Skip to navigation

Bug Fix Advisory udev bug fix update

Advisory: RHBA-2010:0593-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-08-04
Last updated on: 2010-08-04
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated udev packages that fix a bug are now available.

The udev packages implement a dynamic device-directory, providing only the
devices present on the system. This dynamic directory runs in user-space,
dynamically creates and removes devices, provides consistent naming, and a
user-space API. udev replaces devfs, providing greater hot plug functionality.

These updated packages fix the following bug:

* previously, cciss devices did not have an entry in the udev database. This was
caused by the fact that these devices do not provide information in the /sys
file system, making it hard to create persistent symbolic links in /dev/disk.
With this update, the scsi_id utility is used to query the ID of cciss devices,
so that udev can create the database entries as expected. (BZ#615270)

Users of udev are advised to upgrade to these updated packages, which resolve
this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
udev-095-14.21.el5_5.1.src.rpm
File outdated by:  RHBA-2013:0091
    MD5: 57618673d1b5dd0ca6bafb0e4d597584
SHA-256: ec0817a877c127f32a82aa96ffaabaf59c3e7dbf71710c6015165de012cfa3ee
 
IA-32:
libvolume_id-devel-095-14.21.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 5113bf66ac7a5fc07eb433f031be3ae9
SHA-256: f2df3959f9a30b266e798fe8902ff559ba27b281c2f8f14160726d3a6b4a0314
 
x86_64:
libvolume_id-devel-095-14.21.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 5113bf66ac7a5fc07eb433f031be3ae9
SHA-256: f2df3959f9a30b266e798fe8902ff559ba27b281c2f8f14160726d3a6b4a0314
libvolume_id-devel-095-14.21.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 81bf6c5b419431961272b478d6761bac
SHA-256: a72b7149bd7cc8c34845ab6f2c95b585ddb8335811449439871890d869b9baa4
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
udev-095-14.21.el5_5.1.src.rpm
File outdated by:  RHBA-2013:0091
    MD5: 57618673d1b5dd0ca6bafb0e4d597584
SHA-256: ec0817a877c127f32a82aa96ffaabaf59c3e7dbf71710c6015165de012cfa3ee
 
IA-32:
libvolume_id-095-14.21.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 860da980eb047b121df9645dd94176e4
SHA-256: 16879dacb92415e5e0351fca3674630b7f71c44dc6ee25790300a16bbb537eb5
libvolume_id-devel-095-14.21.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 5113bf66ac7a5fc07eb433f031be3ae9
SHA-256: f2df3959f9a30b266e798fe8902ff559ba27b281c2f8f14160726d3a6b4a0314
udev-095-14.21.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 5f37f4ec6e4befdb37e6286c36ff7785
SHA-256: 7d075c496ed3861fb8bcfcc7eb7b5dadc36af70569b32818c1620ef7b71a5991
 
IA-64:
libvolume_id-095-14.21.el5_5.1.ia64.rpm
File outdated by:  RHBA-2013:0091
    MD5: ae6a664ee3406e86bef1a751b75a356c
SHA-256: d8ea89a2097bc2c670bbcb0830d37a2c54c09810410110d8f9ed9e6da5ea0cc9
libvolume_id-devel-095-14.21.el5_5.1.ia64.rpm
File outdated by:  RHBA-2013:0091
    MD5: e1706361571d5dca03a8c31518447d25
SHA-256: ccafb2ebd432d09a457132bc532da56f6029ef880fbb3ad63763c8171a5119e4
udev-095-14.21.el5_5.1.ia64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 23b13cd9480a49998bd640ab48194a27
SHA-256: a16313a06fe0e62a87797bed861a976c785bcdf92851cba618e2fd5276526851
 
PPC:
libvolume_id-095-14.21.el5_5.1.ppc.rpm
File outdated by:  RHBA-2013:0091
    MD5: d24b67f9b274a42f0ebb4a2f56dc3174
SHA-256: 2e001f7e48a974f44f3f47df29337c9cd912584da9d63610f0783735b812eea0
libvolume_id-095-14.21.el5_5.1.ppc64.rpm
File outdated by:  RHBA-2013:0091
    MD5: fb9f102c9b302af5a7bcc4a8d89178dd
SHA-256: 029eba4de2c0e43f7b4fb4d356dad6925e5b11059c5232c316ce1ef7b1635b0c
libvolume_id-devel-095-14.21.el5_5.1.ppc.rpm
File outdated by:  RHBA-2013:0091
    MD5: 5554557f865e55f90ff07d4ccb944428
SHA-256: fcfbd8f7a7356aa74567a8e4b4e12801dd5007f7293b411bdc9fb399a0f5385a
libvolume_id-devel-095-14.21.el5_5.1.ppc64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 67622f57e1655b2108b5b5cb1bbe4d18
SHA-256: 5f5593ee69065e66c92ed57d5acf364a11d236a65e059df710d4b0ce8b643fdd
udev-095-14.21.el5_5.1.ppc.rpm
File outdated by:  RHBA-2013:0091
    MD5: ab782deb1a16c8b23b175f4123cf389a
SHA-256: 4ce8c2631db9fb68eecd903be12ee409e66f5db52bc416ce047a86f050e8a15c
 
