- Issued:
- 2014-10-13
- Updated:
- 2014-10-13
RHEA-2014:1429 - Product Enhancement Advisory
Synopsis
libvpd enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated libvpd packages that add various enhancements are now available for Red
Hat Enterprise Linux 6.
Description
The libvpd packages contain the classes that are used to access Vital
Product Data (VPD) created by vpdupdate in the lsvpd package.
The libvpd packages have been upgraded to upstream version 2.2.3, which provides
a number of enhancements over the previous version. Specifically, the updated
libvpd packages prevent segmentation faults from occurring when fetching the
corrupted Vital Product Data (VPD) database. In addition, support for vpdupdate
command automation has been added for cases of changes happening to device
configuration on run time. During hot plugs, the changes made to the device
configuration are now caught by an udev rule and are handled by libvpd
correctly. (BZ#739122)
Users of libvpd are advised to upgrade to these updated packages, which add
these enhancements.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
libvpd-2.2.3-1.el6.src.rpm | SHA-256: 5df77c01bab71455c2638a4b7fdcc7e256b70e94b012222b9474e44453d1b619 |
ppc64 | |
libvpd-2.2.3-1.el6.ppc.rpm | SHA-256: 3a5d5e63f973b1f68dd66d5b89f8a744e91659307d02999ffa655e259cc6166a |
libvpd-2.2.3-1.el6.ppc64.rpm | SHA-256: 13ad1ae3b413f14edb21825a08b64a1039f200e52668639037dd899c03ab508b |
libvpd-debuginfo-2.2.3-1.el6.ppc.rpm | SHA-256: 89d2909a05b2e7e35408b1e76e70de9bccee699dece98bc7dc2a04fa83f18d4c |
libvpd-debuginfo-2.2.3-1.el6.ppc.rpm | SHA-256: 89d2909a05b2e7e35408b1e76e70de9bccee699dece98bc7dc2a04fa83f18d4c |
libvpd-debuginfo-2.2.3-1.el6.ppc64.rpm | SHA-256: 0298bdcbd8d2b9082c348adc12117bf89b721edc3109ea4197498f08ded42b53 |
libvpd-debuginfo-2.2.3-1.el6.ppc64.rpm | SHA-256: 0298bdcbd8d2b9082c348adc12117bf89b721edc3109ea4197498f08ded42b53 |
libvpd-devel-2.2.3-1.el6.ppc.rpm | SHA-256: 9570b26b29d103f1d37d46b2ce4a6ab4240ab1ef32e36ad5d2649346cd97795e |
libvpd-devel-2.2.3-1.el6.ppc64.rpm | SHA-256: ee16946f6d286024f280ac2acff1b93b90e0e633e2dc34dd74755905dc85b5b2 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.