Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Containers
  • Support Cases
  • Products & Services

    Products

    Support

    • Production Support
    • Development Support
    • Product Life Cycles

    Services

    • Consulting
    • Technical Account Management
    • Training & Certifications

    Documentation

    • Red Hat Enterprise Linux
    • Red Hat JBoss Enterprise Application Platform
    • Red Hat OpenStack Platform
    • Red Hat OpenShift Container Platform
    All Documentation

    Ecosystem Catalog

    • Red Hat Partner Ecosystem
    • Partner Resources
  • Tools

    Tools

    • Troubleshoot a product issue
    • Packages
    • Errata

    Customer Portal Labs

    • Configuration
    • Deployment
    • Security
    • Troubleshoot
    All labs

    Red Hat Insights

    Increase visibility into IT operations to detect and resolve technical issues before they impact your business.

    Learn More
    Go to Insights
  • Security

    Red Hat Product Security Center

    Engage with our Red Hat Product Security team, access security updates, and ensure your environments are not exposed to any known security vulnerabilities.

    Product Security Center

    Security Updates

    • Security Advisories
    • Red Hat CVE Database
    • Security Labs

    Keep your systems secure with Red Hat's specialized responses to security vulnerabilities.

    View Responses

    Resources

    • Security Blog
    • Security Measurement
    • Severity Ratings
    • Backporting Policies
    • Product Signing (GPG) Keys
  • Community

    Customer Portal Community

    • Discussions
    • Private Groups
    Community Activity

    Customer Events

    • Red Hat Convergence
    • Red Hat Summit

    Stories

    • Red Hat Subscription Value
    • You Asked. We Acted.
    • Open Source Communities
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift Container Platform
  • Red Hat OpenShift Data Science
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat Single Sign On
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2013:0091 - Bug Fix Advisory
Issued:
2013-01-07
Updated:
2013-01-07

RHBA-2013:0091 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

udev bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated udev packages that fix several bugs are now available for Red Hat
Enterprise Linux 5.

Description

The udev packages implement a dynamic device directory, exposing the devices
currently present on the system. The directory runs in user space, dynamically
creates and removes devices, ensures consistent naming, and provides a
user-space API.

This update fixes the following bugs:

  • On system boot, the udev helper application, pam_console_apply, was called for

every disk on the system. This was unnecessary for example for SCSI disks, which
do not have default pam console permissions. As a consequence, the boot process
was significantly slowed down if the system contained a large number of disks.
To fix this problem, the /etc/udev/rules.d/95-pam-console.rules file has been
marked as a configuration file and it will not be automatically updated with
newer udev versions. System administrators should now comment out the
pam_console_apply call in this file on systems that do not need non-root user
access to devices. (BZ#736475)

  • Previously, the udev helper tool for loading firmware into drivers was logging

to syslog only. Consequently, there was no output in the early boot stage when
the syslog daemon was not running. With this update, if the udevd daemon is
running in debug mode, the firmware_helper also logs to the console, which helps
to debug firmware loading problems. (BZ#758205)

  • The WAIT_FOR_SYSFS variable in the udev rules was set to wait 3 seconds for a

file in the sysfs file system to appear. This timeout was too low for some
hot-added SCSI disks that need at least 6 seconds to spin up. Therefore no
symbolic links in the /dev/disk/ directory were created. The WAIT_FOR_SYSFS
variable has been set to 10 seconds, which is enough for most disks. This
results in proper udev database entries and symbolic links. (BZ#769169)

  • Prior to this update, udev used the target's port identifier instead of the

initiator's PHY identifier in the /dev/disk/by-path symbolic link. Consequent to
this, when the disk was hot-removed and hot-added, the symbolic link used a
different pathname. This bug has been fixed and udev now uses the correct
initiator's PHY identifier in the symbolic link, which remains the same for
re-added disks. (BZ#812286)

All users of udev are advised to upgrade to these updated packages, which fix
these bugs.

Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Affected Products

  • Red Hat Enterprise Linux Server 5 x86_64
  • Red Hat Enterprise Linux Server 5 ia64
  • Red Hat Enterprise Linux Server 5 i386
  • Red Hat Enterprise Linux Workstation 5 x86_64
  • Red Hat Enterprise Linux Workstation 5 i386
  • Red Hat Enterprise Linux Desktop 5 x86_64
  • Red Hat Enterprise Linux Desktop 5 i386
  • Red Hat Enterprise Linux for IBM z Systems 5 s390x
  • Red Hat Enterprise Linux for Power, big endian 5 ppc
  • Red Hat Enterprise Linux Server from RHUI 5 x86_64
  • Red Hat Enterprise Linux Server from RHUI 5 i386

Fixes

(none)

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 5

SRPM
udev-095-14.29.el5.src.rpm SHA-256: 45f704a1967888962bca5c2de099b9ebc1d4cfb6dc1d618a0b9becc2646dbb59
x86_64
libvolume_id-095-14.29.el5.i386.rpm SHA-256: fc16cc0637a002a37d68876497c867d34fe2c6f85fbb5f686345f830c58ac29e
libvolume_id-095-14.29.el5.x86_64.rpm SHA-256: 68a9725b0db708fc62189371c98c9c4cc169f3ab712c6d29aabd151c5c2e0868
libvolume_id-devel-095-14.29.el5.i386.rpm SHA-256: d1b57ddf1f73b900047ea6b16c34a0bce035b2489411dc43c9bc67a0a3573dcd
libvolume_id-devel-095-14.29.el5.x86_64.rpm SHA-256: fc846e6d82a2bc3c200f26e018b10a5122a172d242380574e6562c088158a0de
udev-095-14.29.el5.x86_64.rpm SHA-256: 946006c57da4668f16d546346800598eaf0f5584ecfa3ecfef52ed97142893b7
udev-debuginfo-095-14.29.el5.i386.rpm SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37
udev-debuginfo-095-14.29.el5.x86_64.rpm SHA-256: 83a94f59b5d1f0d04f7024d7ee2e1e2849ce380a578a81eb3aba15a197d41554
ia64
libvolume_id-095-14.29.el5.ia64.rpm SHA-256: b06a54f155a987fdfc06db5c6b1be29965186d798c05afef7a219ec6df076be5
libvolume_id-devel-095-14.29.el5.ia64.rpm SHA-256: fd75f55073113bfaf1bb7bd64bd916b8bdfd252d8649458ba7ae75fa6ca3d89c
udev-095-14.29.el5.ia64.rpm SHA-256: a4a119bc073e1dec82d235a0950b001d83ff5ca77ad8f2eae86c44a106dc23a0
udev-debuginfo-095-14.29.el5.ia64.rpm SHA-256: 242c1166c384802b81dadb4ebb24092d4718a566f95724f0be8da334e4ac0067
i386
libvolume_id-095-14.29.el5.i386.rpm SHA-256: fc16cc0637a002a37d68876497c867d34fe2c6f85fbb5f686345f830c58ac29e
libvolume_id-devel-095-14.29.el5.i386.rpm SHA-256: d1b57ddf1f73b900047ea6b16c34a0bce035b2489411dc43c9bc67a0a3573dcd
udev-095-14.29.el5.i386.rpm SHA-256: 7c935f44bae0f2974e50838f76829702cdd4107b3127c66455c09c9503c9f239
udev-debuginfo-095-14.29.el5.i386.rpm SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37

