Skip to navigation

Bug Fix Advisory udev bug fix update

Advisory: RHBA-2013:0091-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated udev packages that fix several bugs are now available for Red Hat
Enterprise Linux 5.

The udev packages implement a dynamic device directory, exposing the devices
currently present on the system. The directory runs in user space, dynamically
creates and removes devices, ensures consistent naming, and provides a
user-space API.

This update fixes the following bugs:

* On system boot, the udev helper application, pam_console_apply, was called for
every disk on the system. This was unnecessary for example for SCSI disks, which
do not have default pam console permissions. As a consequence, the boot process
was significantly slowed down if the system contained a large number of disks.
To fix this problem, the /etc/udev/rules.d/95-pam-console.rules file has been
marked as a configuration file and it will not be automatically updated with
newer udev versions. System administrators should now comment out the
pam_console_apply call in this file on systems that do not need non-root user
access to devices. (BZ#736475)

* Previously, the udev helper tool for loading firmware into drivers was logging
to syslog only. Consequently, there was no output in the early boot stage when
the syslog daemon was not running. With this update, if the udevd daemon is
running in debug mode, the firmware_helper also logs to the console, which helps
to debug firmware loading problems. (BZ#758205)

* The WAIT_FOR_SYSFS variable in the udev rules was set to wait 3 seconds for a
file in the sysfs file system to appear. This timeout was too low for some
hot-added SCSI disks that need at least 6 seconds to spin up. Therefore no
symbolic links in the /dev/disk/ directory were created. The WAIT_FOR_SYSFS
variable has been set to 10 seconds, which is enough for most disks. This
results in proper udev database entries and symbolic links. (BZ#769169)

* Prior to this update, udev used the target's port identifier instead of the
initiator's PHY identifier in the /dev/disk/by-path symbolic link. Consequent to
this, when the disk was hot-removed and hot-added, the symbolic link used a
different pathname. This bug has been fixed and udev now uses the correct
initiator's PHY identifier in the symbolic link, which remains the same for
re-added disks. (BZ#812286)

All users of udev are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
udev-095-14.29.el5.src.rpm     MD5: 4d8b2f8e2ea5f38805630a4ec8765e50
SHA-256: 45f704a1967888962bca5c2de099b9ebc1d4cfb6dc1d618a0b9becc2646dbb59
 
IA-32:
libvolume_id-devel-095-14.29.el5.i386.rpm     MD5: 01f90f278de89156e69512d112227fb4
SHA-256: d1b57ddf1f73b900047ea6b16c34a0bce035b2489411dc43c9bc67a0a3573dcd
udev-debuginfo-095-14.29.el5.i386.rpm     MD5: c1b2e251bda7029cff447101933237b4
SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37
 
x86_64:
libvolume_id-devel-095-14.29.el5.i386.rpm     MD5: 01f90f278de89156e69512d112227fb4
SHA-256: d1b57ddf1f73b900047ea6b16c34a0bce035b2489411dc43c9bc67a0a3573dcd
libvolume_id-devel-095-14.29.el5.x86_64.rpm     MD5: d6f2a8ac7017d21fc143be25cf2d275b
SHA-256: fc846e6d82a2bc3c200f26e018b10a5122a172d242380574e6562c088158a0de
udev-debuginfo-095-14.29.el5.i386.rpm     MD5: c1b2e251bda7029cff447101933237b4
SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37
udev-debuginfo-095-14.29.el5.x86_64.rpm     MD5: 2da45873b669b206a20ca22b577a8f91
SHA-256: 83a94f59b5d1f0d04f7024d7ee2e1e2849ce380a578a81eb3aba15a197d41554
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
udev-095-14.29.el5.src.rpm     MD5: 4d8b2f8e2ea5f38805630a4ec8765e50
SHA-256: 45f704a1967888962bca5c2de099b9ebc1d4cfb6dc1d618a0b9becc2646dbb59
 
