Skip to navigation

Bug Fix Advisory initscripts bug fix update

Advisory: RHBA-2008:0656-5
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2008-07-24
Last updated on: 2008-07-24
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)

Details

An updated initscripts package that fixes various bugs is now available.

The initscripts package contains the basic system scripts used to boot your
Red Hat system, change runlevels, and shut the system down cleanly.
Initscripts also contains the scripts that activate and de-activate most
network interfaces.

This updated initscripts package includes fixes for the following bugs:

* recursively-mounted NFS mounts now correctly unmount in the proper order,
which resolves an issue in which attempting to unmount nested NFS-mounted
partitions would result in an "Unmounting NFS filesystems: umount:
/mnt/<mount_point>: not found" error message.

* the "genhostid" command now correctly generates 32-bit host IDs
regardless of whether the host IDs are being generated on a 32- or 64-bit
system.

* the rc.sysinit script contained a race condition in which, on occasion,
the system would hang at boot while waiting for a key press.

All users of initscripts are advised to upgrade to this updated package,
which resolves these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
initscripts-7.93.33-1.el4.src.rpm
File outdated by:  RHBA-2010:0405
    MD5: 924356c6393d95441e7fe1777773b7b4
 
IA-32:
initscripts-7.93.33-1.el4.i386.rpm
File outdated by:  RHBA-2010:0405
    MD5: 9c8f0efdd41f026437c743bb015ab073
 
x86_64:
initscripts-7.93.33-1.el4.x86_64.rpm
File outdated by:  RHBA-2010:0405
    MD5: a3a0538ac90ffefbd67aa3205e07b094
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
initscripts-7.93.33-1.el4.src.rpm
File outdated by:  RHBA-2010:0405
    MD5: 924356c6393d95441e7fe1777773b7b4
 
IA-32:
initscripts-7.93.33-1.el4.i386.rpm
File outdated by:  RHBA-2010:0405
    MD5: 9c8f0efdd41f026437c743bb015ab073
 
IA-64:
initscripts-7.93.33-1.el4.ia64.rpm
File outdated by:  RHBA-2010:0405
    MD5: e657238d770e35ad21f5f8417cee9b86
 
PPC:
initscripts-7.93.33-1.el4.ppc.rpm
File outdated by:  RHBA-2010:0405
    MD5: 02aec6d947a9b06e3159c966bd4fb6e8
 
s390:
initscripts-7.93.33-1.el4.s390.rpm
File outdated by:  RHBA-2010:0405
    MD5: 71c79737196ebf0f22e1df47470c5641
 
s390x:
initscripts-7.93.33-1.el4.s390x.rpm
File outdated by:  RHBA-2010:0405
    MD5: 5754612e977b7eb20f74e4adc11e314c
 
x86_64:
initscripts-7.93.33-1.el4.x86_64.rpm
File outdated by:  RHBA-2010:0405
    MD5: a3a0538ac90ffefbd67aa3205e07b094
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
initscripts-7.93.33-1.el4.src.rpm
File outdated by:  RHBA-2010:0405
    MD5: 924356c6393d95441e7fe1777773b7b4
 
IA-32:
initscripts-7.93.33-1.el4.i386.rpm
File outdated by:  RHBA-2010:0405
    MD5: 9c8f0efdd41f026437c743bb015ab073
 
IA-64:
initscripts-7.93.33-1.el4.ia64.rpm
File outdated by:  RHBA-2010:0405
    MD5: e657238d770e35ad21f5f8417cee9b86
 
x86_64:
initscripts-7.93.33-1.el4.x86_64.rpm
File outdated by:  RHBA-2010:0405
    MD5: a3a0538ac90ffefbd67aa3205e07b094
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
initscripts-7.93.33-1.el4.src.rpm
File outdated by:  RHBA-2010:0405
    MD5: 924356c6393d95441e7fe1777773b7b4
 
IA-32:
initscripts-7.93.33-1.el4.i386.rpm
File outdated by:  RHBA-2010:0405
    MD5: 9c8f0efdd41f026437c743bb015ab073
 
IA-64:
initscripts-7.93.33-1.el4.ia64.rpm
File outdated by:  RHBA-2010:0405
    MD5: e657238d770e35ad21f5f8417cee9b86
 
x86_64:
initscripts-7.93.33-1.el4.x86_64.rpm
File outdated by:  RHBA-2010:0405
    MD5: a3a0538ac90ffefbd67aa3205e07b094
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/