Skip to navigation

Bug Fix Advisory udev bug fix update

Advisory: RHBA-2011:1390-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-10-20
Last updated on: 2011-10-20
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)

Details

An updated udev package that fixes one bug is now available for Red Hat
Enterprise Linux 4.

The udev package implements a dynamic device directory providing only the
devices present on the system. This dynamic directory runs in user space,
dynamically creates and removes devices, provides consistent naming and a
user-space API. udev replaces devfs in order to provide greater hot plug
functionality.

This updated udev package fixes the following bug:

* The udevd event-managing daemon incorrectly called the exit() function inside
signal handlers. Because exit() is not signal-safe, udevd could have become
unresponsive after calling the function inside a signal handler. This update
ensures that exit() is only called outside of signal handlers instead of
directly, with the result that udevd no longer potentially hangs when the
described scenario occurs. (BZ#723301)

All users of udev are advised to upgrade to this updated package, which resolves
this issue.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
udev-039-10.31.el4.src.rpm     MD5: 3bcd3eb20353afcc7e13700bfebeec3b
SHA-256: 30ecac4e3105ac438217e8b954daa722623af6bc4e24dc5064c6edd2da3f0d6c
 
IA-32:
udev-039-10.31.el4.i386.rpm     MD5: a109199d0b530fedb9e9199547b559e3
SHA-256: 37f778eddc3e878135c00599f91b054d1c283b32f701daec17f436d9478d614a
 
x86_64:
udev-039-10.31.el4.x86_64.rpm     MD5: 0e9f9b9a789591d24356d12ea8dde070
SHA-256: c9c23094b214eb3185b4b0c2083d4b61c956cc714a1773df8aeb859a334960cd
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
udev-039-10.31.el4.src.rpm     MD5: 3bcd3eb20353afcc7e13700bfebeec3b
SHA-256: 30ecac4e3105ac438217e8b954daa722623af6bc4e24dc5064c6edd2da3f0d6c
 
IA-32:
udev-039-10.31.el4.i386.rpm     MD5: a109199d0b530fedb9e9199547b559e3
SHA-256: 37f778eddc3e878135c00599f91b054d1c283b32f701daec17f436d9478d614a
 
IA-64:
udev-039-10.31.el4.ia64.rpm     MD5: b0cc38dc6c461cc512720da10a8aedff
SHA-256: f1fd930f33e2ef60c1c8af7ffdbb2b1823b2a82c8eab268cfd1c5af3f4db5464
 
PPC:
udev-039-10.31.el4.ppc.rpm     MD5: 45c20c661de363ab049f6150bf3747e4
SHA-256: 437b14a819cd6b9f8b71d18f19bcf44190bc7926a6ee63e4f234dd4bc4ccf71e
 
s390:
udev-039-10.31.el4.s390.rpm     MD5: b546edf0bd18ad6c7c36ed61116b2d07
SHA-256: 782408f51d10e2d6e13e06b343d154c432fea4c10b221547f5597d25ccb5280e
 
s390x:
udev-039-10.31.el4.s390x.rpm     MD5: 6ee758d3e926ef7db40b8ab4b11e1fa4
SHA-256: 939581d06df7f1b0b3f086d947bc78f6c4435c50e0181d610b3bdea60181a3c8
 
x86_64:
udev-039-10.31.el4.x86_64.rpm     MD5: 0e9f9b9a789591d24356d12ea8dde070
SHA-256: c9c23094b214eb3185b4b0c2083d4b61c956cc714a1773df8aeb859a334960cd
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
udev-039-10.31.el4.src.rpm     MD5: 3bcd3eb20353afcc7e13700bfebeec3b
SHA-256: 30ecac4e3105ac438217e8b954daa722623af6bc4e24dc5064c6edd2da3f0d6c
 
IA-32:
udev-039-10.31.el4.i386.rpm     MD5: a109199d0b530fedb9e9199547b559e3
SHA-256: 37f778eddc3e878135c00599f91b054d1c283b32f701daec17f436d9478d614a
 
IA-64:
udev-039-10.31.el4.ia64.rpm     MD5: b0cc38dc6c461cc512720da10a8aedff
SHA-256: f1fd930f33e2ef60c1c8af7ffdbb2b1823b2a82c8eab268cfd1c5af3f4db5464
 
x86_64:
udev-039-10.31.el4.x86_64.rpm     MD5: 0e9f9b9a789591d24356d12ea8dde070
SHA-256: c9c23094b214eb3185b4b0c2083d4b61c956cc714a1773df8aeb859a334960cd
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
udev-039-10.31.el4.src.rpm     MD5: 3bcd3eb20353afcc7e13700bfebeec3b
SHA-256: 30ecac4e3105ac438217e8b954daa722623af6bc4e24dc5064c6edd2da3f0d6c
 
IA-32:
udev-039-10.31.el4.i386.rpm     MD5: a109199d0b530fedb9e9199547b559e3
SHA-256: 37f778eddc3e878135c00599f91b054d1c283b32f701daec17f436d9478d614a
 
IA-64:
udev-039-10.31.el4.ia64.rpm     MD5: b0cc38dc6c461cc512720da10a8aedff
SHA-256: f1fd930f33e2ef60c1c8af7ffdbb2b1823b2a82c8eab268cfd1c5af3f4db5464
 
x86_64:
udev-039-10.31.el4.x86_64.rpm     MD5: 0e9f9b9a789591d24356d12ea8dde070
SHA-256: c9c23094b214eb3185b4b0c2083d4b61c956cc714a1773df8aeb859a334960cd
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/