Skip to navigation Skip to main content

Utilities

  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
Red Hat Customer Portal
  • Subscriptions
  • Downloads
  • Red Hat Console
  • Get Support
  • Products

    Top Products

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Products

    Downloads and Containers

    • Downloads
    • Packages
    • Containers

    Top Resources

    • Documentation
    • Product Life Cycles
    • Product Compliance
    • Errata
  • Knowledge

    Red Hat Knowledge Center

    • Knowledgebase Solutions
    • Knowledgebase Articles
    • Customer Portal Labs
    • Errata

    Top Product Docs

    • Red Hat Enterprise Linux
    • Red Hat OpenShift
    • Red Hat Ansible Automation Platform
    All Product Docs

    Training and Certification

    • About
    • Course Index
    • Certification Index
    • Skill Assessment
  • Security

    Red Hat Product Security Center

    • Security Updates
    • Security Advisories
    • Red Hat CVE Database
    • Errata

    References

    • Security Bulletins
    • Severity Ratings
    • Security Data

    Top Resources

    • Security Labs
    • Backporting Policies
    • Security Blog
  • Support

    Red Hat Support

    • Support Cases
    • Troubleshoot
    • Get Support
    • Contact Red Hat Support

    Red Hat Community Support

    • Customer Portal Community
    • Community Discussions
    • Red Hat Accelerator Program

    Top Resources

    • Product Life Cycles
    • Customer Portal Labs
    • Red Hat JBoss Supported Configurations
    • Red Hat Lightspeed
Or troubleshoot an issue.

Select Your Language

  • English
  • Français
  • 한국어
  • 日本語
  • 中文 (中国)

Infrastructure and Management

  • Red Hat Enterprise Linux
  • Red Hat Satellite
  • Red Hat Subscription Management
  • Red Hat Lightspeed
  • Red Hat Ansible Automation Platform

Cloud Computing

  • Red Hat OpenShift
  • Red Hat OpenStack Platform
  • Red Hat OpenShift
  • Red Hat OpenShift AI
  • Red Hat OpenShift Dedicated
  • Red Hat Advanced Cluster Security for Kubernetes
  • Red Hat Advanced Cluster Management for Kubernetes
  • Red Hat Quay
  • Red Hat OpenShift Dev Spaces
  • Red Hat OpenShift Service on AWS

Storage

  • Red Hat Gluster Storage
  • Red Hat Hyperconverged Infrastructure
  • Red Hat Ceph Storage
  • Red Hat OpenShift Data Foundation

Runtimes

  • Red Hat Runtimes
  • Red Hat JBoss Enterprise Application Platform
  • Red Hat Data Grid
  • Red Hat JBoss Web Server
  • Red Hat build of Keycloak
  • Red Hat support for Spring Boot
  • Red Hat build of Node.js
  • Red Hat build of Quarkus

Integration and Automation

  • Red Hat Application Foundations
  • Red Hat Fuse
  • Red Hat AMQ
  • Red Hat 3scale API Management
All Products
Red Hat Product Errata RHBA-2009:0996 - Bug Fix Advisory
Issued:
2009-05-18
Updated:
2009-05-18

RHBA-2009:0996 - Bug Fix Advisory

  • Overview
  • Updated Packages

Synopsis

e2fsprogs bug fix update

Type/Severity

Bug Fix Advisory

Red Hat Lightspeed patch analysis

Identify and remediate systems affected by this advisory.

View affected systems

Topic

Updated e2fsprogs packages that fix several bugs are now available.

Description

The e2fsprogs packages contain a number of utilities for creating,
checking, modifying, and correcting any inconsistencies in second and third
extended (ext2/ext3) file systems. These utilities include e2fsck, mke2fs,
debugfs, and tune2fs.

