- Issued:
- 2013-09-30
- Updated:
- 2013-09-30
RHBA-2013:1359 - Bug Fix Advisory
Synopsis
module-init-tools bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated module-init-tools packages that fix one bug are now available for Red
Hat Enterprise Linux 5.
Description
The module-init-tools packages include various programs needed for automatic
loading and unloading of modules under kernel versions 2.6 and later, as well as
other module management programs. Device drivers and file systems are two
examples of loaded and unloaded modules.
This update fixes the following bug:
- Updating kmod-kvm after a kernel update had been performed caused a broken
symbolic link to the kvm.ko module due to the link pointing to the old kernel's
kvm.ko module. Now, the new version of kmod-kvm is updated, and broken symbolic
links no longer occur in the described scenario. (BZ#708458)
Users of module-init-tools are advised to upgrade to these updated packages,
which fix this bug.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 708458 - Dangling symlinks upon installation of kmod-kvm on RHEL 5.6
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.63.el5.src.rpm | SHA-256: ae4354aa6951e775df5b48f8a215699564214a8505f83789706a4f6b755379de |
x86_64 | |
module-init-tools-3.3-0.pre3.1.63.el5.x86_64.rpm | SHA-256: 96ab3593b0eaed9b3b1a8b7e697951838fb499a9bcefea3e2ef0853a30c3dd3e |
module-init-tools-debuginfo-3.3-0.pre3.1.63.el5.x86_64.rpm | SHA-256: 1c3483ada6671b5dd48136c49687254fafd5ecc845e5bde51bf603237bf717fe |
ia64 | |
module-init-tools-3.3-0.pre3.1.63.el5.ia64.rpm | SHA-256: fb9d9523358073ff9bc56af38de77f51c9deae412075192fe6484005b9b5d78a |
module-init-tools-debuginfo-3.3-0.pre3.1.63.el5.ia64.rpm | SHA-256: 8dfe6d3a7810e836a79affcb0e6c25bd8fdb045b017e07ea3bb5fe6fae446f8f |
i386 | |
module-init-tools-3.3-0.pre3.1.63.el5.i386.rpm | SHA-256: 5ac3fe7245d64e0f6cb11cd16ac86f2e59f54b89b46922a9a273071fc1a8db5a |
module-init-tools-debuginfo-3.3-0.pre3.1.63.el5.i386.rpm | SHA-256: 170e922f335c2dc05db47557286e858c84f089e6f6614c61f06070b31bd626ae |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.63.el5.src.rpm | SHA-256: ae4354aa6951e775df5b48f8a215699564214a8505f83789706a4f6b755379de |
x86_64 | |
module-init-tools-3.3-0.pre3.1.63.el5.x86_64.rpm | SHA-256: 96ab3593b0eaed9b3b1a8b7e697951838fb499a9bcefea3e2ef0853a30c3dd3e |
module-init-tools-debuginfo-3.3-0.pre3.1.63.el5.x86_64.rpm | SHA-256: 1c3483ada6671b5dd48136c49687254fafd5ecc845e5bde51bf603237bf717fe |
i386 | |
module-init-tools-3.3-0.pre3.1.63.el5.i386.rpm | SHA-256: 5ac3fe7245d64e0f6cb11cd16ac86f2e59f54b89b46922a9a273071fc1a8db5a |
module-init-tools-debuginfo-3.3-0.pre3.1.63.el5.i386.rpm | SHA-256: 170e922f335c2dc05db47557286e858c84f089e6f6614c61f06070b31bd626ae |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.63.el5.src.rpm | SHA-256: ae4354aa6951e775df5b48f8a215699564214a8505f83789706a4f6b755379de |
x86_64 | |
module-init-tools-3.3-0.pre3.1.63.el5.x86_64.rpm | SHA-256: 96ab3593b0eaed9b3b1a8b7e697951838fb499a9bcefea3e2ef0853a30c3dd3e |
module-init-tools-debuginfo-3.3-0.pre3.1.63.el5.x86_64.rpm | SHA-256: 1c3483ada6671b5dd48136c49687254fafd5ecc845e5bde51bf603237bf717fe |
i386 | |
module-init-tools-3.3-0.pre3.1.63.el5.i386.rpm | SHA-256: 5ac3fe7245d64e0f6cb11cd16ac86f2e59f54b89b46922a9a273071fc1a8db5a |
module-init-tools-debuginfo-3.3-0.pre3.1.63.el5.i386.rpm | SHA-256: 170e922f335c2dc05db47557286e858c84f089e6f6614c61f06070b31bd626ae |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.63.el5.src.rpm | SHA-256: ae4354aa6951e775df5b48f8a215699564214a8505f83789706a4f6b755379de |
s390x | |
module-init-tools-3.3-0.pre3.1.63.el5.s390x.rpm | SHA-256: 9800e90f566c7966249c25faa32323c36e0bc39b9c21b643fb63beb27005eae2 |
module-init-tools-debuginfo-3.3-0.pre3.1.63.el5.s390x.rpm | SHA-256: 608c675d1491de3b9433dbdb33602534e8de4c1ea35856ee2f1e5404d8a2fb96 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.63.el5.src.rpm | SHA-256: ae4354aa6951e775df5b48f8a215699564214a8505f83789706a4f6b755379de |
ppc | |
module-init-tools-3.3-0.pre3.1.63.el5.ppc.rpm | SHA-256: 29fffa10fdd6adf03fdf199ef5b188b60344a48b2c0bff7017df70f6ba2913f1 |
module-init-tools-debuginfo-3.3-0.pre3.1.63.el5.ppc.rpm | SHA-256: 6f69e85c83cc54ee45e3dc3fdd7761dc92f239c0f6be36984cd0407d3d06a084 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
module-init-tools-3.3-0.pre3.1.63.el5.src.rpm | SHA-256: ae4354aa6951e775df5b48f8a215699564214a8505f83789706a4f6b755379de |
x86_64 | |
module-init-tools-3.3-0.pre3.1.63.el5.x86_64.rpm | SHA-256: 96ab3593b0eaed9b3b1a8b7e697951838fb499a9bcefea3e2ef0853a30c3dd3e |
module-init-tools-debuginfo-3.3-0.pre3.1.63.el5.x86_64.rpm | SHA-256: 1c3483ada6671b5dd48136c49687254fafd5ecc845e5bde51bf603237bf717fe |
i386 | |
module-init-tools-3.3-0.pre3.1.63.el5.i386.rpm | SHA-256: 5ac3fe7245d64e0f6cb11cd16ac86f2e59f54b89b46922a9a273071fc1a8db5a |
module-init-tools-debuginfo-3.3-0.pre3.1.63.el5.i386.rpm | SHA-256: 170e922f335c2dc05db47557286e858c84f089e6f6614c61f06070b31bd626ae |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.