IA-32:
libvolume_id-095-14.29.el5.i386.rpm     MD5: cffde69a329c87dd11b4878211f91be2
SHA-256: fc16cc0637a002a37d68876497c867d34fe2c6f85fbb5f686345f830c58ac29e
libvolume_id-devel-095-14.29.el5.i386.rpm     MD5: 01f90f278de89156e69512d112227fb4
SHA-256: d1b57ddf1f73b900047ea6b16c34a0bce035b2489411dc43c9bc67a0a3573dcd
udev-095-14.29.el5.i386.rpm     MD5: 750cf697d07adcb5de81060614e7eb09
SHA-256: 7c935f44bae0f2974e50838f76829702cdd4107b3127c66455c09c9503c9f239
udev-debuginfo-095-14.29.el5.i386.rpm     MD5: c1b2e251bda7029cff447101933237b4
SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37
 
IA-64:
libvolume_id-095-14.29.el5.ia64.rpm     MD5: c28bc8e551dd5ce5344be9dd239bdc23
SHA-256: b06a54f155a987fdfc06db5c6b1be29965186d798c05afef7a219ec6df076be5
libvolume_id-devel-095-14.29.el5.ia64.rpm     MD5: 5fafaa26339652f380524ccfad4554f0
SHA-256: fd75f55073113bfaf1bb7bd64bd916b8bdfd252d8649458ba7ae75fa6ca3d89c
udev-095-14.29.el5.ia64.rpm     MD5: 204ff5c50cef30dae38faa3c0c43c94d
SHA-256: a4a119bc073e1dec82d235a0950b001d83ff5ca77ad8f2eae86c44a106dc23a0
udev-debuginfo-095-14.29.el5.ia64.rpm     MD5: 6402f3741901d868b34962949c7e5568
SHA-256: 242c1166c384802b81dadb4ebb24092d4718a566f95724f0be8da334e4ac0067
 
PPC:
libvolume_id-095-14.29.el5.ppc.rpm     MD5: 34514da16868eeb9731b144e3a3afebc
SHA-256: fa32b89d7749d10a7a892abe8c5d8bb6dcc83ce79d7fd80333dc26f1ebda3be8
libvolume_id-095-14.29.el5.ppc64.rpm     MD5: 2de999b6ea4a1ed746bf1027abd73726
SHA-256: efa27c0b99715774da511b849a6a7f106f63420685ed1ee1d527ecf408558d02
libvolume_id-devel-095-14.29.el5.ppc.rpm     MD5: dde3671f94c1db83d087712248a9f318
SHA-256: 4308722f217a08df02cc82e99f42683cdf2998336ff61d6a2569ddd8fb8d9f9a
libvolume_id-devel-095-14.29.el5.ppc64.rpm     MD5: d2fe8c1693d68f5e7df2938122943d3f
SHA-256: 125b854daa0b79732888eada4324e9d4363e0602a0218d62dd6d1d98be358f42
udev-095-14.29.el5.ppc.rpm     MD5: 41a4c75148d4183ea90bef7dc8be260c
SHA-256: a008061fc8a73698da756f63aa7e977fef09e1d7cca22db409a8254ba903627c
udev-debuginfo-095-14.29.el5.ppc.rpm     MD5: 05434cba2a38756a32be66121c0fb368
SHA-256: 05f7a66cca123c83fb6317fb7bdfca6a7d59112eb4280eba5a88903f5444c077
udev-debuginfo-095-14.29.el5.ppc64.rpm     MD5: 67276750ba203121b55869ac09d68a02
SHA-256: 7215262078c2df748b4031ac004f41be14d4112d8848cad9a0861dfe847072e3
 
s390x:
libvolume_id-095-14.29.el5.s390.rpm     MD5: 70e61c2f4dd40bb7bc2ef1d14db06456
SHA-256: c7f10243eb9c2c2ef08161ea176cd7b79b24648007a55a782dfdce6523b90708
libvolume_id-095-14.29.el5.s390x.rpm     MD5: 40fd6d51633b242d353a000a9fa51030
SHA-256: 06d18381c515978e0507b5924b3d3fb60502583e4d1d85183c39a23d7aa222d4
libvolume_id-devel-095-14.29.el5.s390.rpm     MD5: 31821baefa160853e851bbabb1fa239f
SHA-256: 665672d6a6b752e99eaf19dd289fb8211ed19a3de7ce552786b908a8d356b95a
libvolume_id-devel-095-14.29.el5.s390x.rpm     MD5: 8db285f9471e1e50b0c7a52d1fc81d2d
SHA-256: 46f0909f2b66663e7478c02968dc65c8ad02cc17de1356c079b37afa35d63150
udev-095-14.29.el5.s390x.rpm     MD5: a643aefb4fca3885aa532bb7ea1ce4fa
SHA-256: b487bae1715d268240361a8255c7b6e94a17f0816e12f295284320253acee0c7
udev-debuginfo-095-14.29.el5.s390.rpm     MD5: 0cbc329f2adf94701a3b86e99cf18e20
SHA-256: d973bd62158976ead4cc39a409b0d0f22a63a53428718d7e5a8c78c9ef622370
udev-debuginfo-095-14.29.el5.s390x.rpm     MD5: dadeb300bed4f13585c8144b265c0650
SHA-256: 067c92a4284a5fd39dba0821a9fb60747218ac959e4bf6c696a1a467ff5b5e84
 
