Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2016:1818 - Bug Fix Advisory
Issued:
2016-09-06
Updated:
2016-09-06

RHBA-2016:1818 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

udev bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated udev packages that fix one bug are now available for Red Hat Enterprise Linux 6.6 Extended Update Support.

Description

The udev packages implement a dynamic device-directory, providing only the devices present on the system. This dynamic directory runs in user space, dynamically creates and removes devices, provides consistent naming, and a user-space API. The udev packages replace the devfs package and provide better hot plug functionality.

This update fixes the following bug:

  • Previously, the udev device manager applied permission changes only on add events. As a consequence, using the VDSM service to connect to storage pools failed. This update ensures that udev changes permissions on all appropriate events, which enables VDSM to connect to storage pools properly. (BZ#1371454)

Users of udev are advised to upgrade to these updated packages, which fix this bug.

Solution

Before applying this update, make sure all previously released errata relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Affected Products

  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.6 x86_64
  • Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.6 i386
  • Red Hat Enterprise Linux Server - AUS 6.6 x86_64
  • Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.6 s390x
  • Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.6 ppc64
  • Red Hat Enterprise Linux Server - TUS 6.6 x86_64
  • Red Hat Enterprise Linux EUS Compute Node 6.6 x86_64

Fixes

  • BZ - 1371454 - [6.6.z] udev applies permission changes only on add events

CVEs

(none)

References

  • http://www.redhat.com/security/updates/classification/#normal
Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux for x86_64 - Extended Update Support 6.6

SRPM
udev-147-2.57.el6_6.2.src.rpm SHA-256: 21773e90fa6851a1bc30045017c71a9748b92f16064fdbf3ed306d241adba91b
x86_64
libgudev1-147-2.57.el6_6.2.i686.rpm SHA-256: 03205d4437e8931e1d1dcd771b8ba331cbeb7ff538f82584c548dc9e6d17737b
libgudev1-147-2.57.el6_6.2.x86_64.rpm SHA-256: ff72f0ea69dea82e376d09f84f54b7f4e007da7fac0c591f73866edd1884ea1d
libgudev1-devel-147-2.57.el6_6.2.i686.rpm SHA-256: dc40a0165897f0b148545d8149ef13825083132bc0af27b449d91ba0cb852e38
libgudev1-devel-147-2.57.el6_6.2.x86_64.rpm SHA-256: 2882008bfaea02d047c49c8a804ffca1b18cc5044cb49a76ef835d6d89475dc0
libudev-147-2.57.el6_6.2.i686.rpm SHA-256: a540e1fad9f9f8d3524d78f1f0a63024401a36dea30e12ca3ceaadc6cc0cd45d
libudev-147-2.57.el6_6.2.x86_64.rpm SHA-256: 01da67879786e58d84ffe0382819092dbe211b615dad961e7acbe0269fae2467
libudev-devel-147-2.57.el6_6.2.i686.rpm SHA-256: d31503d6188e9c00a725a17315df52e6333e2d62ccb47986488d0773d7b98aa5
libudev-devel-147-2.57.el6_6.2.x86_64.rpm SHA-256: 266c5b3fb43983fd47b249de0845e68a66b67f7b6ab7e7c1065bf0cd2a9a7f3a
udev-147-2.57.el6_6.2.x86_64.rpm SHA-256: 2b506b643a10edc92dc6cb40b4912edd7b829676b3226feb2257e880e21a5d76
udev-debuginfo-147-2.57.el6_6.2.i686.rpm SHA-256: 8afd6be873063babb152d31099752c2c1db892fe6f09709e78cb5d614d171fab
udev-debuginfo-147-2.57.el6_6.2.x86_64.rpm SHA-256: c2a6a33c960534ad981fb3cd3bad327f653f7cb57556f3aa425187abbd4c8e88
i386
libgudev1-147-2.57.el6_6.2.i686.rpm SHA-256: 03205d4437e8931e1d1dcd771b8ba331cbeb7ff538f82584c548dc9e6d17737b
libgudev1-devel-147-2.57.el6_6.2.i686.rpm SHA-256: dc40a0165897f0b148545d8149ef13825083132bc0af27b449d91ba0cb852e38
libudev-147-2.57.el6_6.2.i686.rpm SHA-256: a540e1fad9f9f8d3524d78f1f0a63024401a36dea30e12ca3ceaadc6cc0cd45d
libudev-devel-147-2.57.el6_6.2.i686.rpm SHA-256: d31503d6188e9c00a725a17315df52e6333e2d62ccb47986488d0773d7b98aa5
udev-147-2.57.el6_6.2.i686.rpm SHA-256: 223cf7b4c7932923a3b6c885177721b4dfb6a37f7c4f5f4ca346a2b78d0f01dd
udev-debuginfo-147-2.57.el6_6.2.i686.rpm SHA-256: 8afd6be873063babb152d31099752c2c1db892fe6f09709e78cb5d614d171fab

