Skip to navigation

Bug Fix Advisory udev bug fix update

Advisory: RHBA-2011:1046-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated udev packages that fix several bugs are now available for Red Hat
Enterprise Linux 5.

The udev packages implement a dynamic device-directory, providing only the
devices present on the system. This dynamic directory runs in user space,
dynamically creates and removes devices, provides consistent naming, and a user
space API. udev replaces devfs, providing greater hot plug functionality.

This update fixes the following bugs:

* Previously, the udev helper application scsi_id left temporary devices nodes
in the /dev directory. These devices nodes could have been captured by the
"pvscan" command and shown in the "pvdisplay" device listing. This unintended
behavior no longer occurs with this update. (BZ#677203)

* Previously, the udev daemon was killed and started if the udev package was
installed in a chrooted environment. This update prevents restarting the daemon.
(BZ#699711)

* Previously, the udev daemon created symbolic links to tape devices in the
/dev/disk directory with a wrong name, and not for all tape devices present on
the system. With this update, udev now correctly creates symbolic links for all
tape devices in /dev/disk as expected. (BZ#689957)

Users are advised to upgrade to these updated udev packages, which fix these
bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
udev-095-14.27.el5.src.rpm
File outdated by:  RHBA-2013:0091
    MD5: d6d8579732cc8f28076f22c9a1bba60c
SHA-256: d0dbd2f8d4636d28a783385611f74619aa94ef9202241e0e274eb5a1ef1afd26
 
IA-32:
libvolume_id-devel-095-14.27.el5.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: c413c93425db3bb5d0ec5a2a529a568f
SHA-256: 6aa2227400dadddad768e9fc0964f33ea5095355438ca9e0cb263fe0fa0b70a4
 
x86_64:
libvolume_id-devel-095-14.27.el5.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: c413c93425db3bb5d0ec5a2a529a568f
SHA-256: 6aa2227400dadddad768e9fc0964f33ea5095355438ca9e0cb263fe0fa0b70a4
libvolume_id-devel-095-14.27.el5.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: c9c4ad8a480436737cb7e96463d9c297
SHA-256: 9fe200e23095f8bfeec3077bc6f0b4fc085983f9d6a924632ccfbb032296d1db
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
udev-095-14.27.el5.src.rpm
File outdated by:  RHBA-2013:0091
    MD5: d6d8579732cc8f28076f22c9a1bba60c
SHA-256: d0dbd2f8d4636d28a783385611f74619aa94ef9202241e0e274eb5a1ef1afd26
 
IA-32:
libvolume_id-095-14.27.el5.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 070e8f43f4d598510a0d167c4e701981
SHA-256: 669cbf5684b1f3387597240169425b52ac8283b0a12b4b7cf1f9922223c029ec
libvolume_id-devel-095-14.27.el5.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: c413c93425db3bb5d0ec5a2a529a568f
SHA-256: 6aa2227400dadddad768e9fc0964f33ea5095355438ca9e0cb263fe0fa0b70a4
udev-095-14.27.el5.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 003267aab9bf9b95d4849adaffb1077b
SHA-256: e4434dd82925c0832c5c51f456944f94d37cf0ce97312954be6ab022c49343ad
 
IA-64:
libvolume_id-095-14.27.el5.ia64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 571988f71d4e00867cdf293cc54cda37
SHA-256: 16a52ab5759088b957feff28f6e8516ca20c0a1fd853b4b4c23e3a46f729a70c
libvolume_id-devel-095-14.27.el5.ia64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 92e6eb2b9c4b917621decd3e978ce631
SHA-256: 16b6d8fb66cc139efadaeb4a3bd975b59f40e7aedafa0bb518ba443bec82b184
udev-095-14.27.el5.ia64.rpm
File outdated by:  RHBA-2013:0091
    MD5: ce787dfe2bc3c89051ad997027f9a590
SHA-256: 8e4cb02b615c3ff22b205fbd07329d225946c345dbbd21a36e0bb32620ad84de
 
PPC:
libvolume_id-095-14.27.el5.ppc.rpm
File outdated by:  RHBA-2013:0091
    MD5: 6eb43b38fbfcc677ea3e9af398e71d39
SHA-256: ff7c9c4dace11dac0c5c8e9974fc31162cc90a2495dd52d657cefcb215dec27f
libvolume_id-095-14.27.el5.ppc64.rpm
File outdated by:  RHBA-2013:0091
    MD5: df7674184ad58f0ba440e72933bc241a
SHA-256: 8b29d50c56611407fe21077c4fed5a822b6fe23335e28e245e6f8d9e48190339
libvolume_id-devel-095-14.27.el5.ppc.rpm
File outdated by:  RHBA-2013:0091
    MD5: 7109227017bc81eeb8b81641680606f9
SHA-256: d76f121dbb82e03c7d22cdb557448bdfd7c1de7970b4757cd546ca5a4023d512
libvolume_id-devel-095-14.27.el5.ppc64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 09635ffac698fd8266bef2a2beef37bc
SHA-256: d0edb7e4194771d049d4a44d0ba99e21691e70c9fdb2da671a34cf2991c5af7b
udev-095-14.27.el5.ppc.rpm
File outdated by:  RHBA-2013:0091
    MD5: 88aa5b8a53da5d433ebb3e599ec214e5
SHA-256: a2ce082eef82bca6e8169488ea9e86646cb17e4966ebb7df20e37e258f1bf7a3
 