s390x:
libvolume_id-095-14.21.el5_5.1.s390.rpm
File outdated by:  RHBA-2013:0091
    MD5: 2fb950876c536fd4a7dad67ef916f04c
SHA-256: 80cd96f7c336f1ee4c4302f9cbe9f1ada7612c75e80736d2888320ee6a8be985
libvolume_id-095-14.21.el5_5.1.s390x.rpm
File outdated by:  RHBA-2013:0091
    MD5: bd82df1f0606310dd5e7a9d61b96b88f
SHA-256: 821bd97d0b9e11ff003a49f980c8fd2a5cefef0f50fec030699aa4d2a1d605a0
libvolume_id-devel-095-14.21.el5_5.1.s390.rpm
File outdated by:  RHBA-2013:0091
    MD5: 2608736ca4eaec33737cb89a812173fc
SHA-256: 7b9926985652e415b75605a64e0562254fed9a8d5df8e3f274e8e21f00b611bf
libvolume_id-devel-095-14.21.el5_5.1.s390x.rpm
File outdated by:  RHBA-2013:0091
    MD5: bc132438a6171685cc1ac44af4ecc4c0
SHA-256: 467195347f280b454f61d96b9d3166adc2a3fc04a6f1e3429d2db6eb052936cd
udev-095-14.21.el5_5.1.s390x.rpm
File outdated by:  RHBA-2013:0091
    MD5: 881cc302d2358ee00d1517e3e287ac28
SHA-256: ed58cec0662c7a34e7ebf37d1886debe5545933a568a6ae52a149a500c111461
 
x86_64:
libvolume_id-095-14.21.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 860da980eb047b121df9645dd94176e4
SHA-256: 16879dacb92415e5e0351fca3674630b7f71c44dc6ee25790300a16bbb537eb5
libvolume_id-095-14.21.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: e21ca0eaea50f30a9b66421b324d4195
SHA-256: 4029ae0f7c9324e9404ef6131096d4fcdff920f4693b56d4241a17553fe9b85e
libvolume_id-devel-095-14.21.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 5113bf66ac7a5fc07eb433f031be3ae9
SHA-256: f2df3959f9a30b266e798fe8902ff559ba27b281c2f8f14160726d3a6b4a0314
libvolume_id-devel-095-14.21.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 81bf6c5b419431961272b478d6761bac
SHA-256: a72b7149bd7cc8c34845ab6f2c95b585ddb8335811449439871890d869b9baa4
udev-095-14.21.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 894831cdb2c212b5ede57faf6d542041
SHA-256: e3d14671048e2a5d2b4f9c3c9884f4b47fdd810df32c1d98a524acedf9138b3b
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
udev-095-14.21.el5_5.1.src.rpm
File outdated by:  RHBA-2013:0091
    MD5: 57618673d1b5dd0ca6bafb0e4d597584
SHA-256: ec0817a877c127f32a82aa96ffaabaf59c3e7dbf71710c6015165de012cfa3ee
 
IA-32:
libvolume_id-095-14.21.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 860da980eb047b121df9645dd94176e4
SHA-256: 16879dacb92415e5e0351fca3674630b7f71c44dc6ee25790300a16bbb537eb5
udev-095-14.21.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 5f37f4ec6e4befdb37e6286c36ff7785
SHA-256: 7d075c496ed3861fb8bcfcc7eb7b5dadc36af70569b32818c1620ef7b71a5991
 
x86_64:
libvolume_id-095-14.21.el5_5.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 860da980eb047b121df9645dd94176e4
SHA-256: 16879dacb92415e5e0351fca3674630b7f71c44dc6ee25790300a16bbb537eb5
libvolume_id-095-14.21.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: e21ca0eaea50f30a9b66421b324d4195
SHA-256: 4029ae0f7c9324e9404ef6131096d4fcdff920f4693b56d4241a17553fe9b85e
udev-095-14.21.el5_5.1.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 894831cdb2c212b5ede57faf6d542041
SHA-256: e3d14671048e2a5d2b4f9c3c9884f4b47fdd810df32c1d98a524acedf9138b3b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

615270 - cciss disk devices have empty block.device property in HAL



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/