Red Hat Enterprise Linux Workstation 5

SRPM
udev-095-14.29.el5.src.rpm SHA-256: 45f704a1967888962bca5c2de099b9ebc1d4cfb6dc1d618a0b9becc2646dbb59
x86_64
libvolume_id-095-14.29.el5.i386.rpm SHA-256: fc16cc0637a002a37d68876497c867d34fe2c6f85fbb5f686345f830c58ac29e
libvolume_id-095-14.29.el5.x86_64.rpm SHA-256: 68a9725b0db708fc62189371c98c9c4cc169f3ab712c6d29aabd151c5c2e0868
libvolume_id-devel-095-14.29.el5.i386.rpm SHA-256: d1b57ddf1f73b900047ea6b16c34a0bce035b2489411dc43c9bc67a0a3573dcd
libvolume_id-devel-095-14.29.el5.x86_64.rpm SHA-256: fc846e6d82a2bc3c200f26e018b10a5122a172d242380574e6562c088158a0de
udev-095-14.29.el5.x86_64.rpm SHA-256: 946006c57da4668f16d546346800598eaf0f5584ecfa3ecfef52ed97142893b7
udev-debuginfo-095-14.29.el5.i386.rpm SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37
udev-debuginfo-095-14.29.el5.i386.rpm SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37
udev-debuginfo-095-14.29.el5.x86_64.rpm SHA-256: 83a94f59b5d1f0d04f7024d7ee2e1e2849ce380a578a81eb3aba15a197d41554
udev-debuginfo-095-14.29.el5.x86_64.rpm SHA-256: 83a94f59b5d1f0d04f7024d7ee2e1e2849ce380a578a81eb3aba15a197d41554
i386
libvolume_id-095-14.29.el5.i386.rpm SHA-256: fc16cc0637a002a37d68876497c867d34fe2c6f85fbb5f686345f830c58ac29e
libvolume_id-devel-095-14.29.el5.i386.rpm SHA-256: d1b57ddf1f73b900047ea6b16c34a0bce035b2489411dc43c9bc67a0a3573dcd
udev-095-14.29.el5.i386.rpm SHA-256: 7c935f44bae0f2974e50838f76829702cdd4107b3127c66455c09c9503c9f239
udev-debuginfo-095-14.29.el5.i386.rpm SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37
udev-debuginfo-095-14.29.el5.i386.rpm SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37

Red Hat Enterprise Linux Desktop 5

SRPM
udev-095-14.29.el5.src.rpm SHA-256: 45f704a1967888962bca5c2de099b9ebc1d4cfb6dc1d618a0b9becc2646dbb59
x86_64
libvolume_id-095-14.29.el5.i386.rpm SHA-256: fc16cc0637a002a37d68876497c867d34fe2c6f85fbb5f686345f830c58ac29e
libvolume_id-095-14.29.el5.x86_64.rpm SHA-256: 68a9725b0db708fc62189371c98c9c4cc169f3ab712c6d29aabd151c5c2e0868
udev-095-14.29.el5.x86_64.rpm SHA-256: 946006c57da4668f16d546346800598eaf0f5584ecfa3ecfef52ed97142893b7
udev-debuginfo-095-14.29.el5.i386.rpm SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37
udev-debuginfo-095-14.29.el5.x86_64.rpm SHA-256: 83a94f59b5d1f0d04f7024d7ee2e1e2849ce380a578a81eb3aba15a197d41554
i386
libvolume_id-095-14.29.el5.i386.rpm SHA-256: fc16cc0637a002a37d68876497c867d34fe2c6f85fbb5f686345f830c58ac29e
udev-095-14.29.el5.i386.rpm SHA-256: 7c935f44bae0f2974e50838f76829702cdd4107b3127c66455c09c9503c9f239
udev-debuginfo-095-14.29.el5.i386.rpm SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37

Red Hat Enterprise Linux for IBM z Systems 5

SRPM
udev-095-14.29.el5.src.rpm SHA-256: 45f704a1967888962bca5c2de099b9ebc1d4cfb6dc1d618a0b9becc2646dbb59
s390x
libvolume_id-095-14.29.el5.s390.rpm SHA-256: c7f10243eb9c2c2ef08161ea176cd7b79b24648007a55a782dfdce6523b90708
libvolume_id-095-14.29.el5.s390x.rpm SHA-256: 06d18381c515978e0507b5924b3d3fb60502583e4d1d85183c39a23d7aa222d4
libvolume_id-devel-095-14.29.el5.s390.rpm SHA-256: 665672d6a6b752e99eaf19dd289fb8211ed19a3de7ce552786b908a8d356b95a
libvolume_id-devel-095-14.29.el5.s390x.rpm SHA-256: 46f0909f2b66663e7478c02968dc65c8ad02cc17de1356c079b37afa35d63150
udev-095-14.29.el5.s390x.rpm SHA-256: b487bae1715d268240361a8255c7b6e94a17f0816e12f295284320253acee0c7
udev-debuginfo-095-14.29.el5.s390.rpm SHA-256: d973bd62158976ead4cc39a409b0d0f22a63a53428718d7e5a8c78c9ef622370
udev-debuginfo-095-14.29.el5.s390x.rpm SHA-256: 067c92a4284a5fd39dba0821a9fb60747218ac959e4bf6c696a1a467ff5b5e84

Red Hat Enterprise Linux for Power, big endian 5

SRPM
udev-095-14.29.el5.src.rpm SHA-256: 45f704a1967888962bca5c2de099b9ebc1d4cfb6dc1d618a0b9becc2646dbb59
ppc
libvolume_id-095-14.29.el5.ppc.rpm SHA-256: fa32b89d7749d10a7a892abe8c5d8bb6dcc83ce79d7fd80333dc26f1ebda3be8
libvolume_id-095-14.29.el5.ppc64.rpm SHA-256: efa27c0b99715774da511b849a6a7f106f63420685ed1ee1d527ecf408558d02
libvolume_id-devel-095-14.29.el5.ppc.rpm SHA-256: 4308722f217a08df02cc82e99f42683cdf2998336ff61d6a2569ddd8fb8d9f9a
libvolume_id-devel-095-14.29.el5.ppc64.rpm SHA-256: 125b854daa0b79732888eada4324e9d4363e0602a0218d62dd6d1d98be358f42
udev-095-14.29.el5.ppc.rpm SHA-256: a008061fc8a73698da756f63aa7e977fef09e1d7cca22db409a8254ba903627c
udev-debuginfo-095-14.29.el5.ppc.rpm SHA-256: 05f7a66cca123c83fb6317fb7bdfca6a7d59112eb4280eba5a88903f5444c077
udev-debuginfo-095-14.29.el5.ppc64.rpm SHA-256: 7215262078c2df748b4031ac004f41be14d4112d8848cad9a0861dfe847072e3

Red Hat Enterprise Linux Server from RHUI 5

SRPM
udev-095-14.29.el5.src.rpm SHA-256: 45f704a1967888962bca5c2de099b9ebc1d4cfb6dc1d618a0b9becc2646dbb59
x86_64
libvolume_id-095-14.29.el5.i386.rpm SHA-256: fc16cc0637a002a37d68876497c867d34fe2c6f85fbb5f686345f830c58ac29e
libvolume_id-095-14.29.el5.x86_64.rpm SHA-256: 68a9725b0db708fc62189371c98c9c4cc169f3ab712c6d29aabd151c5c2e0868
libvolume_id-devel-095-14.29.el5.i386.rpm SHA-256: d1b57ddf1f73b900047ea6b16c34a0bce035b2489411dc43c9bc67a0a3573dcd
libvolume_id-devel-095-14.29.el5.x86_64.rpm SHA-256: fc846e6d82a2bc3c200f26e018b10a5122a172d242380574e6562c088158a0de
udev-095-14.29.el5.x86_64.rpm SHA-256: 946006c57da4668f16d546346800598eaf0f5584ecfa3ecfef52ed97142893b7
udev-debuginfo-095-14.29.el5.i386.rpm SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37
udev-debuginfo-095-14.29.el5.x86_64.rpm SHA-256: 83a94f59b5d1f0d04f7024d7ee2e1e2849ce380a578a81eb3aba15a197d41554
i386
libvolume_id-095-14.29.el5.i386.rpm SHA-256: fc16cc0637a002a37d68876497c867d34fe2c6f85fbb5f686345f830c58ac29e
libvolume_id-devel-095-14.29.el5.i386.rpm SHA-256: d1b57ddf1f73b900047ea6b16c34a0bce035b2489411dc43c9bc67a0a3573dcd
udev-095-14.29.el5.i386.rpm SHA-256: 7c935f44bae0f2974e50838f76829702cdd4107b3127c66455c09c9503c9f239
udev-debuginfo-095-14.29.el5.i386.rpm SHA-256: 4e2f678f961abbe69bbd54b2e14fe9a3f40f8c6f679fe6533bd7cb3103e92c37

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

About

  • Red Hat Subscription Value
  • About Red Hat
  • Red Hat Jobs
2023
  • Privacy Statement
  • Terms of Use
  • All Policies and Guidelines
We've updated our Privacy Policy effective July 1st, 2023.
Red Hat Summit Red Hat Summit
Twitter