Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Security Measurement
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Insights
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Insights
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2008:0728 - Bug Fix Advisory
Issued:
2008-07-24
Updated:
2008-07-24

RHBA-2008:0728 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

GConf2 bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Insights patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated GConf2 packages that fix a bug are now available.

Description

GConf is a process-transparent configuration database API used to store
user preferences. It has pluggable backends and features to support
workgroup administration.

The "gconftool-2" command line utility did not correctly set the umask
when performing a "--load" operation. On systems with a restrictive default
umask, this issue caused problems, such as missing icons and panels, after
upgrading the "gnome-panel" package. As well, this issue may have occurred
after upgrading Red Hat Enterprise Linux 4.4 to version 4.5.

Users of GConf2 are advised to upgrade to these updated packages, which
resolve this issue.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

(none)

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
GConf2-2.8.1-2.el4.src.rpm SHA-256: 060bec7936f70e630b54a8e99c3276d2d89fb209326ba3a6ce898ffa6110c4c4
x86_64
GConf2-2.8.1-2.el4.i386.rpm SHA-256: dd4ea5342fb6a9d689ff3a3363de094eef8cd9861267265b51d2f7d65d6e69c5
GConf2-2.8.1-2.el4.i386.rpm SHA-256: dd4ea5342fb6a9d689ff3a3363de094eef8cd9861267265b51d2f7d65d6e69c5
GConf2-2.8.1-2.el4.x86_64.rpm SHA-256: 6120c61ef681f437521ad070787f1725be50507ae88e97b575c84d9dd41e6267
GConf2-2.8.1-2.el4.x86_64.rpm SHA-256: 6120c61ef681f437521ad070787f1725be50507ae88e97b575c84d9dd41e6267
GConf2-devel-2.8.1-2.el4.x86_64.rpm SHA-256: 47b7d146c9f06948c8dcf91771390541204b5380635edba25004373aa0e0896c
GConf2-devel-2.8.1-2.el4.x86_64.rpm SHA-256: 47b7d146c9f06948c8dcf91771390541204b5380635edba25004373aa0e0896c
ia64
GConf2-2.8.1-2.el4.i386.rpm SHA-256: dd4ea5342fb6a9d689ff3a3363de094eef8cd9861267265b51d2f7d65d6e69c5
GConf2-2.8.1-2.el4.i386.rpm SHA-256: dd4ea5342fb6a9d689ff3a3363de094eef8cd9861267265b51d2f7d65d6e69c5
GConf2-2.8.1-2.el4.ia64.rpm SHA-256: 63648a89b37d519d0fddd2e3887c25d90082618f2633b79c468b9774ded0f9ef
GConf2-2.8.1-2.el4.ia64.rpm SHA-256: 63648a89b37d519d0fddd2e3887c25d90082618f2633b79c468b9774ded0f9ef
GConf2-devel-2.8.1-2.el4.ia64.rpm SHA-256: 00716c0f16abff9a7553a40fc7b42be930fa32a503656d45921c6192d3ab2484
GConf2-devel-2.8.1-2.el4.ia64.rpm SHA-256: 00716c0f16abff9a7553a40fc7b42be930fa32a503656d45921c6192d3ab2484
i386
GConf2-2.8.1-2.el4.i386.rpm SHA-256: dd4ea5342fb6a9d689ff3a3363de094eef8cd9861267265b51d2f7d65d6e69c5
GConf2-2.8.1-2.el4.i386.rpm SHA-256: dd4ea5342fb6a9d689ff3a3363de094eef8cd9861267265b51d2f7d65d6e69c5
GConf2-devel-2.8.1-2.el4.i386.rpm SHA-256: cb7a528adc7f29a428495f960b8c60d9e087161e3db8757651cade7d262cebb3
GConf2-devel-2.8.1-2.el4.i386.rpm SHA-256: cb7a528adc7f29a428495f960b8c60d9e087161e3db8757651cade7d262cebb3

