- Issued:
- 2006-09-27
- Updated:
- 2007-05-01
RHBA-2006:0672 - Bug Fix Advisory
Synopsis
kbd bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated kbd packages that fix various bugs are now available.
Description
The kbd package contains tools for managing a Linux system's console
behavior, including the keyboard, screen fonts, virtual terminals,
and font files.
Bugs fixed in this update include:
- The kbd-1.08-10.2 package in Red Hat Enterprise Linux v.3 contains an
incorrect %triggerun scriptlet. This prevents removing the kbd package,
and on upgrades to Red Hat Enterprise Linux v. 4, the old package version
cannot be removed from the RPM database. This package contains
a workaround to the scriptlet bug.
- The resizecons.8 man page was unnecessarily provided on architectures
where the resizecons command is not available
- The unicode_start command was reporting error messages when run on
kernels with the CVE-2005-3257 vulnerability fixed.
Users are advised to upgrade to these updated kbd packages, which resolve
these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 169623 - %triggerun refers to incorrect version
- BZ - 186877 - resizecons.8 man page useless on non-x86
- BZ - 191477 - avoid trying to reload the keyboard mapping as user
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
kbd-1.12-2.el4.4.src.rpm | SHA-256: 1bfa79321c72ec3e4cc06eda4fc33c0a2872b691a59fd1ef046b33044c4f9e8d |
x86_64 | |
kbd-1.12-2.el4.4.x86_64.rpm | SHA-256: 7811071e0cd762f986a2789a46588a53d34d392e051285b48d273672f7eb0b4f |
kbd-1.12-2.el4.4.x86_64.rpm | SHA-256: 7811071e0cd762f986a2789a46588a53d34d392e051285b48d273672f7eb0b4f |
ia64 | |
kbd-1.12-2.el4.4.ia64.rpm | SHA-256: 6397cb0287d288b0d4fb356c7949a74d063472a0288f9329c315a9f5e3253b79 |
kbd-1.12-2.el4.4.ia64.rpm | SHA-256: 6397cb0287d288b0d4fb356c7949a74d063472a0288f9329c315a9f5e3253b79 |
i386 | |
kbd-1.12-2.el4.4.i386.rpm | SHA-256: e382bd1c60133dd3703aaad78f1f8f0e9c555495b2990d14eae454ceab074891 |
kbd-1.12-2.el4.4.i386.rpm | SHA-256: e382bd1c60133dd3703aaad78f1f8f0e9c555495b2990d14eae454ceab074891 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
kbd-1.12-2.el4.4.src.rpm | SHA-256: 1bfa79321c72ec3e4cc06eda4fc33c0a2872b691a59fd1ef046b33044c4f9e8d |
x86_64 | |
kbd-1.12-2.el4.4.x86_64.rpm | SHA-256: 7811071e0cd762f986a2789a46588a53d34d392e051285b48d273672f7eb0b4f |
ia64 | |
kbd-1.12-2.el4.4.ia64.rpm | SHA-256: 6397cb0287d288b0d4fb356c7949a74d063472a0288f9329c315a9f5e3253b79 |
i386 | |
kbd-1.12-2.el4.4.i386.rpm | SHA-256: e382bd1c60133dd3703aaad78f1f8f0e9c555495b2990d14eae454ceab074891 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
kbd-1.12-2.el4.4.src.rpm | SHA-256: 1bfa79321c72ec3e4cc06eda4fc33c0a2872b691a59fd1ef046b33044c4f9e8d |
x86_64 | |
kbd-1.12-2.el4.4.x86_64.rpm | SHA-256: 7811071e0cd762f986a2789a46588a53d34d392e051285b48d273672f7eb0b4f |
i386 | |
kbd-1.12-2.el4.4.i386.rpm | SHA-256: e382bd1c60133dd3703aaad78f1f8f0e9c555495b2990d14eae454ceab074891 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
kbd-1.12-2.el4.4.src.rpm | SHA-256: 1bfa79321c72ec3e4cc06eda4fc33c0a2872b691a59fd1ef046b33044c4f9e8d |
ppc | |
kbd-1.12-2.el4.4.ppc.rpm | SHA-256: 518231ffc8882f8ec9bc0f037c48db093c145667a61181d354fe0d0e716cdd66 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.