x86_64:
libvolume_id-095-14.29.el5.i386.rpm     MD5: cffde69a329c87dd11b4878211f91be2
SHA-256: fc16cc0637a002a37d68876497c867d34fe2c6f85fbb5f686345f830c58ac29e
libvolume_id-095-14.29.el5.x86_64.rpm     MD5: 42dd6d9e2ed6072a7bd1841afeb52926
SHA-256: 68a9725b0db708fc62189371c98c9c4cc169f3ab712c6d29aabd151c5c2e0868
libvolume_id-devel-095-14.29.el5.i386.rpm     MD5: 01f90f278de89156e69512d112227fb4
SHA-256: d1b57ddf1f73b900047ea6b16c34a0bce035b2489411dc43c9bc67a0a3573dcd
libvolume_id-devel-095-14.29.el5.x86_64.rpm     MD5: d6f2a8ac7017d21fc143be25cf2d275b
SHA-256: fc846e6d82a2bc3c200f26e018b10a5122a172d242380574e6562c088158a0de
udev-095-14.29.el5.x86_64.rpm     MD5: 78b5681781e013ff90718e65cbc1d905
SHA-256: 946006c57da4668f16d546346800598eaf0f5584ecfa3ecfef52ed97142893b7
udev-debuginfo-095-14.29.el5.i386.rpm     MD5: c1b2e251bda7029cff447101933237b4
SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37
udev-debuginfo-095-14.29.el5.x86_64.rpm     MD5: 2da45873b669b206a20ca22b577a8f91
SHA-256: 83a94f59b5d1f0d04f7024d7ee2e1e2849ce380a578a81eb3aba15a197d41554
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
udev-095-14.29.el5.src.rpm     MD5: 4d8b2f8e2ea5f38805630a4ec8765e50
SHA-256: 45f704a1967888962bca5c2de099b9ebc1d4cfb6dc1d618a0b9becc2646dbb59
 
IA-32:
libvolume_id-095-14.29.el5.i386.rpm     MD5: cffde69a329c87dd11b4878211f91be2
SHA-256: fc16cc0637a002a37d68876497c867d34fe2c6f85fbb5f686345f830c58ac29e
udev-095-14.29.el5.i386.rpm     MD5: 750cf697d07adcb5de81060614e7eb09
SHA-256: 7c935f44bae0f2974e50838f76829702cdd4107b3127c66455c09c9503c9f239
udev-debuginfo-095-14.29.el5.i386.rpm     MD5: c1b2e251bda7029cff447101933237b4
SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37
 
x86_64:
libvolume_id-095-14.29.el5.i386.rpm     MD5: cffde69a329c87dd11b4878211f91be2
SHA-256: fc16cc0637a002a37d68876497c867d34fe2c6f85fbb5f686345f830c58ac29e
libvolume_id-095-14.29.el5.x86_64.rpm     MD5: 42dd6d9e2ed6072a7bd1841afeb52926
SHA-256: 68a9725b0db708fc62189371c98c9c4cc169f3ab712c6d29aabd151c5c2e0868
udev-095-14.29.el5.x86_64.rpm     MD5: 78b5681781e013ff90718e65cbc1d905
SHA-256: 946006c57da4668f16d546346800598eaf0f5584ecfa3ecfef52ed97142893b7
udev-debuginfo-095-14.29.el5.i386.rpm     MD5: c1b2e251bda7029cff447101933237b4
SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37
udev-debuginfo-095-14.29.el5.x86_64.rpm     MD5: 2da45873b669b206a20ca22b577a8f91
SHA-256: 83a94f59b5d1f0d04f7024d7ee2e1e2849ce380a578a81eb3aba15a197d41554
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/