Red Hat Enterprise Linux Workstation 4

SRPM
GConf2-2.8.1-2.el4.src.rpm SHA-256: 060bec7936f70e630b54a8e99c3276d2d89fb209326ba3a6ce898ffa6110c4c4
x86_64
GConf2-2.8.1-2.el4.i386.rpm SHA-256: dd4ea5342fb6a9d689ff3a3363de094eef8cd9861267265b51d2f7d65d6e69c5
GConf2-2.8.1-2.el4.x86_64.rpm SHA-256: 6120c61ef681f437521ad070787f1725be50507ae88e97b575c84d9dd41e6267
GConf2-devel-2.8.1-2.el4.x86_64.rpm SHA-256: 47b7d146c9f06948c8dcf91771390541204b5380635edba25004373aa0e0896c
ia64
GConf2-2.8.1-2.el4.i386.rpm SHA-256: dd4ea5342fb6a9d689ff3a3363de094eef8cd9861267265b51d2f7d65d6e69c5
GConf2-2.8.1-2.el4.ia64.rpm SHA-256: 63648a89b37d519d0fddd2e3887c25d90082618f2633b79c468b9774ded0f9ef
GConf2-devel-2.8.1-2.el4.ia64.rpm SHA-256: 00716c0f16abff9a7553a40fc7b42be930fa32a503656d45921c6192d3ab2484
i386
GConf2-2.8.1-2.el4.i386.rpm SHA-256: dd4ea5342fb6a9d689ff3a3363de094eef8cd9861267265b51d2f7d65d6e69c5
GConf2-devel-2.8.1-2.el4.i386.rpm SHA-256: cb7a528adc7f29a428495f960b8c60d9e087161e3db8757651cade7d262cebb3

Red Hat Enterprise Linux Desktop 4

SRPM
GConf2-2.8.1-2.el4.src.rpm SHA-256: 060bec7936f70e630b54a8e99c3276d2d89fb209326ba3a6ce898ffa6110c4c4
x86_64
GConf2-2.8.1-2.el4.i386.rpm SHA-256: dd4ea5342fb6a9d689ff3a3363de094eef8cd9861267265b51d2f7d65d6e69c5
GConf2-2.8.1-2.el4.x86_64.rpm SHA-256: 6120c61ef681f437521ad070787f1725be50507ae88e97b575c84d9dd41e6267
GConf2-devel-2.8.1-2.el4.x86_64.rpm SHA-256: 47b7d146c9f06948c8dcf91771390541204b5380635edba25004373aa0e0896c
i386
GConf2-2.8.1-2.el4.i386.rpm SHA-256: dd4ea5342fb6a9d689ff3a3363de094eef8cd9861267265b51d2f7d65d6e69c5
GConf2-devel-2.8.1-2.el4.i386.rpm SHA-256: cb7a528adc7f29a428495f960b8c60d9e087161e3db8757651cade7d262cebb3

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
GConf2-2.8.1-2.el4.src.rpm SHA-256: 060bec7936f70e630b54a8e99c3276d2d89fb209326ba3a6ce898ffa6110c4c4
s390x
GConf2-2.8.1-2.el4.s390.rpm SHA-256: 607f819818e968d230072752d4a2dffab382aac12f65e282f87d3bc2e18a172b
GConf2-2.8.1-2.el4.s390x.rpm SHA-256: 886b518f8e3bd6d29fd5308ecd9430f9f8f7d2ddbe9cf46d3f635b4388bfeeea
GConf2-devel-2.8.1-2.el4.s390x.rpm SHA-256: a291e3eb0a8fd64b5f98f96fe9f53bb13dac342a3a1113a424f8b1ed3c39eb46
s390
GConf2-2.8.1-2.el4.s390.rpm SHA-256: 607f819818e968d230072752d4a2dffab382aac12f65e282f87d3bc2e18a172b
GConf2-devel-2.8.1-2.el4.s390.rpm SHA-256: e4ef9806966fcf930c06f9068408017555b6937c5ddcc4e36a9f6204439059c6

Red Hat Enterprise Linux for Power, big endian 4

SRPM
GConf2-2.8.1-2.el4.src.rpm SHA-256: 060bec7936f70e630b54a8e99c3276d2d89fb209326ba3a6ce898ffa6110c4c4
ppc
GConf2-2.8.1-2.el4.ppc.rpm SHA-256: 57f6eb5810c326e27ec4c380830b65f419ace8b1a034ccb75467461a258c7a35
GConf2-2.8.1-2.el4.ppc64.rpm SHA-256: c4121424fb0ea7aa636fc1cc1c669c393b8303c482fb8e968f37e1f75adfd065
GConf2-devel-2.8.1-2.el4.ppc.rpm SHA-256: 4dfac1d28d66f55dcb8f5c0b1fd4522cdb64e234ab749fb6a31b55f4d0c5d18e

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility