- Issued:
- 2013-01-07
- Updated:
- 2013-01-07
RHBA-2012:1055 - Bug Fix Advisory
Synopsis
cpio bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated cpio packages that fix one bug are now available for Red Hat Enterprise
Linux 5.
Description
The cpio packages provide the GNU cpio file archiver utility. GNU cpio can be
used to copy and extract files into or from cpio and Tar archives. This update
is related to the following bug:
- Prior to this update, the cpio man page did not document how to use tape
devices that do not use the default block size of 512 bytes for I/O operations.
As a result, the cpio utility could fail with the error message "cpio: read
error: Cannot allocate memory" if another block size was used. With this update,
the man page states that setting the block size with the "--block-size" long
option avoids this problem. (BZ#573943)
All users of cpio are advised to upgrade to these updated packages, which fix
this bug.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 573943 - Technical note: Better document cpio behavior when using tape mechanic (find proper block size)
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
cpio-2.6-25.el5.src.rpm | SHA-256: f1ba440c0529578af6ee4b6114cb653693fce256eb5520812fe4f50fff43ae92 |
x86_64 | |
cpio-2.6-25.el5.x86_64.rpm | SHA-256: 9e2911c24065135cd534a92546210f12db91202fcd4b02121099cfb8c00f5d37 |
cpio-debuginfo-2.6-25.el5.x86_64.rpm | SHA-256: a9e682ea3264b731d8fb1c65e73466170ba7fa2f7ee62ccefcaba974af792120 |
ia64 | |
cpio-2.6-25.el5.ia64.rpm | SHA-256: 7f08174666acc990d8201e03837e852cae693a43b4cba2f78061a00e07571413 |
cpio-debuginfo-2.6-25.el5.ia64.rpm | SHA-256: 5d8e802a95b8f591a82121b548a5faf9380176c6c2ee85d1526fa28af83b8b9e |
i386 | |
cpio-2.6-25.el5.i386.rpm | SHA-256: 2c6de1f5903a57489f788273ae1fadca83de1927d4ce3840c3dea6021f85e41b |
cpio-debuginfo-2.6-25.el5.i386.rpm | SHA-256: 137c0d937305bf8be15fb7d6e526a7d53414be72c60246de3ebb60d6ebd2c7f7 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
cpio-2.6-25.el5.src.rpm | SHA-256: f1ba440c0529578af6ee4b6114cb653693fce256eb5520812fe4f50fff43ae92 |
x86_64 | |
cpio-2.6-25.el5.x86_64.rpm | SHA-256: 9e2911c24065135cd534a92546210f12db91202fcd4b02121099cfb8c00f5d37 |
cpio-debuginfo-2.6-25.el5.x86_64.rpm | SHA-256: a9e682ea3264b731d8fb1c65e73466170ba7fa2f7ee62ccefcaba974af792120 |
i386 | |
cpio-2.6-25.el5.i386.rpm | SHA-256: 2c6de1f5903a57489f788273ae1fadca83de1927d4ce3840c3dea6021f85e41b |
cpio-debuginfo-2.6-25.el5.i386.rpm | SHA-256: 137c0d937305bf8be15fb7d6e526a7d53414be72c60246de3ebb60d6ebd2c7f7 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
cpio-2.6-25.el5.src.rpm | SHA-256: f1ba440c0529578af6ee4b6114cb653693fce256eb5520812fe4f50fff43ae92 |
x86_64 | |
cpio-2.6-25.el5.x86_64.rpm | SHA-256: 9e2911c24065135cd534a92546210f12db91202fcd4b02121099cfb8c00f5d37 |
cpio-debuginfo-2.6-25.el5.x86_64.rpm | SHA-256: a9e682ea3264b731d8fb1c65e73466170ba7fa2f7ee62ccefcaba974af792120 |
i386 | |
cpio-2.6-25.el5.i386.rpm | SHA-256: 2c6de1f5903a57489f788273ae1fadca83de1927d4ce3840c3dea6021f85e41b |
cpio-debuginfo-2.6-25.el5.i386.rpm | SHA-256: 137c0d937305bf8be15fb7d6e526a7d53414be72c60246de3ebb60d6ebd2c7f7 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
cpio-2.6-25.el5.src.rpm | SHA-256: f1ba440c0529578af6ee4b6114cb653693fce256eb5520812fe4f50fff43ae92 |
s390x | |
cpio-2.6-25.el5.s390x.rpm | SHA-256: 58115a771ed26aa7d7fb28b1e8ec230b5d91deddf038476b7d19dc2562239dc0 |
cpio-debuginfo-2.6-25.el5.s390x.rpm | SHA-256: f2aaa931ff0ec5fefecd9f93e26b38bf76534c46608e627bfeda2d4ff8f024cc |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
cpio-2.6-25.el5.src.rpm | SHA-256: f1ba440c0529578af6ee4b6114cb653693fce256eb5520812fe4f50fff43ae92 |
ppc | |
cpio-2.6-25.el5.ppc.rpm | SHA-256: 7fce1a0a709421666d741624acd212e8be0cd0f1a1ee9e5dcc1788e5f852e2f6 |
cpio-debuginfo-2.6-25.el5.ppc.rpm | SHA-256: e46447a280669931e98e50629515419fb0752ebfe7d31640c286e2239019d750 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
cpio-2.6-25.el5.src.rpm | SHA-256: f1ba440c0529578af6ee4b6114cb653693fce256eb5520812fe4f50fff43ae92 |
x86_64 | |
cpio-2.6-25.el5.x86_64.rpm | SHA-256: 9e2911c24065135cd534a92546210f12db91202fcd4b02121099cfb8c00f5d37 |
cpio-debuginfo-2.6-25.el5.x86_64.rpm | SHA-256: a9e682ea3264b731d8fb1c65e73466170ba7fa2f7ee62ccefcaba974af792120 |
i386 | |
cpio-2.6-25.el5.i386.rpm | SHA-256: 2c6de1f5903a57489f788273ae1fadca83de1927d4ce3840c3dea6021f85e41b |
cpio-debuginfo-2.6-25.el5.i386.rpm | SHA-256: 137c0d937305bf8be15fb7d6e526a7d53414be72c60246de3ebb60d6ebd2c7f7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.