Skip to navigation

Bug Fix Advisory kbd bugfix update

Advisory: RHBA-2013:0015-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated kbd packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

The kbd packages provide tools for managing console behavior on a Linux system,
including the keyboard, screen fonts, virtual terminals and font files.

This update fixes the following bug:

* Prior to this update, the "bin/unicode_start" script was called twice. As a
consequence, "unicode_start" with environment variables set to
"BASH_ENV=~/.bashrc" and "TERM=linux" could enter an infinite loop. This update
modifies the "/etc/unicode_start" init script so that "unicode_start" is now
called once and no longer causes a loop. (BZ#622981)

All users of kbd are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
kbd-1.12-22.el5.src.rpm     MD5: 31e017252e953235436acb568c89dc8e
SHA-256: 8d7ecd07e177100b38548184667e773f2650752d96f3c040d9d74418337d5a62
 
IA-32:
kbd-1.12-22.el5.i386.rpm     MD5: e83af1401573979d3940214710eec9a5
SHA-256: 2703f689b4d2cd8958950b7099115b92294fcb3d89a15a9f2d030eba65630c2b
kbd-debuginfo-1.12-22.el5.i386.rpm     MD5: 3eaa206c0ae3450b19762cfce4bfa4be
SHA-256: 802626340a70c0693d54ce232350225736acb7917958e6b696b58726c7ae43f3
 
IA-64:
kbd-1.12-22.el5.ia64.rpm     MD5: 0f423b7ce9ccc89cec22747bb3a1aace
SHA-256: d77cade633ec0369a675957ba377be2ce35d6b7f365e8f2b55b906d4289817a4
kbd-debuginfo-1.12-22.el5.ia64.rpm     MD5: 21454aaa23d98c3ed01050dbd2e4b664
SHA-256: 14cb6e733057453a4d81da0836471314c58556e3df24dfd8121296dbd8bc31ba
 
PPC:
kbd-1.12-22.el5.ppc.rpm     MD5: aa55b0c75b1d7aa0451bb7f670b9b012
SHA-256: 8e9aca5c3a7495dfb7e7127d492b4dcebba5292956c18fb80810e34b18f31763
kbd-debuginfo-1.12-22.el5.ppc.rpm     MD5: 6d04ea7769e2c64990bbbdf361ecb9cc
SHA-256: 9fdb0b451f3be772efbd6b9939643f3d32c8e0f97761ae118558f39c7cdb7afc
 
x86_64:
kbd-1.12-22.el5.x86_64.rpm     MD5: 61e272dc6bfc92345724a5d42d55bab4
SHA-256: 703a6919a675fcc73d74d1c31ffb8b67021316bdd36676068a439af719045840
kbd-debuginfo-1.12-22.el5.x86_64.rpm     MD5: 5faa4bf24aaf5df358fb672ad5a21903
SHA-256: c21f3723dd889919bf610b5a658e4cf7b30ec599daff3cca04db52fb2e849f8b
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
kbd-1.12-22.el5.src.rpm     MD5: 31e017252e953235436acb568c89dc8e
SHA-256: 8d7ecd07e177100b38548184667e773f2650752d96f3c040d9d74418337d5a62
 
IA-32:
kbd-1.12-22.el5.i386.rpm     MD5: e83af1401573979d3940214710eec9a5
SHA-256: 2703f689b4d2cd8958950b7099115b92294fcb3d89a15a9f2d030eba65630c2b
kbd-debuginfo-1.12-22.el5.i386.rpm     MD5: 3eaa206c0ae3450b19762cfce4bfa4be
SHA-256: 802626340a70c0693d54ce232350225736acb7917958e6b696b58726c7ae43f3
 
x86_64:
kbd-1.12-22.el5.x86_64.rpm     MD5: 61e272dc6bfc92345724a5d42d55bab4
SHA-256: 703a6919a675fcc73d74d1c31ffb8b67021316bdd36676068a439af719045840
kbd-debuginfo-1.12-22.el5.x86_64.rpm     MD5: 5faa4bf24aaf5df358fb672ad5a21903
SHA-256: c21f3723dd889919bf610b5a658e4cf7b30ec599daff3cca04db52fb2e849f8b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

622981 - Running unicode_start can hang system



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/