Skip to navigation

Bug Fix Advisory udev bug fix update

Advisory: RHBA-2011:1448-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-11-14
Last updated on: 2011-11-14
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated udev packages that resolve one bug are now available for Red Hat
Enterprise Linux 5.

The udev packages implement a dynamic device-directory, providing only the
devices present on the system. This dynamic directory runs in user space,
dynamically creates and removes devices, provides consistent naming, and a user
space API. The udev device manager replaces the devfs device file system,
providing greater hot plug functionality.

This update fixes the following bug:

* On a system boot, the udev helper application, pam_console_apply, was called
for every disk that appeared on the system. This was unnecessary for example for
SCSI disks, which do not have set default pam console permissions. As a
consequence, the boot process was significantly slowed down if a system
contained a large number of disks. To fix this problem, the
/etc/udev/rules.d/95-pam-console.rules file has been marked as a configuration
file and it will not be automatically updated with newer udev versions. System
administrators should now comment out the pam_console_apply call in this file on
systems that do not need a normal console user access to devices. (BZ#736475)

All users of udev are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
udev-095-14.27.el5_7.1.src.rpm
File outdated by:  RHBA-2013:0091
    MD5: de031cf2f430ff52d61edcaffd549453
SHA-256: 3dda4c43ada66079a556e85169cb8343475012baa76591895f31b44ed151c08b
 
IA-32:
libvolume_id-devel-095-14.27.el5_7.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 6aee3b4d5c576cba9ef0d96b8445b3a0
SHA-256: b6880ccbb438ef6ed74892d2e8d364a834b946536a36a97da248ed90b74367c1
 
x86_64:
libvolume_id-devel-095-14.27.el5_7.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 6aee3b4d5c576cba9ef0d96b8445b3a0
SHA-256: b6880ccbb438ef6ed74892d2e8d364a834b946536a36a97da248ed90b74367c1
libvolume_id-devel-095-14.27.el5_7.1.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: b5581909cd32370337b6d1713fa42f8d
SHA-256: 6e4daeceecf1ed74ac29660134dab63d4186d7ecd46c414b6a61b0415933a81d
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
udev-095-14.27.el5_7.1.src.rpm
File outdated by:  RHBA-2013:0091
    MD5: de031cf2f430ff52d61edcaffd549453
SHA-256: 3dda4c43ada66079a556e85169cb8343475012baa76591895f31b44ed151c08b
 
IA-32:
libvolume_id-095-14.27.el5_7.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 17d3d3712cccaf849388d86b30a13ae3
SHA-256: a0d975c1ecc9d83448b988889cc06b1fa6e51d9edeaa84eef2b3f233a933996b
libvolume_id-devel-095-14.27.el5_7.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 6aee3b4d5c576cba9ef0d96b8445b3a0
SHA-256: b6880ccbb438ef6ed74892d2e8d364a834b946536a36a97da248ed90b74367c1
udev-095-14.27.el5_7.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 413c722959181e8921433dc457a0fe2c
SHA-256: c5c7621d820e2c8d3a3c84234580283fed7c98f1e1fc0a47725cc63d489005bf
 
IA-64:
libvolume_id-095-14.27.el5_7.1.ia64.rpm
File outdated by:  RHBA-2013:0091
    MD5: d35e33ea62a95d35211ddbf8d2b829d6
SHA-256: a1b2e2735a7d566e320f61daf437594711d12188b7b0edb6772b8b9432534828
libvolume_id-devel-095-14.27.el5_7.1.ia64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 138b445d25eab02d4d8dfb51c508c585
SHA-256: a5f9b0bf341bf901f214b82c93f416cb98efc6ee8fece36f99bf49dd933c87eb
udev-095-14.27.el5_7.1.ia64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 8f20712cef8c47a2098797973a6db897
SHA-256: 0b0127a8ea45b35e1d3b54fd6b56a24eb2ce4fba91ae93077d4a3a961e50d4e4
 
PPC:
libvolume_id-095-14.27.el5_7.1.ppc.rpm
File outdated by:  RHBA-2013:0091
    MD5: 2842734fd11ada48f662cc32dcccf9ff
SHA-256: 7892499463f46de1effd49240d05e3b0ebb74aea76bf50234f448b62f21de3e8
libvolume_id-095-14.27.el5_7.1.ppc64.rpm
File outdated by:  RHBA-2013:0091
    MD5: df11171a7ea6a39fee8f5f9549841e4b
SHA-256: 257aec76592f0f9de8a673daf3b761435615faa353052abf024c5c44488bd456
libvolume_id-devel-095-14.27.el5_7.1.ppc.rpm
File outdated by:  RHBA-2013:0091
    MD5: 424b755a4ec43d0330b4a942fe06102a
SHA-256: 9939a7b1d225b00579ff120dcb3158e4700630012a455a537487b3e2710cdb08
libvolume_id-devel-095-14.27.el5_7.1.ppc64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 98757b0e9daeedeba74e2c73b88f8653
SHA-256: 977545edf5831c2e531f279c0dcb1f3a8f0b573f168414103c179edd1c232db0
udev-095-14.27.el5_7.1.ppc.rpm
File outdated by:  RHBA-2013:0091
    MD5: 00fba6a65a83e72fdc1f377ff19cc9ff
SHA-256: 80fbe4cf61275a4bb8e12b3f6746acaa05a3592d9f2b1b16a481b7bd7d3f850c
 