These updated packages fix the following bugs:

  • if a block's first four bytes consisted of the JFS_MAGIC_NUMBER

(0xc03b3998), these bytes were replaced with zeros when the block was
written into the file system's journal. If the file system was subsequently
recovered, a typo, associated with the Linux Journaling Block Device (JBD),
could result in data corruption on recovery. The Linux kernel typo has been
corrected but the fix was not carried over to e2fsprogs, where the
equivalent problem could present during an e2fsck log replay. It has now
been carried over and data corruption will not occur in the circumstances
described above.

Note: the data corruption potential was always low. It is unlikely ext3
metadata blocks will ever contain the JFS_MAGIC_NUMBER in their first four
bytes and the "data=journaled" mode is rarely used.

  • time-based 128-bit UUIDs contain the system time at microsecond

resolution and a clock sequence to ensure uniqueness between values
generated in the same calendric microsecond. If such UUIDs are generated at
a sufficiently high rate on an SMP machine, there will not be enough time
for the implementation of libuuid to generate clock sequence values quickly
enough to ensure that each UUID is unique. E2fsprogs now contains a new
subpackage, "uuidd", which provides a daemon that facilitates unique UUID
creation at high rates be enforcing an increment in clock sequence values
between the generation of new UUIDs. If the daemon is not available,
libuuid falls back to generating UUIDs without it, as it did before.

  • The blkid command did not report the labels of swap partitions. Some

end-users may have found this result surprising and been misled into
thinking that there was a problem with the partitioning of the device.
Blkid now reports labels of swap partitions, just as it reports the labels
of other partitions.

  • a flaw in the code caused e2fsck to fail for directories larger than 32

MB and output warning messages that "Inode XXXXX is too big" and "Block
#XXXX (XXXXX) causes directory to be too big." If fsck was run manually
with the "-y" option, it would remove the data that was incorrectly
identified as broken. The flaw in the code has been corrected, and e2fsck
now supports directory sizes of up to 2 GB, as originally intended.

  • ext2online canonicalized path names passed in from the command line

before searching for devices in /etc/mtab. In the case of multipath
devices, this would fail because the canonical path is not referenced in
/etc/mtab, and attempts to pass in the canonical path from the command line
would fail for the same reason. Ext2online could not therefore resize
multipath devices. Ext2online now searches /etc/mtab for the path name
passed in from the command line and will only search for the canonical name
if the first search fails. Since ext2online can now find multipath devices,
it can therefore resize them.

Users of e2fsprogs are advised to upgrade to these updated packages, which
resolve these issues.

Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Affected Products

  • Red Hat Enterprise Linux Server 4 x86_64
  • Red Hat Enterprise Linux Server 4 ia64
  • Red Hat Enterprise Linux Server 4 i386
  • Red Hat Enterprise Linux Workstation 4 x86_64
  • Red Hat Enterprise Linux Workstation 4 ia64
  • Red Hat Enterprise Linux Workstation 4 i386
  • Red Hat Enterprise Linux Desktop 4 x86_64
  • Red Hat Enterprise Linux Desktop 4 i386
  • Red Hat Enterprise Linux for IBM z Systems 4 s390x
  • Red Hat Enterprise Linux for IBM z Systems 4 s390
  • Red Hat Enterprise Linux for Power, big endian 4 ppc

Fixes

  • BZ - 450767 - e2fsck: potential data corruption on log replay
  • BZ - 467679 - blkid command does not report swap partition's label in rhel4.7-as-i386
  • BZ - 480338 - ext2online does not resize multipath devices because it looks for the wrong device name in /etc/mtab
  • BZ - 481466 - [RHEL4.8]: latest e2fsprogs causes install failure

CVEs

(none)

References

(none)

Note: More recent versions of these packages may be available. Click a package name for more details.

