Skip to navigation

Bug Fix Advisory alsa-utils bug fix update

Advisory: RHBA-2013:0113-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated alsa-utils packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

The alsa-utils package contains command line utilities for the Advanced Linux
Sound Architecture (ALSA).

This update fixes the following bug:

* Due to an incorrect configuration of the alsaloop utility from the alsa-utils
package, high CPU usage occurred when using alsaloop. This also affected the
alsa-delay script, which uses alsaloop for the configurable audio delay
functionality. With this update, the alsaloop function has been reconfigured. As
a result, the CPU usage is now optimized when alsaloop is used. (BZ#854012)

All users of alsa-utils are advised to upgrade to these updated packages, which
fix this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
alsa-utils-1.0.17-7.el5.src.rpm     MD5: 3c3df863596633d14a1dc434a0351959
SHA-256: 356ac472253ca618952ea9c69b507a0f302769382fb4c74a1bffa5425d964110
 
IA-32:
alsa-utils-1.0.17-7.el5.i386.rpm     MD5: b9125d5e666e211a497a4f26152b2117
SHA-256: 8a3ca9d2be3bd12cae751cd2054086aa761226e1fcc4463524bd5abc936fd3ba
alsa-utils-debuginfo-1.0.17-7.el5.i386.rpm     MD5: cc351c06a4ae7ed3a65b9c3a2e271e66
SHA-256: afff5d00a25ec6dc90f4be34000d59c38bc6a9c0ae58709984147321bd1c8cd4
 
IA-64:
alsa-utils-1.0.17-7.el5.ia64.rpm     MD5: 7918af643786c78d2dee6796f53e05ff
SHA-256: c6040864fc26ba53eb96d134adff325db4b8d7eef75846908163d033d6fcf5e1
alsa-utils-debuginfo-1.0.17-7.el5.ia64.rpm     MD5: a335d9640227b38dc20ee9daed449e79
SHA-256: fe5a9158ac3c97b392f49e3982fd72b92ba15798db2780eaa2bbe1f35f37b59f
 
PPC:
alsa-utils-1.0.17-7.el5.ppc.rpm     MD5: 1c070fdd9750ef2babfd1df48d5f2f37
SHA-256: 1aeb7fe4959b0ac9ebf8c9650098d6cc0cf85e8e48ea6504e6e39fe4f5a39e1b
alsa-utils-debuginfo-1.0.17-7.el5.ppc.rpm     MD5: 98c4ee25f5083f23a1fa80820e291d38
SHA-256: ed11d4b9c517ae1e110f09286a17175c8d19b204572d552232d025fcce774878
 
s390x:
alsa-utils-1.0.17-7.el5.s390x.rpm     MD5: caef76087af93396bc2ad0168fb30514
SHA-256: 02ca77c485bc2f4c7abf50c9b2cbbc0bbfac57bac7e20fc479fcb862bd524317
alsa-utils-debuginfo-1.0.17-7.el5.s390x.rpm     MD5: 4e50c43247efd810e5bcc2de95099f2d
SHA-256: a1276d63e843c7dacef40d3350c758f419503d68dfda4e238e7af01c09bce2ff
 
x86_64:
alsa-utils-1.0.17-7.el5.x86_64.rpm     MD5: b689f16297768ca625a0a1f10d226c4b
SHA-256: a85349f7de2fbf63322f9bd5f3005eec757253df468c3f857fb2b5096dee3884
alsa-utils-debuginfo-1.0.17-7.el5.x86_64.rpm     MD5: 8a19e506f14196ce55454a64ed5397a7
SHA-256: d62c39a580a76a7badc77a694927ec3094bcff00127b4eae52b5beb2fcaa5aa3
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
alsa-utils-1.0.17-7.el5.src.rpm     MD5: 3c3df863596633d14a1dc434a0351959
SHA-256: 356ac472253ca618952ea9c69b507a0f302769382fb4c74a1bffa5425d964110
 
IA-32:
alsa-utils-1.0.17-7.el5.i386.rpm     MD5: b9125d5e666e211a497a4f26152b2117
SHA-256: 8a3ca9d2be3bd12cae751cd2054086aa761226e1fcc4463524bd5abc936fd3ba
alsa-utils-debuginfo-1.0.17-7.el5.i386.rpm     MD5: cc351c06a4ae7ed3a65b9c3a2e271e66
SHA-256: afff5d00a25ec6dc90f4be34000d59c38bc6a9c0ae58709984147321bd1c8cd4
 
x86_64:
alsa-utils-1.0.17-7.el5.x86_64.rpm     MD5: b689f16297768ca625a0a1f10d226c4b
SHA-256: a85349f7de2fbf63322f9bd5f3005eec757253df468c3f857fb2b5096dee3884
alsa-utils-debuginfo-1.0.17-7.el5.x86_64.rpm     MD5: 8a19e506f14196ce55454a64ed5397a7
SHA-256: d62c39a580a76a7badc77a694927ec3094bcff00127b4eae52b5beb2fcaa5aa3
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

alsa, alsa-delay, alsaloop, audio


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/