s390x:
libvolume_id-095-14.27.el5_7.1.s390.rpm
File outdated by:  RHBA-2013:0091
    MD5: ae453365aa39b16e22291f692c04e302
SHA-256: 9c11a21cb59c75145f921c1307f9fbb5306381eaed9262caeddfc62d95a36af0
libvolume_id-095-14.27.el5_7.1.s390x.rpm
File outdated by:  RHBA-2013:0091
    MD5: 4fc81751d90e5783c3a1ce5c6e021ab9
SHA-256: b688ad1bfc90148d397de43330d842be8c891ad57636796318eb8073c91aa67f
libvolume_id-devel-095-14.27.el5_7.1.s390.rpm
File outdated by:  RHBA-2013:0091
    MD5: 85a0b30bdf4145de7c396cfa5c792ebc
SHA-256: 501039e5439c9827ac87322bc6cebdcb2a9b74b8e183691dd8506ac32b9671ce
libvolume_id-devel-095-14.27.el5_7.1.s390x.rpm
File outdated by:  RHBA-2013:0091
    MD5: 37a7c99c9fd07869a9375c32a5354258
SHA-256: 8e25b314e387541e6b3a8942ebb0c51b397cd6b0fa19dae4fcbdd1d339c4141b
udev-095-14.27.el5_7.1.s390x.rpm
File outdated by:  RHBA-2013:0091
    MD5: f899ee815962c6cb863e0d5fee1659b2
SHA-256: 708e8c39897308e5616829828e8a5d2f712742f77c3f42c0a7ce35cc55c4c9ff
 
x86_64:
libvolume_id-095-14.27.el5_7.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 17d3d3712cccaf849388d86b30a13ae3
SHA-256: a0d975c1ecc9d83448b988889cc06b1fa6e51d9edeaa84eef2b3f233a933996b
libvolume_id-095-14.27.el5_7.1.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 494cf4f1658a6132b938e1cb4d2615a3
SHA-256: 58afb1e821a51d1b1f0d4375f83a939c98d17e149d496fc752f8eb73934e1be2
libvolume_id-devel-095-14.27.el5_7.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 6aee3b4d5c576cba9ef0d96b8445b3a0
SHA-256: b6880ccbb438ef6ed74892d2e8d364a834b946536a36a97da248ed90b74367c1
libvolume_id-devel-095-14.27.el5_7.1.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: b5581909cd32370337b6d1713fa42f8d
SHA-256: 6e4daeceecf1ed74ac29660134dab63d4186d7ecd46c414b6a61b0415933a81d
udev-095-14.27.el5_7.1.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 67c7bd2d76f83c86c8486012aae5493b
SHA-256: 3822c66bbec076b5508e7189bdd687591e60a343fee98d013265946700d1766c
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
udev-095-14.27.el5_7.1.src.rpm
File outdated by:  RHBA-2013:0091
    MD5: de031cf2f430ff52d61edcaffd549453
SHA-256: 3dda4c43ada66079a556e85169cb8343475012baa76591895f31b44ed151c08b
 
IA-32:
libvolume_id-095-14.27.el5_7.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 17d3d3712cccaf849388d86b30a13ae3
SHA-256: a0d975c1ecc9d83448b988889cc06b1fa6e51d9edeaa84eef2b3f233a933996b
udev-095-14.27.el5_7.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 413c722959181e8921433dc457a0fe2c
SHA-256: c5c7621d820e2c8d3a3c84234580283fed7c98f1e1fc0a47725cc63d489005bf
 
x86_64:
libvolume_id-095-14.27.el5_7.1.i386.rpm
File outdated by:  RHBA-2013:0091
    MD5: 17d3d3712cccaf849388d86b30a13ae3
SHA-256: a0d975c1ecc9d83448b988889cc06b1fa6e51d9edeaa84eef2b3f233a933996b
libvolume_id-095-14.27.el5_7.1.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 494cf4f1658a6132b938e1cb4d2615a3
SHA-256: 58afb1e821a51d1b1f0d4375f83a939c98d17e149d496fc752f8eb73934e1be2
udev-095-14.27.el5_7.1.x86_64.rpm
File outdated by:  RHBA-2013:0091
    MD5: 67c7bd2d76f83c86c8486012aae5493b
SHA-256: 3822c66bbec076b5508e7189bdd687591e60a343fee98d013265946700d1766c
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/