Red Hat Enterprise Linux Server 4

SRPM
e2fsprogs-1.35-12.24.el4.src.rpm SHA-256: a1aac15cd2be550229a06eeb43165160fdc84d7e3528977bc888b63df14ccce2
x86_64
e2fsprogs-1.35-12.24.el4.i386.rpm SHA-256: 6997fd2401c21ac1ef676eb86445cc74bf4cbd02d5c7b5104fa7c6f28e5b3557
e2fsprogs-1.35-12.24.el4.i386.rpm SHA-256: 6997fd2401c21ac1ef676eb86445cc74bf4cbd02d5c7b5104fa7c6f28e5b3557
e2fsprogs-1.35-12.24.el4.x86_64.rpm SHA-256: 8e7afa0e61de7dea74e0051ff6173033a48f9b6135df2db2bdd285f8ff8f1af6
e2fsprogs-1.35-12.24.el4.x86_64.rpm SHA-256: 8e7afa0e61de7dea74e0051ff6173033a48f9b6135df2db2bdd285f8ff8f1af6
e2fsprogs-devel-1.35-12.24.el4.x86_64.rpm SHA-256: f1f0089a0307c8b099781adf3ae1c692c94d7e0cc2f66f5d2257f3617d63669a
e2fsprogs-devel-1.35-12.24.el4.x86_64.rpm SHA-256: f1f0089a0307c8b099781adf3ae1c692c94d7e0cc2f66f5d2257f3617d63669a
uuidd-1.35-12.24.el4.x86_64.rpm SHA-256: eb6f686aae0a430f3a6b26a4f44f56c747c86a6f3c266c80614f87e3e3be307f
uuidd-1.35-12.24.el4.x86_64.rpm SHA-256: eb6f686aae0a430f3a6b26a4f44f56c747c86a6f3c266c80614f87e3e3be307f
ia64
e2fsprogs-1.35-12.24.el4.i386.rpm SHA-256: 6997fd2401c21ac1ef676eb86445cc74bf4cbd02d5c7b5104fa7c6f28e5b3557
e2fsprogs-1.35-12.24.el4.i386.rpm SHA-256: 6997fd2401c21ac1ef676eb86445cc74bf4cbd02d5c7b5104fa7c6f28e5b3557
e2fsprogs-1.35-12.24.el4.ia64.rpm SHA-256: e8c6bc7d2e80434ff19487eb92539af030f0a0f79bf59b028712559317ee2079
e2fsprogs-1.35-12.24.el4.ia64.rpm SHA-256: e8c6bc7d2e80434ff19487eb92539af030f0a0f79bf59b028712559317ee2079
e2fsprogs-devel-1.35-12.24.el4.ia64.rpm SHA-256: 7d03c9351495a49f17f7e6ef8eaac8271a5924e811989907f00a7e05800b0861
e2fsprogs-devel-1.35-12.24.el4.ia64.rpm SHA-256: 7d03c9351495a49f17f7e6ef8eaac8271a5924e811989907f00a7e05800b0861
uuidd-1.35-12.24.el4.ia64.rpm SHA-256: 2e926a95038e36335c76c5404b9ffce80914ae65102857967d2f0000a639c967
uuidd-1.35-12.24.el4.ia64.rpm SHA-256: 2e926a95038e36335c76c5404b9ffce80914ae65102857967d2f0000a639c967
i386
e2fsprogs-1.35-12.24.el4.i386.rpm SHA-256: 6997fd2401c21ac1ef676eb86445cc74bf4cbd02d5c7b5104fa7c6f28e5b3557
e2fsprogs-1.35-12.24.el4.i386.rpm SHA-256: 6997fd2401c21ac1ef676eb86445cc74bf4cbd02d5c7b5104fa7c6f28e5b3557
e2fsprogs-devel-1.35-12.24.el4.i386.rpm SHA-256: c8e99b61ea64ce70b81d500e19d083690fa9f170ecd77c70a5eb8bf45773782a
e2fsprogs-devel-1.35-12.24.el4.i386.rpm SHA-256: c8e99b61ea64ce70b81d500e19d083690fa9f170ecd77c70a5eb8bf45773782a
uuidd-1.35-12.24.el4.i386.rpm SHA-256: eba3b25ec396866914b2769fc6309b431eab9369788eecf54663ea835c0d0422
uuidd-1.35-12.24.el4.i386.rpm SHA-256: eba3b25ec396866914b2769fc6309b431eab9369788eecf54663ea835c0d0422

