380947ff2a93304f63ed081fc79beb2f096d5ca7bf1681d8ba90ad30612 |
libvolume_id-devel-095-14.21.el5.x86_64.rpm | SHA-256: 534effe3fd727700b13fecc1a8256a6bb38cf827fbbed052b2ae4411155dec69 |
udev-095-14.21.el5.x86_64.rpm | SHA-256: 954b674fc018c4053ec463ddf4d6124f6eba99f0fda9eb5caff3481b6f367520 |
ia64 | |
libvolume_id-095-14.21.el5.ia64.rpm | SHA-256: 99bad15bc3e4a4a42c4f09db5774ec8c622725ecc5137b2e002624228ea60af3 |
libvolume_id-devel-095-14.21.el5.ia64.rpm | SHA-256: f6f9c0a19d0462b1f19569965a43d6b5a56e907a3aa3204a7a1b9532ae385331 |
udev-095-14.21.el5.ia64.rpm | SHA-256: a9286c5b99e3886a91029d2ae1ccacc58b510d4e82c5c1dfd12aaf321926d4cd |
i386 | |
libvolume_id-095-14.21.el5.i386.rpm | SHA-256: f8426a167e1c1b9e1af4275bd048930fffbc592d60f2020f19ad40addee449f8 |
libvolume_id-devel-095-14.21.el5.i386.rpm | SHA-256: d226e380947ff2a93304f63ed081fc79beb2f096d5ca7bf1681d8ba90ad30612 |
udev-095-14.21.el5.i386.rpm | SHA-256: 2b5997dc82f33af9a072e3f67dad229da4d4ffbd9a51aaf49ac13ad83e2548ae |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
udev-095-14.21.el5.src.rpm | SHA-256: d992999976cf2fa35185fd445cc40c988cf0b7c3557e974daa7947f977427894 |
x86_64 | |
libvolume_id-095-14.21.el5.i386.rpm | SHA-256: f8426a167e1c1b9e1af4275bd048930fffbc592d60f2020f19ad40addee449f8 |
libvolume_id-095-14.21.el5.x86_64.rpm | SHA-256: 3688769f8af9f6088f0b33b5e9306948434242715b024d27f6fb939c923e8c04 |
libvolume_id-devel-095-14.21.el5.i386.rpm | SHA-256: d226e380947ff2a93304f63ed081fc79beb2f096d5ca7bf1681d8ba90ad30612 |
libvolume_id-devel-095-14.21.el5.x86_64.rpm | SHA-256: 534effe3fd727700b13fecc1a8256a6bb38cf827fbbed052b2ae4411155dec69 |
udev-095-14.21.el5.x86_64.rpm | SHA-256: 954b674fc018c4053ec463ddf4d6124f6eba99f0fda9eb5caff3481b6f367520 |
i386 | |
libvolume_id-095-14.21.el5.i386.rpm | SHA-256: f8426a167e1c1b9e1af4275bd048930fffbc592d60f2020f19ad40addee449f8 |
libvolume_id-devel-095-14.21.el5.i386.rpm | SHA-256: d226e380947ff2a93304f63ed081fc79beb2f096d5ca7bf1681d8ba90ad30612 |
udev-095-14.21.el5.i386.rpm | SHA-256: 2b5997dc82f33af9a072e3f67dad229da4d4ffbd9a51aaf49ac13ad83e2548ae |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
udev-095-14.21.el5.src.rpm | SHA-256: d992999976cf2fa35185fd445cc40c988cf0b7c3557e974daa7947f977427894 |
x86_64 | |
libvolume_id-095-14.21.el5.i386.rpm | SHA-256: f8426a167e1c1b9e1af4275bd048930fffbc592d60f2020f19ad40addee449f8 |
libvolume_id-095-14.21.el5.x86_64.rpm | SHA-256: 3688769f8af9f6088f0b33b5e9306948434242715b024d27f6fb939c923e8c04 |
udev-095-14.21.el5.x86_64.rpm | SHA-256: 954b674fc018c4053ec463ddf4d6124f6eba99f0fda9eb5caff3481b6f367520 |
i386 | |
libvolume_id-095-14.21.el5.i386.rpm | SHA-256: f8426a167e1c1b9e1af4275bd048930fffbc592d60f2020f19ad40addee449f8 |
udev-095-14.21.el5.i386.rpm | SHA-256: 2b5997dc82f33af9a072e3f67dad229da4d4ffbd9a51aaf49ac13ad83e2548ae |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
udev-095-14.21.el5.src.rpm | SHA-256: d992999976cf2fa35185fd445cc40c988cf0b7c3557e974daa7947f977427894 |
s390x | |
libvolume_id-095-14.21.el5.s390.rpm | SHA-256: 2b85adef367a4901bea72b4a0b54d98968ead68cbd0e8d95dd4260c810cd42e0 |
libvolume_id-095-14.21.el5.s390x.rpm | SHA-256: 14684bb382e610d45e598938fd265bcb0b6552aee61eedaafc8c4d7777ac9265 |
libvolume_id-devel-095-14.21.el5.s390.rpm | SHA-256: eefe89ee83359829042327d2837bab572ffb293f48af47b5ed33c02a74fc9f35 |
libvolume_id-devel-095-14.21.el5.s390x.rpm | SHA-256: dd2869c2d05521bbed828b8705e7f9381fa71530a530e1af54235bea7facc4fa |
udev-095-14.21.el5.s390x.rpm | SHA-256: 155f2b5c043ce4aaadd345737f0bb5854adb4573557daf5378063b9b18398a96 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
udev-095-14.21.el5.src.rpm | SHA-256: d992999976cf2fa35185fd445cc40c988cf0b7c3557e974daa7947f977427894 |
ppc | |
libvolume_id-095-14.21.el5.ppc.rpm | SHA-256: cb3e2625d67e270afd0358657fa04ebac311dbecc62137b451375ac54c3d03d8 |
libvolume_id-095-14.21.el5.ppc64.rpm | SHA-256: 1c4239d9d26bd59e5b7637b081338c3922e063a21b7a1fd9b74add860a55ff3e |
libvolume_id-devel-095-14.21.el5.ppc.rpm | SHA-256: 0655e255769c351f4f902d574d0b4df9742283c07a7bf56b9714e8357f80e9af |
libvolume_id-devel-095-14.21.el5.ppc64.rpm | SHA-256: 0f6fc678e6ddfbe42ba72db4ebf4322b9a9a8b6abee404910606a6179b1c84ac |
udev-095-14.21.el5.ppc.rpm | SHA-256: 2ddb3b5c8e5fe9fbf75ef8b6919401ce0c15dba9bc7e779cfa9388dc52db5285 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
udev-095-14.21.el5.src.rpm | SHA-256: d992999976cf2fa35185fd445cc40c988cf0b7c3557e974daa7947f977427894 |
x86_64 | |
libvolume_id-095-14.21.el5.i386.rpm | SHA-256: f8426a167e1c1b9e1af4275bd048930fffbc592d60f2020f19ad40addee449f8 |
libvolume_id-095-14.21.el5.x86_64.rpm | SHA-256: 3688769f8af9f6088f0b33b5e9306948434242715b024d27f6fb939c923e8c04 |
libvolume_id-devel-095-14.21.el5.i386.rpm | SHA-256: d226e380947ff2a93304f63ed081fc79beb2f096d5ca7bf1681d8ba90ad30612 |
libvolume_id-devel-095-14.21.el5.x86_64.rpm | SHA-256: 534effe3fd727700b13fecc1a8256a6bb38cf827fbbed052b2ae4411155dec69 |
udev-095-14.21.el5.x86_64.rpm | SHA-256: 954b674fc018c4053ec463ddf4d6124f6eba99f0fda9eb5caff3481b6f367520 |
i386 | |
libvolume_id-095-14.21.el5.i386.rpm | SHA-256: f8426a167e1c1b9e1af4275bd048930fffbc592d60f2020f19ad40addee449f8 |
libvolume_id-devel-095-14.21.el5.i386.rpm | SHA-256: d226e380947ff2a93304f63ed081fc79beb2f096d5ca7bf1681d8ba90ad30612 |
udev-095-14.21.el5.i386.rpm | SHA-256: 2b5997dc82f33af9a072e3f67dad229da4d4ffbd9a51aaf49ac13ad83e2548ae |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.