- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHBA-2009:0093 - Bug Fix Advisory
Synopsis
module-init-tools bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An enhanced module-init-tools package that fixes various bugs and provides
an enhancement is now available.
Description
module-init-tools is a package that provides utilities that are used for
loading and unloading Linux kernel modules.
This updated module-init-tools package includes fixes for the following bugs:
- module-init-tools provides the modprobe utility to add and remove modules
from the Linux kernel. When removing kernel modules with modprobe, blocking
mode was enabled by default, which could have resulted in deadlock. In this
updated package, modprobe does not enable blocking mode by default, thus
removing the potential for deadlock and resolving the issue.
- the '--delete-modules' option has been added to the /sbin/weak-modules
script in order to prevent it from attempting to locate a compatible
replacement driver update when removing driver updates.
- on the x86 architecture, when block device encryption was being used and
no VIA padlock device was present, the insmod command for installing
loadable kernel modules would display the following dire warning message:
"insmod: error inserting '/lib/padlock.ko': -1 No such device". As using
block device encryption without a VIA padlock device is quite common, this
error message has been changed to be more informative in nature, so that it
does not sound as if an essential component is missing from the system.
In addition, this updated module-init-tools package provides the following
enhancements:
- a wildcard kernel-matching option has been added to the depmod.conf
configuration file to allow specific releases of the kernel to match on a
given driver update.
- reduced warnings on module alias loads whenever multiple modules match a
given alias identity. This will, for example, remove warnings concerning
non-existent hardware at module load time. This specifically addresses
undesirable warnings generated by the kernel "padlock" driver.
All users of module-init-tools are advised to upgrade to this updated
package, which resolves these issues and provides this enhancement.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 280411 - Need to fix modprobe to default to operating in non-blocking mode
- BZ - 432959 - weak-modules --remove-modules does not remove soft links
- BZ - 458134 - insmod error from padlock.ko
- BZ - 460046 - Wildcard support for kernel matching in module-init-tools
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.42.el5.src.rpm | SHA-256: 1e234b6d89a0c71a3a30c4093855569dcee259809e5beb175bf14aa94406398f |
x86_64 | |
module-init-tools-3.3-0.pre3.1.42.el5.x86_64.rpm | SHA-256: 67c0d21e2f5b62a5f86fd8b4bc7a462529a82568b8b656e3cf2bb2092dd8be9d |
ia64 | |
module-init-tools-3.3-0.pre3.1.42.el5.ia64.rpm | SHA-256: aa920bae6dea6e08c066c3a510c6038519eaf650f6c231e47279e11ece2be9bc |
i386 | |
module-init-tools-3.3-0.pre3.1.42.el5.i386.rpm | SHA-256: 45dfad9ea226298652db201b0e7cbbdff42029236ed921bb5c0626349a8154eb |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.42.el5.src.rpm | SHA-256: 1e234b6d89a0c71a3a30c4093855569dcee259809e5beb175bf14aa94406398f |
x86_64 | |
module-init-tools-3.3-0.pre3.1.42.el5.x86_64.rpm | SHA-256: 67c0d21e2f5b62a5f86fd8b4bc7a462529a82568b8b656e3cf2bb2092dd8be9d |
i386 | |
module-init-tools-3.3-0.pre3.1.42.el5.i386.rpm | SHA-256: 45dfad9ea226298652db201b0e7cbbdff42029236ed921bb5c0626349a8154eb |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.42.el5.src.rpm | SHA-256: 1e234b6d89a0c71a3a30c4093855569dcee259809e5beb175bf14aa94406398f |
x86_64 | |
module-init-tools-3.3-0.pre3.1.42.el5.x86_64.rpm | SHA-256: 67c0d21e2f5b62a5f86fd8b4bc7a462529a82568b8b656e3cf2bb2092dd8be9d |
i386 | |
module-init-tools-3.3-0.pre3.1.42.el5.i386.rpm | SHA-256: 45dfad9ea226298652db201b0e7cbbdff42029236ed921bb5c0626349a8154eb |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.42.el5.src.rpm | SHA-256: 1e234b6d89a0c71a3a30c4093855569dcee259809e5beb175bf14aa94406398f |
s390x | |
module-init-tools-3.3-0.pre3.1.42.el5.s390x.rpm | SHA-256: 2f13d2cd21441fc1b1077b691384d8bcc8174f7b36c305e59ac29c583da6fdca |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.42.el5.src.rpm | SHA-256: 1e234b6d89a0c71a3a30c4093855569dcee259809e5beb175bf14aa94406398f |
ppc | |
module-init-tools-3.3-0.pre3.1.42.el5.ppc.rpm | SHA-256: bccf3f32eae32a9408152a7da2be73211f12dfcff645880380da500768ab3e11 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.42.el5.src.rpm | SHA-256: 1e234b6d89a0c71a3a30c4093855569dcee259809e5beb175bf14aa94406398f |
x86_64 | |
module-init-tools-3.3-0.pre3.1.42.el5.x86_64.rpm | SHA-256: 67c0d21e2f5b62a5f86fd8b4bc7a462529a82568b8b656e3cf2bb2092dd8be9d |
i386 | |
module-init-tools-3.3-0.pre3.1.42.el5.i386.rpm | SHA-256: 45dfad9ea226298652db201b0e7cbbdff42029236ed921bb5c0626349a8154eb |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.