Red Hat Enterprise Linux Workstation 4

SRPM
e2fsprogs-1.35-12.24.el4.src.rpm SHA-256: a1aac15cd2be550229a06eeb43165160fdc84d7e3528977bc888b63df14ccce2
x86_64
e2fsprogs-1.35-12.24.el4.i386.rpm SHA-256: 6997fd2401c21ac1ef676eb86445cc74bf4cbd02d5c7b5104fa7c6f28e5b3557
e2fsprogs-1.35-12.24.el4.x86_64.rpm SHA-256: 8e7afa0e61de7dea74e0051ff6173033a48f9b6135df2db2bdd285f8ff8f1af6
e2fsprogs-devel-1.35-12.24.el4.x86_64.rpm SHA-256: f1f0089a0307c8b099781adf3ae1c692c94d7e0cc2f66f5d2257f3617d63669a
uuidd-1.35-12.24.el4.x86_64.rpm SHA-256: eb6f686aae0a430f3a6b26a4f44f56c747c86a6f3c266c80614f87e3e3be307f
ia64
e2fsprogs-1.35-12.24.el4.i386.rpm SHA-256: 6997fd2401c21ac1ef676eb86445cc74bf4cbd02d5c7b5104fa7c6f28e5b3557
e2fsprogs-1.35-12.24.el4.ia64.rpm SHA-256: e8c6bc7d2e80434ff19487eb92539af030f0a0f79bf59b028712559317ee2079
e2fsprogs-devel-1.35-12.24.el4.ia64.rpm SHA-256: 7d03c9351495a49f17f7e6ef8eaac8271a5924e811989907f00a7e05800b0861
uuidd-1.35-12.24.el4.ia64.rpm SHA-256: 2e926a95038e36335c76c5404b9ffce80914ae65102857967d2f0000a639c967
i386
e2fsprogs-1.35-12.24.el4.i386.rpm SHA-256: 6997fd2401c21ac1ef676eb86445cc74bf4cbd02d5c7b5104fa7c6f28e5b3557
e2fsprogs-devel-1.35-12.24.el4.i386.rpm SHA-256: c8e99b61ea64ce70b81d500e19d083690fa9f170ecd77c70a5eb8bf45773782a
uuidd-1.35-12.24.el4.i386.rpm SHA-256: eba3b25ec396866914b2769fc6309b431eab9369788eecf54663ea835c0d0422

Red Hat Enterprise Linux Desktop 4

SRPM
e2fsprogs-1.35-12.24.el4.src.rpm SHA-256: a1aac15cd2be550229a06eeb43165160fdc84d7e3528977bc888b63df14ccce2
x86_64
e2fsprogs-1.35-12.24.el4.i386.rpm SHA-256: 6997fd2401c21ac1ef676eb86445cc74bf4cbd02d5c7b5104fa7c6f28e5b3557
e2fsprogs-1.35-12.24.el4.x86_64.rpm SHA-256: 8e7afa0e61de7dea74e0051ff6173033a48f9b6135df2db2bdd285f8ff8f1af6
e2fsprogs-devel-1.35-12.24.el4.x86_64.rpm SHA-256: f1f0089a0307c8b099781adf3ae1c692c94d7e0cc2f66f5d2257f3617d63669a
uuidd-1.35-12.24.el4.x86_64.rpm SHA-256: eb6f686aae0a430f3a6b26a4f44f56c747c86a6f3c266c80614f87e3e3be307f
i386
e2fsprogs-1.35-12.24.el4.i386.rpm SHA-256: 6997fd2401c21ac1ef676eb86445cc74bf4cbd02d5c7b5104fa7c6f28e5b3557
e2fsprogs-devel-1.35-12.24.el4.i386.rpm SHA-256: c8e99b61ea64ce70b81d500e19d083690fa9f170ecd77c70a5eb8bf45773782a
uuidd-1.35-12.24.el4.i386.rpm SHA-256: eba3b25ec396866914b2769fc6309b431eab9369788eecf54663ea835c0d0422

