Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:0245 - Bug Fix Advisory
Issued:
2009-01-20
Updated:
2009-01-20

RHBA-2009:0245 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

initscripts bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

An updated initscripts package that fixes several bugs is now available.

Description

The initscripts package contains system scripts to boot your system, change
runlevels, activate and deactivate most network interfaces, and shut the
system down cleanly.

Bug fixes:

  • problems on IBM System z architectures that run the IBM z/VM hypervisor,

with regards to attaching and detaching IBM eServer zSeries HiperSockets
devices, have been resolved. Previously, "ifcfg-[interface]" scripts could
only assemble the network interface if the device emitted a kernel udev
event on the read channel (a read channel had to be specified). Now, any
channel (read, write, or data) emitting a kernel udev event results in
"ccw_init" finding the correct "ifcfg-[interface]" file, causing the
interface to be created. Note: due to kernel and driver issues, interfaces
may not always be resassembled when detaching and then reattaching devices.

  • combinations of encrypted and non-encrypted RAID devices may have caused

a "Failed to setup dm-crypt key mapping." error after entering the LUKS
passphrase. This issue was caused by the wrong device being treated as the
device to be mounted, such as a single disk in a RAID instead of the RAID
device itself. In this update, the correct device is mounted.

  • it was not possible to resume after suspend-to-disk when using an

encrypted (LUKS) swap partition. The swap partition was not recreated. Now,
a password encrypted swap partition can be used to suspend-to-disk.

  • on IBM System z architectures, problems in the udev rules for handling

CCW devices and the "ccw_init" script resulted in high memory usage and CPU
time during start-up. This update resolves these problems, as well as
restricting "ccw_init" to network devices.

  • network file systems in "/etc/fstab" that use the "_netdev" option are

not mounted by init scripts until the network is brought up, and the netfs
init script has run. The udev backlog may not have been completely
processed by the time the netfs script runs, resulting in such network
file systems failing to mount. In this update, "/sbin/udevsettle

  • -timeout=30" has been added to the netfs init script, allowing the netfs

script to become in sync with udev.

  • in network scripts, "logger" was not called with the full path. This may

have caused problems if another executable (which may be a different tool)
named "logger" was in a path ($PATH). In this update, the full path,
"/usr/bin/logger", is used in network scripts.

  • having a read-only NFS-mounted root file system caused several scripts to

fail, and unnecessary time outs. This update resolves these issues, and
prevents "/etc/mtab" being written to.

  • when using bonding, upon network restart, slave interfaces that are

already part of a bonded interface were not reassigned to the master,
causing the interface to fail. This issue caused loss of network
connectivity after running "service network start" or "start_udev" while
the network was already started. Errors such as "Interface eth[x] is
already enslaved!" may have been logged. The "ifcfg-[interface]" scripts
have been modified to resolve this issue.

  • encrypted logical volumes (LUKS) were not mounted during boot. This

prevented systems from booting correctly, dropping back to a prompt to
enter the root password for maintenance. Now, encrypted logical volumes are
mounted during boot.

  • the initscripts package (version 8.45.19) in RHBA-2008:0443 used a new

syntax for "arp_ip_target", which broke existing configurations. In this
update, the old and new syntax for "arp_ip_target" are correctly handled.

  • when using an encrypted swap partition, the "/etc/init.d/halt" script

cleared the partition in a way that is normal for unencrypted swap
partitions, losing the information that the partition was encrypted. On
newly-installed systems, the first boot was successful, but subsequent
reboots failed: the partition was unable to be unlocked.

Users are advised to upgrade to this updated package, which resolves these
issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

  • BZ - 433702 - nfs read-only root errors
  • BZ - 447928 - logger path in network init scripts
  • BZ - 452866 - netfs does not synchronise with udev
  • BZ - 459044 - Hipersocket real devices attach/detach in z/VM doesn't recover with write and data device
  • BZ - 466115 - Encrypted logical volumes aren't mounted during boot
  • BZ - 467954 - initscripts upgrade from 8.45.17 to 8.45.19 breaks arp_ip_target
  • BZ - 469823 - Encrypted swap on LVM disappears after 2nd reboot
  • BZ - 470027 - Combination of encrypted and non-encrypted RAID devices not working

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
initscripts-8.45.25-1.el5.src.rpm SHA-256: 2e9d5de365f6c497d0848a193ab47692a8442e4556638040636a9c69849ea111
x86_64
initscripts-8.45.25-1.el5.x86_64.rpm SHA-256: 9c9d7ba2613dc8b01856be99af832ba34955739754854f523adc1dd57ed9f2cb
ia64
initscripts-8.45.25-1.el5.ia64.rpm SHA-256: 6b1aae9525a144a5d9278f840da09f48160fd238f07d9dc737c389882527c825
i386
initscripts-8.45.25-1.el5.i386.rpm SHA-256: 2f473c098c0358b84c3400155c7551af09ef76806e0eda6cfac214dd01eae32b

Red Hat Enterprise Linux Workstation 5

SRPM
initscripts-8.45.25-1.el5.src.rpm SHA-256: 2e9d5de365f6c497d0848a193ab47692a8442e4556638040636a9c69849ea111
x86_64
initscripts-8.45.25-1.el5.x86_64.rpm SHA-256: 9c9d7ba2613dc8b01856be99af832ba34955739754854f523adc1dd57ed9f2cb
i386
initscripts-8.45.25-1.el5.i386.rpm SHA-256: 2f473c098c0358b84c3400155c7551af09ef76806e0eda6cfac214dd01eae32b

Red Hat Enterprise Linux Desktop 5

SRPM
initscripts-8.45.25-1.el5.src.rpm SHA-256: 2e9d5de365f6c497d0848a193ab47692a8442e4556638040636a9c69849ea111
x86_64
initscripts-8.45.25-1.el5.x86_64.rpm SHA-256: 9c9d7ba2613dc8b01856be99af832ba34955739754854f523adc1dd57ed9f2cb
i386
initscripts-8.45.25-1.el5.i386.rpm SHA-256: 2f473c098c0358b84c3400155c7551af09ef76806e0eda6cfac214dd01eae32b

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
initscripts-8.45.25-1.el5.src.rpm SHA-256: 2e9d5de365f6c497d0848a193ab47692a8442e4556638040636a9c69849ea111
s390x
initscripts-8.45.25-1.el5.s390x.rpm SHA-256: 6ddd482b5ea45afea7a4ecfcd4c8e7af679d19f8c0f274bdaf7085bab74457b5

Red Hat Enterprise Linux for Power, big endian 5

SRPM
initscripts-8.45.25-1.el5.src.rpm SHA-256: 2e9d5de365f6c497d0848a193ab47692a8442e4556638040636a9c69849ea111
ppc
initscripts-8.45.25-1.el5.ppc.rpm SHA-256: b83c49c49bb013b5c9c8aa08f3511dc0de13676c0458e1e86cd128c5930ed5d6

Red Hat Enterprise Linux Server from RHUI 5

SRPM
initscripts-8.45.25-1.el5.src.rpm SHA-256: 2e9d5de365f6c497d0848a193ab47692a8442e4556638040636a9c69849ea111
x86_64
initscripts-8.45.25-1.el5.x86_64.rpm SHA-256: 9c9d7ba2613dc8b01856be99af832ba34955739754854f523adc1dd57ed9f2cb
i386
initscripts-8.45.25-1.el5.i386.rpm SHA-256: 2f473c098c0358b84c3400155c7551af09ef76806e0eda6cfac214dd01eae32b

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility