- Issued:
- 2014-09-16
- Updated:
- 2014-09-16
RHBA-2014:1239 - udev bug fix update
Synopsis
udev bug fix update
Type/Severity
Bug Fix Advisory
Topic
Updated udev packages that fix several bugs are now available for Red Hat Enterprise Linux 5.
Description
The udev packages implement a dynamic device-directory, providing only the devices present on the system. This dynamic directory runs in user space, dynamically creates and removes devices, and provides consistent naming, as well as a user-space API. The udev packages replace the devfs package and provide better hot plug functionality.
This update fixes the following bugs:
-
Previously, a default udev rule for the udev utility led to ignoring device mapper devices and prevented access to incomplete snapshot devices. With recent kernels, this rule can now be safely removed, so that device mapper devices now show up correctly in applications detecting udev events, such as gnome-volume-manager. (BZ#214639)
-
Due to the scsi_id utility returning also the port of a Storage Area Network (SAN) in the World Wide Identification (WWID), WWID could not limit its results to only the ID of the intended drive. With this update, the "-x" command-line option yields an additional ID_SERIAL_SHORT key/value pair, the value of which does not include the ports of the SAN. (BZ#405021)
-
Previously, the udev(8) man page contained grammatical mistakes. With this update, the man page is grammatically correct. (BZ#481349)
-
Prior to this update, the udev utility did not report syntax errors in udev rules caused by missing quotation marks. The underlying source code has been fixed, and syntax errors are now logged as intended. (BZ#573785)
Users of udev are advised to upgrade to these updated packages, which fix these bugs.
Solution
Before applying this update, make sure all previously released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at https://access.redhat.com/site/articles/11258
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for Power, big endian | 5 | ppc |
| Red Hat Enterprise Linux for IBM z Systems | 5 | s390x |
| Red Hat Enterprise Linux Workstation | 5 | x86_64 |
| Red Hat Enterprise Linux Workstation | 5 | i386 |
| Red Hat Enterprise Linux Server | 5 | x86_64 |
| Red Hat Enterprise Linux Server | 5 | ia64 |
| Red Hat Enterprise Linux Server | 5 | i386 |
| Red Hat Enterprise Linux Server from RHUI | 5 | x86_64 |
| Red Hat Enterprise Linux Server from RHUI | 5 | i386 |
| Red Hat Enterprise Linux Desktop | 5 | x86_64 |
| Red Hat Enterprise Linux Desktop | 5 | i386 |
Updated Packages
- udev-debuginfo-095-14.32.el5.ppc64.rpm
- libvolume_id-095-14.32.el5.i386.rpm
- libvolume_id-095-14.32.el5.x86_64.rpm
- libvolume_id-devel-095-14.32.el5.x86_64.rpm
- udev-debuginfo-095-14.32.el5.s390.rpm
- udev-095-14.32.el5.i386.rpm
- libvolume_id-095-14.32.el5.ppc64.rpm
- libvolume_id-095-14.32.el5.s390.rpm
- libvolume_id-095-14.32.el5.s390x.rpm
- libvolume_id-devel-095-14.32.el5.i386.rpm
- libvolume_id-devel-095-14.32.el5.s390.rpm
- libvolume_id-devel-095-14.32.el5.s390x.rpm
- libvolume_id-devel-095-14.32.el5.ppc.rpm
- udev-debuginfo-095-14.32.el5.x86_64.rpm
- udev-debuginfo-095-14.32.el5.ppc.rpm
- libvolume_id-095-14.32.el5.ia64.rpm
- udev-debuginfo-095-14.32.el5.ia64.rpm
- libvolume_id-095-14.32.el5.ppc.rpm
- libvolume_id-devel-095-14.32.el5.ia64.rpm
- libvolume_id-devel-095-14.32.el5.ppc64.rpm
- udev-debuginfo-095-14.32.el5.s390x.rpm
- udev-095-14.32.el5.s390x.rpm
- udev-debuginfo-095-14.32.el5.i386.rpm
- udev-095-14.32.el5.ia64.rpm
- udev-095-14.32.el5.src.rpm
- udev-095-14.32.el5.ppc.rpm
- udev-095-14.32.el5.x86_64.rpm
Fixes
- This content is not included.BZ - 405021
- This content is not included.BZ - 481349
- This content is not included.BZ - 573785
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.