Red Hat Enterprise Linux for IBM z Systems 4

SRPM
e2fsprogs-1.35-12.24.el4.src.rpm SHA-256: a1aac15cd2be550229a06eeb43165160fdc84d7e3528977bc888b63df14ccce2
s390x
e2fsprogs-1.35-12.24.el4.s390.rpm SHA-256: 520768c43efb34d6a1d4ee55cc77651751ff1efe031ae31dece595defa4c5051
e2fsprogs-1.35-12.24.el4.s390x.rpm SHA-256: c42e92527ca5daa96e06bde3d9614d0f28e2758ee3e87975a8f960fc22f6307e
e2fsprogs-devel-1.35-12.24.el4.s390x.rpm SHA-256: f51183e84629baedbefc53f7af13ec8bf3af3ab81ab9cc503177a7763fa1a554
uuidd-1.35-12.24.el4.s390x.rpm SHA-256: f2fa6d1696baf1e7ed56ab6a658d578b7426e0c4fb1d7850cdbd85fde85a972d
s390
e2fsprogs-1.35-12.24.el4.s390.rpm SHA-256: 520768c43efb34d6a1d4ee55cc77651751ff1efe031ae31dece595defa4c5051
e2fsprogs-devel-1.35-12.24.el4.s390.rpm SHA-256: a4b9f5031894e0e0c46e159d0e5b9c89ff98790fce48efbfbceb7aeffb30a729
uuidd-1.35-12.24.el4.s390.rpm SHA-256: 1206d0348b122bd670aa11a708c271d1486682b4b699bc4a5bfa7902dfcc99c3

Red Hat Enterprise Linux for Power, big endian 4

SRPM
e2fsprogs-1.35-12.24.el4.src.rpm SHA-256: a1aac15cd2be550229a06eeb43165160fdc84d7e3528977bc888b63df14ccce2
ppc
e2fsprogs-1.35-12.24.el4.ppc.rpm SHA-256: fca844abe9afcb1c8cbaff7d8ea5f322113dd73c7d9eb09963a0264e7e44a783
e2fsprogs-1.35-12.24.el4.ppc64.rpm SHA-256: 81a475d34d5ed5044cb50ba3fa6c9ad7d99d542b05641403e10cdea812fb497a
e2fsprogs-devel-1.35-12.24.el4.ppc.rpm SHA-256: a787c48ea59b92275c19e8698a7c655ce99f63ffa61774ffafade88c2c293bbd
uuidd-1.35-12.24.el4.ppc.rpm SHA-256: 691c0b533cff881f326fe12b6399bff47bfb0c91051a46607516fb8396d80f83

The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.

Red Hat LinkedIn YouTube Facebook X, formerly Twitter

Quick Links

  • Downloads
  • Subscriptions
  • Support Cases
  • Customer Service
  • Product Documentation

Help

  • Contact Us
  • Customer Portal FAQ
  • Log-in Assistance

Site Info

  • Trust Red Hat
  • Browser Support Policy
  • Accessibility
  • Awards and Recognition
  • Colophon

Related Sites

  • redhat.com
  • developers.redhat.com
  • connect.redhat.com
  • cloud.redhat.com

Red Hat legal and privacy links

  • About Red Hat
  • Jobs
  • Events
  • Locations
  • Contact Red Hat
  • Red Hat Blog
  • Inclusion at Red Hat
  • Cool Stuff Store
  • Red Hat Summit
© 2025 Red Hat

Red Hat legal and privacy links

  • Privacy statement
  • Terms of use
  • All policies and guidelines
  • Digital accessibility