- Issued:
- 2011-02-16
- Updated:
- 2011-02-16
RHBA-2011:0232 - Bug Fix Advisory
Synopsis
udev bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated udev package that fixes three bugs is now available for Red Hat
Enterprise Linux 4.
Description
The udev package implements a dynamic device directory providing only the
devices present on the system. This dynamic directory runs in user-space,
dynamically creates and removes devices, provides consistent naming and a
user-space API. udev replaces devfs in order to provide greater hot plug
functionality.
This update fixes the following bugs:
- Previously, the dasd_id callout created temporary device nodes to check the
device IDs, which were not cleaned up correctly. Due to this behavior, /tmp
contained a large amount of temporary device nodes. This update improves the
cleanup procedure of dasd_id. No more temporary device nodes are left in /tmp.
(BZ#457387)
- Previously, the scsi_id callout could not query cciss devices for information.
Due to this behavior, scsi_id returned no id string for cciss devices. This
update extends the scsi ID to handle cciss devices, and scsi_id now returns id
strings for cciss devices. (BZ#493937)
- Previously, the udev package did not contain explicit permission entries for
ttyACM devices. Due to this behavior, ttyACM devices were assigned the default
permissions, preventing the uucp group from having read/write access. This
update adds an explicit permission entry to the udev permission file to assign
ttyACM devices to the uucp group. The uucp group now has read/write access to
ttyACM devices. (BZ#496967)
All udev users are advised to upgrade to this updated package, which fixes these
bugs.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 496967 - Udev needs permissions entry for ACM devices.
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
udev-039-10.30.el4.src.rpm | SHA-256: 8fc7e3cc7403c79e762191f973607aae2f65c6eab73cef94db800e6ca1b12626 |
x86_64 | |
udev-039-10.30.el4.x86_64.rpm | SHA-256: 751fc10d4d9be3362b1aefe4158db33ca7bee3445fd1893e637ec3e307712069 |
udev-039-10.30.el4.x86_64.rpm | SHA-256: 751fc10d4d9be3362b1aefe4158db33ca7bee3445fd1893e637ec3e307712069 |
ia64 | |
udev-039-10.30.el4.ia64.rpm | SHA-256: 92ca86c368985172e19c32d6db6df66178a17d8cf3e18304bf01d951238f3eed |
udev-039-10.30.el4.ia64.rpm | SHA-256: 92ca86c368985172e19c32d6db6df66178a17d8cf3e18304bf01d951238f3eed |
i386 | |
udev-039-10.30.el4.i386.rpm | SHA-256: b07bf8ad0f44553b52bedc43375556e4afed63d417aea6d902af03b04e9e00a4 |
udev-039-10.30.el4.i386.rpm | SHA-256: b07bf8ad0f44553b52bedc43375556e4afed63d417aea6d902af03b04e9e00a4 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
udev-039-10.30.el4.src.rpm | SHA-256: 8fc7e3cc7403c79e762191f973607aae2f65c6eab73cef94db800e6ca1b12626 |
x86_64 | |
udev-039-10.30.el4.x86_64.rpm | SHA-256: 751fc10d4d9be3362b1aefe4158db33ca7bee3445fd1893e637ec3e307712069 |
ia64 | |
udev-039-10.30.el4.ia64.rpm | SHA-256: 92ca86c368985172e19c32d6db6df66178a17d8cf3e18304bf01d951238f3eed |
i386 | |
udev-039-10.30.el4.i386.rpm | SHA-256: b07bf8ad0f44553b52bedc43375556e4afed63d417aea6d902af03b04e9e00a4 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
udev-039-10.30.el4.src.rpm | SHA-256: 8fc7e3cc7403c79e762191f973607aae2f65c6eab73cef94db800e6ca1b12626 |
x86_64 | |
udev-039-10.30.el4.x86_64.rpm | SHA-256: 751fc10d4d9be3362b1aefe4158db33ca7bee3445fd1893e637ec3e307712069 |
i386 | |
udev-039-10.30.el4.i386.rpm | SHA-256: b07bf8ad0f44553b52bedc43375556e4afed63d417aea6d902af03b04e9e00a4 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
udev-039-10.30.el4.src.rpm | SHA-256: 8fc7e3cc7403c79e762191f973607aae2f65c6eab73cef94db800e6ca1b12626 |
s390x | |
udev-039-10.30.el4.s390x.rpm | SHA-256: 6aef5dbbd69783c4d779937759b8c676374348e65a63755e08e9d8968f05d0b7 |
s390 | |
udev-039-10.30.el4.s390.rpm | SHA-256: 3d1847ab8ec99952cdeaae116c6bcd0cedbf30670481b914d7d434ce17bdb7da |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
udev-039-10.30.el4.src.rpm | SHA-256: 8fc7e3cc7403c79e762191f973607aae2f65c6eab73cef94db800e6ca1b12626 |
ppc | |
udev-039-10.30.el4.ppc.rpm | SHA-256: 77286c3db516607d0adc26455b66360a3e71de590a3a2ed1f53e7f99f7415287 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.