s390x:
libvolume_id-095-14.27.el5.s390.rpm
File outdated by:  RHBA-2013:0091
    MD5: 8de82546c61422e19d0372c8e03efb66
SHA-256: 7ad10e9a71f01c4ab05a25a8ba3396001d83c0e21497a09c6f8aabe53f4f8b56
libvolume_id-095-14.27.el5.s390x.rpm
File outdated by:  RHBA-2013:0091
    MD5: 55841e39f42943ddd4ee10c0df3df6b4
SHA-256: 390b2d88ed314f9b32a5a7171b92a21d4ed83bfee7c8297731d885c35bd56109
libvolume_id-devel-095-14.27.el5.s390.rpm
File outdated by:  RHBA-2013:0091
    MD5: 7a19fda4b7be0e1f89aad6702892480d
SHA-256: 4346059a12f956356127866eb5d8bd86b02ab84ef1e7851073501ec9627e33a8
libvolume_id-devel-095-14.27.el5.s390x.rpm
File outdated by:  RHBA-2013:0091
    MD5: 1d64d082190a07711328e590b78d065f
SHA-256: 664125777a8ad0706a7638eec969f07946998c4e134e6e24f96bc41a62ebacc5
udev-095-14.27.el5.s390x.rpm
File outdated by:  RHBA-2013:0091
    MD5: 733a73a8a9ec2cd2b2bc4ff9ce90272e
SHA-256: 044d391d09d99aa045922682c0aef79119654b1c785d47a110ee901b1206b4f1
 
x86_64:
libvolume_id-095-14.27.el5.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 070e8f43f4d598510a0d167c4e701981
SHA-256: 669cbf5684b1f3387597240169425b52ac8283b0a12b4b7cf1f9922223c029ec
libvolume_id-095-14.27.el5.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: de3e8fdbb8c596b23267540d54a275b0
SHA-256: ce21527d59edb011b36ec126b16e62163a8a608fe86f6f83206d06e2973abd18
libvolume_id-devel-095-14.27.el5.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: c413c93425db3bb5d0ec5a2a529a568f
SHA-256: 6aa2227400dadddad768e9fc0964f33ea5095355438ca9e0cb263fe0fa0b70a4
libvolume_id-devel-095-14.27.el5.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: c9c4ad8a480436737cb7e96463d9c297
SHA-256: 9fe200e23095f8bfeec3077bc6f0b4fc085983f9d6a924632ccfbb032296d1db
udev-095-14.27.el5.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 3df7448639e4c8f76aaaabe1ccc4a2e3
SHA-256: 28143c626febc030d015d00d11f4524b2cd31996a0e5181947f91c52f00dd316
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
udev-095-14.27.el5.src.rpm
File outdated by:  RHBA-2013:0091
    MD5: d6d8579732cc8f28076f22c9a1bba60c
SHA-256: d0dbd2f8d4636d28a783385611f74619aa94ef9202241e0e274eb5a1ef1afd26
 
IA-32:
libvolume_id-095-14.27.el5.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 070e8f43f4d598510a0d167c4e701981
SHA-256: 669cbf5684b1f3387597240169425b52ac8283b0a12b4b7cf1f9922223c029ec
udev-095-14.27.el5.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 003267aab9bf9b95d4849adaffb1077b
SHA-256: e4434dd82925c0832c5c51f456944f94d37cf0ce97312954be6ab022c49343ad
 
x86_64:
libvolume_id-095-14.27.el5.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 070e8f43f4d598510a0d167c4e701981
SHA-256: 669cbf5684b1f3387597240169425b52ac8283b0a12b4b7cf1f9922223c029ec
libvolume_id-095-14.27.el5.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: de3e8fdbb8c596b23267540d54a275b0
SHA-256: ce21527d59edb011b36ec126b16e62163a8a608fe86f6f83206d06e2973abd18
udev-095-14.27.el5.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 3df7448639e4c8f76aaaabe1ccc4a2e3
SHA-256: 28143c626febc030d015d00d11f4524b2cd31996a0e5181947f91c52f00dd316
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

677203 - scsi_id to the /dev/tmp-scsi-maj-mi-<pid> device doesn't unlink for cciss devices
689957 - [5.6] udevd rules cannot handle more than 10 st/nst devices
699711 - udevd starts upon installation in a chroot



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/