- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHEA-2009:0218 - Product Enhancement Advisory
Synopsis
kbd enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An enhanced kbd package that adds a statically-linked loadkeys binary is now
available.
Description
The kbd package contains tools for managing console behavior on a Linux
system, including the keyboard, the screen fonts, the virtual terminals and
font files.
This updated kbd package adds support for installation to encrypted block
devices using LUKS, the Linux Unified Key Setup. Doing so requires that
initial initrd ramdisks need to support the decryption of encrypted root
and swap devices, as well as the ability to obtain pass phrases via
keyboard input. This in turn requires that the system keymap be loaded
prior to the user entering their pass phrase. Becuase the mkinitrd utility,
which is the program that creates the initial ramdisks, does not support
dynamically-linked binaries, a static loadkeys binary is required to enable
LUKS support. This updated kbd package provides this static loadkeys binary.
All users requiring LUKS encryption and/or a statically-linked loadkeys
binary should upgrade to this updated package, which adds this enhancement.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 451672 - [RFE] include static loadkeys
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
kbd-1.12-21.el5.src.rpm | SHA-256: bfc2a5de9597cf88bd45b20649d9acf334f96a860272a5158b02b4b025e65178 |
x86_64 | |
kbd-1.12-21.el5.x86_64.rpm | SHA-256: 9c7cc326d63e140cb4a080120464e140827d98ff898cd7c797f5e1f89b0f0500 |
ia64 | |
kbd-1.12-21.el5.ia64.rpm | SHA-256: 4832432bfb3cb31dea62be09cab9e53329a44abd1d052dbdf969375543ae15e0 |
i386 | |
kbd-1.12-21.el5.i386.rpm | SHA-256: 67f1e00fb658b704fe0014d4861015527f1e4cd7c35a7fe9c973acd4a600d26a |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
kbd-1.12-21.el5.src.rpm | SHA-256: bfc2a5de9597cf88bd45b20649d9acf334f96a860272a5158b02b4b025e65178 |
x86_64 | |
kbd-1.12-21.el5.x86_64.rpm | SHA-256: 9c7cc326d63e140cb4a080120464e140827d98ff898cd7c797f5e1f89b0f0500 |
i386 | |
kbd-1.12-21.el5.i386.rpm | SHA-256: 67f1e00fb658b704fe0014d4861015527f1e4cd7c35a7fe9c973acd4a600d26a |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
kbd-1.12-21.el5.src.rpm | SHA-256: bfc2a5de9597cf88bd45b20649d9acf334f96a860272a5158b02b4b025e65178 |
x86_64 | |
kbd-1.12-21.el5.x86_64.rpm | SHA-256: 9c7cc326d63e140cb4a080120464e140827d98ff898cd7c797f5e1f89b0f0500 |
i386 | |
kbd-1.12-21.el5.i386.rpm | SHA-256: 67f1e00fb658b704fe0014d4861015527f1e4cd7c35a7fe9c973acd4a600d26a |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
kbd-1.12-21.el5.src.rpm | SHA-256: bfc2a5de9597cf88bd45b20649d9acf334f96a860272a5158b02b4b025e65178 |
ppc | |
kbd-1.12-21.el5.ppc.rpm | SHA-256: 2c5f5c649b034b15a53bc9919a8fb7f4707e32d71f2e0c0409d0d2eee2281ef4 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
kbd-1.12-21.el5.src.rpm | SHA-256: bfc2a5de9597cf88bd45b20649d9acf334f96a860272a5158b02b4b025e65178 |
x86_64 | |
kbd-1.12-21.el5.x86_64.rpm | SHA-256: 9c7cc326d63e140cb4a080120464e140827d98ff898cd7c797f5e1f89b0f0500 |
i386 | |
kbd-1.12-21.el5.i386.rpm | SHA-256: 67f1e00fb658b704fe0014d4861015527f1e4cd7c35a7fe9c973acd4a600d26a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.