Red Hat Enterprise Linux Server - AUS 6.6

SRPM
udev-147-2.57.el6_6.2.src.rpm SHA-256: 21773e90fa6851a1bc30045017c71a9748b92f16064fdbf3ed306d241adba91b
x86_64
libgudev1-147-2.57.el6_6.2.i686.rpm SHA-256: 03205d4437e8931e1d1dcd771b8ba331cbeb7ff538f82584c548dc9e6d17737b
libgudev1-147-2.57.el6_6.2.x86_64.rpm SHA-256: ff72f0ea69dea82e376d09f84f54b7f4e007da7fac0c591f73866edd1884ea1d
libgudev1-devel-147-2.57.el6_6.2.i686.rpm SHA-256: dc40a0165897f0b148545d8149ef13825083132bc0af27b449d91ba0cb852e38
libgudev1-devel-147-2.57.el6_6.2.x86_64.rpm SHA-256: 2882008bfaea02d047c49c8a804ffca1b18cc5044cb49a76ef835d6d89475dc0
libudev-147-2.57.el6_6.2.i686.rpm SHA-256: a540e1fad9f9f8d3524d78f1f0a63024401a36dea30e12ca3ceaadc6cc0cd45d
libudev-147-2.57.el6_6.2.x86_64.rpm SHA-256: 01da67879786e58d84ffe0382819092dbe211b615dad961e7acbe0269fae2467
libudev-devel-147-2.57.el6_6.2.i686.rpm SHA-256: d31503d6188e9c00a725a17315df52e6333e2d62ccb47986488d0773d7b98aa5
libudev-devel-147-2.57.el6_6.2.x86_64.rpm SHA-256: 266c5b3fb43983fd47b249de0845e68a66b67f7b6ab7e7c1065bf0cd2a9a7f3a
udev-147-2.57.el6_6.2.x86_64.rpm SHA-256: 2b506b643a10edc92dc6cb40b4912edd7b829676b3226feb2257e880e21a5d76
udev-debuginfo-147-2.57.el6_6.2.i686.rpm SHA-256: 8afd6be873063babb152d31099752c2c1db892fe6f09709e78cb5d614d171fab
udev-debuginfo-147-2.57.el6_6.2.x86_64.rpm SHA-256: c2a6a33c960534ad981fb3cd3bad327f653f7cb57556f3aa425187abbd4c8e88

Red Hat Enterprise Linux for IBM z Systems - Extended Update Support 6.6

SRPM
udev-147-2.57.el6_6.2.src.rpm SHA-256: 21773e90fa6851a1bc30045017c71a9748b92f16064fdbf3ed306d241adba91b
s390x
libgudev1-147-2.57.el6_6.2.s390.rpm SHA-256: ef85e07468530f2e62e9331516263100b0d3ab8c83b6be03c5157908df2fe369
libgudev1-147-2.57.el6_6.2.s390x.rpm SHA-256: e6ef72a711634fa4931c0a5d921e71e0d76612a5a7f393ce9f49f4a1bbe1a44f
libgudev1-devel-147-2.57.el6_6.2.s390.rpm SHA-256: 922da160c5179dc540680524063ac6a853ccd010c07d782b468662f9f79b1204
libgudev1-devel-147-2.57.el6_6.2.s390x.rpm SHA-256: 16d673b2fead4888c7a7284ae3764ab3334bca9d1b490ca8345d931677f74345
libudev-147-2.57.el6_6.2.s390.rpm SHA-256: ff4e2f6b8e5588f316907be4158a28a0feeafe1ba7863f79e56725a5c1285f20
libudev-147-2.57.el6_6.2.s390x.rpm SHA-256: 09d57431b617c85fabefb955f2bd1fbd98b781dd287f30b1bf0b3b631524fa96
libudev-devel-147-2.57.el6_6.2.s390.rpm SHA-256: 93dc2c451a52376b164edc0e7517031f2783d775c79149e785bbd66d74404419
libudev-devel-147-2.57.el6_6.2.s390x.rpm SHA-256: 0a420ecb377de4b88da8246d905eaeb4ae7dadaddc73af6772626b2c766d1e7d
udev-147-2.57.el6_6.2.s390x.rpm SHA-256: e6f8f586742c6c7728a258f423eeeee0446979878f6851bc0c3e52408609878b
udev-debuginfo-147-2.57.el6_6.2.s390.rpm SHA-256: c44eaebf2158581618e4078f3875aa391ef9d47e060284db99a27689f92ff11b
udev-debuginfo-147-2.57.el6_6.2.s390x.rpm SHA-256: 6cdeeabee2638c02d948f99ff9ac75908c5d3bf8985acfef0fef5158dc24b8ab

Red Hat Enterprise Linux for Power, big endian - Extended Update Support 6.6

SRPM
udev-147-2.57.el6_6.2.src.rpm SHA-256: 21773e90fa6851a1bc30045017c71a9748b92f16064fdbf3ed306d241adba91b
ppc64
libgudev1-147-2.57.el6_6.2.ppc.rpm SHA-256: 572fa890b241950f6593f6e99064f886fa8fa0a400a3a07d357bb2fb457e473a
libgudev1-147-2.57.el6_6.2.ppc64.rpm SHA-256: df1221d7e881d232a48ddcba86fb103a877b83653131cffa0c5848d72b61c123
libgudev1-devel-147-2.57.el6_6.2.ppc.rpm SHA-256: 1fb7d01efd69841dbc78b0207f2b280ccacfad15a4c5586f4cb8686b81d46756
libgudev1-devel-147-2.57.el6_6.2.ppc64.rpm SHA-256: dc65209b34275b14d69208d270ef4ee068292622612ad8a1442efe26b7ffe619
libudev-147-2.57.el6_6.2.ppc.rpm SHA-256: 4fa2c6d8bb75a57191944c260641541edebc30261063c470bb8a2076c8f8a74a
libudev-147-2.57.el6_6.2.ppc64.rpm SHA-256: 5b68f493e6355acb7f743d3c9b951b98e9739823c6da1e64b552a9ff689ec456
libudev-devel-147-2.57.el6_6.2.ppc.rpm SHA-256: f18ff702e51a699767d3b4780bd16ea62fa2c9988fbec6dacaf7e36fa5cf4b88
libudev-devel-147-2.57.el6_6.2.ppc64.rpm SHA-256: 32204a78eb8aae2b5c84e05b450abd4d48419dc8bc10df2048baed6fe87b37ff
udev-147-2.57.el6_6.2.ppc64.rpm SHA-256: 3d64a19e9973552e4910f0ec9b548705ea9141e95e7882e81315dd20cb3eac4d
udev-debuginfo-147-2.57.el6_6.2.ppc.rpm SHA-256: 3b064450d423b89a121cc3304814b2586154786d5f6b3f424db9426f414b9482
udev-debuginfo-147-2.57.el6_6.2.ppc64.rpm SHA-256: dc920ddb7012e74c73aa02120926769a546e0dae8b7c458c7485042d3319888d

Red Hat Enterprise Linux Server - TUS 6.6

SRPM
udev-147-2.57.el6_6.2.src.rpm SHA-256: 21773e90fa6851a1bc30045017c71a9748b92f16064fdbf3ed306d241adba91b
x86_64
libgudev1-147-2.57.el6_6.2.i686.rpm SHA-256: 03205d4437e8931e1d1dcd771b8ba331cbeb7ff538f82584c548dc9e6d17737b
libgudev1-147-2.57.el6_6.2.x86_64.rpm SHA-256: ff72f0ea69dea82e376d09f84f54b7f4e007da7fac0c591f73866edd1884ea1d
libgudev1-devel-147-2.57.el6_6.2.i686.rpm SHA-256: dc40a0165897f0b148545d8149ef13825083132bc0af27b449d91ba0cb852e38
libgudev1-devel-147-2.57.el6_6.2.x86_64.rpm SHA-256: 2882008bfaea02d047c49c8a804ffca1b18cc5044cb49a76ef835d6d89475dc0
libudev-147-2.57.el6_6.2.i686.rpm SHA-256: a540e1fad9f9f8d3524d78f1f0a63024401a36dea30e12ca3ceaadc6cc0cd45d
libudev-147-2.57.el6_6.2.x86_64.rpm SHA-256: 01da67879786e58d84ffe0382819092dbe211b615dad961e7acbe0269fae2467
libudev-devel-147-2.57.el6_6.2.i686.rpm SHA-256: d31503d6188e9c00a725a17315df52e6333e2d62ccb47986488d0773d7b98aa5
libudev-devel-147-2.57.el6_6.2.x86_64.rpm SHA-256: 266c5b3fb43983fd47b249de0845e68a66b67f7b6ab7e7c1065bf0cd2a9a7f3a
udev-147-2.57.el6_6.2.x86_64.rpm SHA-256: 2b506b643a10edc92dc6cb40b4912edd7b829676b3226feb2257e880e21a5d76
udev-debuginfo-147-2.57.el6_6.2.i686.rpm SHA-256: 8afd6be873063babb152d31099752c2c1db892fe6f09709e78cb5d614d171fab
udev-debuginfo-147-2.57.el6_6.2.x86_64.rpm SHA-256: c2a6a33c960534ad981fb3cd3bad327f653f7cb57556f3aa425187abbd4c8e88

Red Hat Enterprise Linux EUS Compute Node 6.6

SRPM
udev-147-2.57.el6_6.2.src.rpm SHA-256: 21773e90fa6851a1bc30045017c71a9748b92f16064fdbf3ed306d241adba91b
x86_64
libgudev1-147-2.57.el6_6.2.i686.rpm SHA-256: 03205d4437e8931e1d1dcd771b8ba331cbeb7ff538f82584c548dc9e6d17737b
libgudev1-147-2.57.el6_6.2.x86_64.rpm SHA-256: ff72f0ea69dea82e376d09f84f54b7f4e007da7fac0c591f73866edd1884ea1d
libgudev1-devel-147-2.57.el6_6.2.i686.rpm SHA-256: dc40a0165897f0b148545d8149ef13825083132bc0af27b449d91ba0cb852e38
libgudev1-devel-147-2.57.el6_6.2.x86_64.rpm SHA-256: 2882008bfaea02d047c49c8a804ffca1b18cc5044cb49a76ef835d6d89475dc0
libudev-147-2.57.el6_6.2.i686.rpm SHA-256: a540e1fad9f9f8d3524d78f1f0a63024401a36dea30e12ca3ceaadc6cc0cd45d
libudev-147-2.57.el6_6.2.x86_64.rpm SHA-256: 01da67879786e58d84ffe0382819092dbe211b615dad961e7acbe0269fae2467
libudev-devel-147-2.57.el6_6.2.i686.rpm SHA-256: d31503d6188e9c00a725a17315df52e6333e2d62ccb47986488d0773d7b98aa5
libudev-devel-147-2.57.el6_6.2.x86_64.rpm SHA-256: 266c5b3fb43983fd47b249de0845e68a66b67f7b6ab7e7c1065bf0cd2a9a7f3a
udev-147-2.57.el6_6.2.x86_64.rpm SHA-256: 2b506b643a10edc92dc6cb40b4912edd7b829676b3226feb2257e880e21a5d76
udev-debuginfo-147-2.57.el6_6.2.i686.rpm SHA-256: 8afd6be873063babb152d31099752c2c1db892fe6f09709e78cb5d614d171fab
udev-debuginfo-147-2.57.el6_6.2.i686.rpm SHA-256: 8afd6be873063babb152d31099752c2c1db892fe6f09709e78cb5d614d171fab
udev-debuginfo-147-2.57.el6_6.2.x86_64.rpm SHA-256: c2a6a33c960534ad981fb3cd3bad327f653f7cb57556f3aa425187abbd4c8e88
udev-debuginfo-147-2.57.el6_6.2.x86_64.rpm SHA-256: c2a6a33c960534ad981fb3cd3bad327f653f7cb57556f3aa425187abbd4c8e88

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2026 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility