- Issued:
- 2008-07-24
- Updated:
- 2008-07-24
RHBA-2008:0732 - Bug Fix Advisory
Synopsis
e2fsprogs bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated e2fsprogs packages that fix several bugs are now available.
Description
The e2fsprogs packages contain a number of utilities for creating,
checking, modifying, and correcting any inconsistencies in second and third
extended (ext2/ext3) file systems. These utilities include e2fsck, mke2fs,
debugfs, and tune2fs.
These updated packages fix the following bugs:
- e2fsck was unable to repair file systems with certain journal
corruptions. If an inode for a journal had a link count of 0, the journal
could still pass the "e2fsck" check; however, the kernel was unable to
mount such a file system, failing with an error such as "mount: wrong fs
type, bad option, bad superblock on /dev/[device]". In these updated
packages, if a journal has no links, checking is forced, which resolves
this issue.
- several defects discovered by the Coverity source code checker, that
could result in memory leaks, segmentation faults, or memory corruption,
have been resolved.
- headers in the "e2fsprogs-devel" package were not multilib aware, causing
problems when both the 32-bit and 64-bit versions of the "e2fsprogs-devel"
package were installed on bi-arch platforms.
- an aliasing violation, which could result in "dumpe2fs" causing a
segmentation fault on Itanium(R) architectures, has been resolved.
- in the previous e2fsprogs packages, an attempt to free an uninitialized
variable in "e2fsck", could have caused "e2fsck" to terminate when clearing
an extended attribute block. A "*** glibc detected *** free(): invalid
pointer" error may have occurred.
Users of e2fsprogs are advised to upgrade to these updated packages, which
resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 433784 - aliasing violation causes dumpe2fs segfaults in ia64.
- BZ - 441606 - fsck.ext3 fails with * glibc detected * error
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
e2fsprogs-1.35-12.17.el4.src.rpm | SHA-256: 8d73db038fd904ae568e327367b558888bcb045468ca8039158a3e5b1e53ada0 |
x86_64 | |
e2fsprogs-1.35-12.17.el4.i386.rpm | SHA-256: 1943e8504a80d88251aa5ece2fabd97a775240b564f386a1fcc17be71ad5056b |
e2fsprogs-1.35-12.17.el4.i386.rpm | SHA-256: 1943e8504a80d88251aa5ece2fabd97a775240b564f386a1fcc17be71ad5056b |
e2fsprogs-1.35-12.17.el4.x86_64.rpm | SHA-256: 839b2dbffb87684119b95faf922814ee56cba06be4ff7d2e814ac59ebd609ea4 |
e2fsprogs-1.35-12.17.el4.x86_64.rpm | SHA-256: 839b2dbffb87684119b95faf922814ee56cba06be4ff7d2e814ac59ebd609ea4 |
e2fsprogs-devel-1.35-12.17.el4.x86_64.rpm | SHA-256: 5de286cd7d64fa6f8d4f7bd92c7fcd3289fd93d868c8b3b052ff7cd900fb5636 |
e2fsprogs-devel-1.35-12.17.el4.x86_64.rpm | SHA-256: 5de286cd7d64fa6f8d4f7bd92c7fcd3289fd93d868c8b3b052ff7cd900fb5636 |
ia64 | |
e2fsprogs-1.35-12.17.el4.i386.rpm | SHA-256: 1943e8504a80d88251aa5ece2fabd97a775240b564f386a1fcc17be71ad5056b |
e2fsprogs-1.35-12.17.el4.i386.rpm | SHA-256: 1943e8504a80d88251aa5ece2fabd97a775240b564f386a1fcc17be71ad5056b |
e2fsprogs-1.35-12.17.el4.ia64.rpm | SHA-256: 23d7a2a27ad176756df74514aa766ab5644ef73a8b47c621f0f9847eb2a59852 |
e2fsprogs-1.35-12.17.el4.ia64.rpm | SHA-256: 23d7a2a27ad176756df74514aa766ab5644ef73a8b47c621f0f9847eb2a59852 |
e2fsprogs-devel-1.35-12.17.el4.ia64.rpm | SHA-256: 2d6bc3fc81d5a392c72d57c23b990b7461c496f31d4d1ec6b279aeade5031552 |
e2fsprogs-devel-1.35-12.17.el4.ia64.rpm | SHA-256: 2d6bc3fc81d5a392c72d57c23b990b7461c496f31d4d1ec6b279aeade5031552 |
i386 | |
e2fsprogs-1.35-12.17.el4.i386.rpm | SHA-256: 1943e8504a80d88251aa5ece2fabd97a775240b564f386a1fcc17be71ad5056b |
e2fsprogs-1.35-12.17.el4.i386.rpm | SHA-256: 1943e8504a80d88251aa5ece2fabd97a775240b564f386a1fcc17be71ad5056b |
e2fsprogs-devel-1.35-12.17.el4.i386.rpm | SHA-256: 44a0aaadc37666f3a8859ba1b1ef00e5a26042c593d0f1515dbbf430aa47869a |
e2fsprogs-devel-1.35-12.17.el4.i386.rpm | SHA-256: 44a0aaadc37666f3a8859ba1b1ef00e5a26042c593d0f1515dbbf430aa47869a |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
e2fsprogs-1.35-12.17.el4.src.rpm | SHA-256: 8d73db038fd904ae568e327367b558888bcb045468ca8039158a3e5b1e53ada0 |
x86_64 | |
e2fsprogs-1.35-12.17.el4.i386.rpm | SHA-256: 1943e8504a80d88251aa5ece2fabd97a775240b564f386a1fcc17be71ad5056b |
e2fsprogs-1.35-12.17.el4.x86_64.rpm | SHA-256: 839b2dbffb87684119b95faf922814ee56cba06be4ff7d2e814ac59ebd609ea4 |
e2fsprogs-devel-1.35-12.17.el4.x86_64.rpm | SHA-256: 5de286cd7d64fa6f8d4f7bd92c7fcd3289fd93d868c8b3b052ff7cd900fb5636 |
ia64 | |
e2fsprogs-1.35-12.17.el4.i386.rpm | SHA-256: 1943e8504a80d88251aa5ece2fabd97a775240b564f386a1fcc17be71ad5056b |
e2fsprogs-1.35-12.17.el4.ia64.rpm | SHA-256: 23d7a2a27ad176756df74514aa766ab5644ef73a8b47c621f0f9847eb2a59852 |
e2fsprogs-devel-1.35-12.17.el4.ia64.rpm | SHA-256: 2d6bc3fc81d5a392c72d57c23b990b7461c496f31d4d1ec6b279aeade5031552 |
i386 | |
e2fsprogs-1.35-12.17.el4.i386.rpm | SHA-256: 1943e8504a80d88251aa5ece2fabd97a775240b564f386a1fcc17be71ad5056b |
e2fsprogs-devel-1.35-12.17.el4.i386.rpm | SHA-256: 44a0aaadc37666f3a8859ba1b1ef00e5a26042c593d0f1515dbbf430aa47869a |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
e2fsprogs-1.35-12.17.el4.src.rpm | SHA-256: 8d73db038fd904ae568e327367b558888bcb045468ca8039158a3e5b1e53ada0 |
x86_64 | |
e2fsprogs-1.35-12.17.el4.i386.rpm | SHA-256: 1943e8504a80d88251aa5ece2fabd97a775240b564f386a1fcc17be71ad5056b |
e2fsprogs-1.35-12.17.el4.x86_64.rpm | SHA-256: 839b2dbffb87684119b95faf922814ee56cba06be4ff7d2e814ac59ebd609ea4 |
e2fsprogs-devel-1.35-12.17.el4.x86_64.rpm | SHA-256: 5de286cd7d64fa6f8d4f7bd92c7fcd3289fd93d868c8b3b052ff7cd900fb5636 |
i386 | |
e2fsprogs-1.35-12.17.el4.i386.rpm | SHA-256: 1943e8504a80d88251aa5ece2fabd97a775240b564f386a1fcc17be71ad5056b |
e2fsprogs-devel-1.35-12.17.el4.i386.rpm | SHA-256: 44a0aaadc37666f3a8859ba1b1ef00e5a26042c593d0f1515dbbf430aa47869a |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
e2fsprogs-1.35-12.17.el4.src.rpm | SHA-256: 8d73db038fd904ae568e327367b558888bcb045468ca8039158a3e5b1e53ada0 |
s390x | |
e2fsprogs-1.35-12.17.el4.s390.rpm | SHA-256: 1bb4eb1f268cae384493c56985a70f43b3c216d60ae1c254fd4b87f0a92c7c07 |
e2fsprogs-1.35-12.17.el4.s390x.rpm | SHA-256: c5b352da4303edf0dae99fe645aa45e5b5922301abb972e64feedf00c02f4128 |
e2fsprogs-devel-1.35-12.17.el4.s390x.rpm | SHA-256: 7adf66deef42743d9d6b4144f1899d6a16e811724da03f7a142b76e6e12f43f2 |
s390 | |
e2fsprogs-1.35-12.17.el4.s390.rpm | SHA-256: 1bb4eb1f268cae384493c56985a70f43b3c216d60ae1c254fd4b87f0a92c7c07 |
e2fsprogs-devel-1.35-12.17.el4.s390.rpm | SHA-256: 69c5c0cd4dee9f1ea5ff066c14319405829cd46117058dd59a3ef8dfefc83390 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
e2fsprogs-1.35-12.17.el4.src.rpm | SHA-256: 8d73db038fd904ae568e327367b558888bcb045468ca8039158a3e5b1e53ada0 |
ppc | |
e2fsprogs-1.35-12.17.el4.ppc.rpm | SHA-256: 06e0da57efdd0a8732ba7d2b79ba84f3c396b9e19c9a678c52f1adf3314b8336 |
e2fsprogs-1.35-12.17.el4.ppc64.rpm | SHA-256: a5461c5c6d689038f3a906df3b7382aa8731c050133031ffc0b3f25e650dee5f |
e2fsprogs-devel-1.35-12.17.el4.ppc.rpm | SHA-256: a2e02d2b46ec46d7f2473df14a881324e68ee94f2b27e9e88319d93dc6f43eea |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.