- Issued:
- 2007-11-15
- Updated:
- 2007-11-15
RHBA-2007:0786 - Bug Fix Advisory
Synopsis
coreutils bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated coreutils packages that fix several bugs are now available.
Description
The coreutils package contains core GNU utilities. It is the combination of
the old GNU fileutils, sh-utils, and textutils packages.
These updated packages fix the following bugs:
- running the chgrp command on a symbolic link caused the User ID (UID) of
the link to be copied to the target. If the target was owned by user and
group "a", and the link owned by user and group "b", running the "chgrp b"
command on the symbolic link would cause the target to be owned by user and
group "b", instead of user "a" and group "b".
- using the su command to switch to a user whose account had expired caused
a "Your account has expired; please contact your system administrator su:
incorrect password" error. The root user can now switch to expired user
accounts.
- the stat command returned a zero (success) exit code even when the target
file or directory did not exist.
- due to a buffer handling problem in the csplit command, piping sed output
to csplit may have caused corrupt output.
- running simultaneous "rm -rf" commands on the root of a deep directory
could cause one of the rm commands to segfault.
- in certain circumstances, the "du -sk" command caused a segmentation
fault when run in a Network File System (NFS) mounted directory, which
contained a large number of files or directories, or both. The following
error occurred in these circumstances:
du: fts_read failed: Stale NFS file handle
- ** glibc detected *** double free or corruption (top): [hexadecimal
address]
- **
Aborted
(The value of [hexadecimal address] would be different in each error).
The du command now handles these situations correctly.
- the du command did not count the size of unreadable sub-directories (ie
directories it did not have read and execute permissions to) into the
total. The total from the du command now includes the size of unreadable
sub-directories.
All coreutils users should upgrade to these updated packages, which resolve
these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 215373 - chgrp alters uid of a file when run on symlinks
- BZ - 231019 - stat returns incorrect exit status
- BZ - 238121 - rm can segfault when racing another rm to delete a directory
- BZ - 250077 - RHEL4 du doesn't report size of unreadable sub directories
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
coreutils-5.2.1-31.7.src.rpm | SHA-256: 0986b96efaa04990a2f0aee542c7547db48ca3bfd228e41400e1f73d75f54b06 |
x86_64 | |
coreutils-5.2.1-31.7.x86_64.rpm | SHA-256: 4826e50195ede25205b79cc948ee19fb463f56d8a461c0c74b6061dfb996af14 |
coreutils-5.2.1-31.7.x86_64.rpm | SHA-256: 4826e50195ede25205b79cc948ee19fb463f56d8a461c0c74b6061dfb996af14 |
ia64 | |
coreutils-5.2.1-31.7.ia64.rpm | SHA-256: e1082e27598d9bfef0a16627133b605e33a2b84fbce6e8840b46be36171ef68f |
coreutils-5.2.1-31.7.ia64.rpm | SHA-256: e1082e27598d9bfef0a16627133b605e33a2b84fbce6e8840b46be36171ef68f |
i386 | |
coreutils-5.2.1-31.7.i386.rpm | SHA-256: baca0947e6fe51045237b81637f9a4b5f73c907f0786278c74b5539b9d51544c |
coreutils-5.2.1-31.7.i386.rpm | SHA-256: baca0947e6fe51045237b81637f9a4b5f73c907f0786278c74b5539b9d51544c |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
coreutils-5.2.1-31.7.src.rpm | SHA-256: 0986b96efaa04990a2f0aee542c7547db48ca3bfd228e41400e1f73d75f54b06 |
x86_64 | |
coreutils-5.2.1-31.7.x86_64.rpm | SHA-256: 4826e50195ede25205b79cc948ee19fb463f56d8a461c0c74b6061dfb996af14 |
ia64 | |
coreutils-5.2.1-31.7.ia64.rpm | SHA-256: e1082e27598d9bfef0a16627133b605e33a2b84fbce6e8840b46be36171ef68f |
i386 | |
coreutils-5.2.1-31.7.i386.rpm | SHA-256: baca0947e6fe51045237b81637f9a4b5f73c907f0786278c74b5539b9d51544c |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
coreutils-5.2.1-31.7.src.rpm | SHA-256: 0986b96efaa04990a2f0aee542c7547db48ca3bfd228e41400e1f73d75f54b06 |
x86_64 | |
coreutils-5.2.1-31.7.x86_64.rpm | SHA-256: 4826e50195ede25205b79cc948ee19fb463f56d8a461c0c74b6061dfb996af14 |
i386 | |
coreutils-5.2.1-31.7.i386.rpm | SHA-256: baca0947e6fe51045237b81637f9a4b5f73c907f0786278c74b5539b9d51544c |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
coreutils-5.2.1-31.7.src.rpm | SHA-256: 0986b96efaa04990a2f0aee542c7547db48ca3bfd228e41400e1f73d75f54b06 |
s390x | |
coreutils-5.2.1-31.7.s390x.rpm | SHA-256: 308542f141294f6a37daabc72bdd5bdae4c098177b839dbbd75169362b699bff |
s390 | |
coreutils-5.2.1-31.7.s390.rpm | SHA-256: 1248e566af6c0b7e63f6867885f8ede3ced6f2e38007b0f6e8ec90b8fcef5c92 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
coreutils-5.2.1-31.7.src.rpm | SHA-256: 0986b96efaa04990a2f0aee542c7547db48ca3bfd228e41400e1f73d75f54b06 |
ppc | |
coreutils-5.2.1-31.7.ppc.rpm | SHA-256: 9667e4144bb3570b4b741ee37f4ecc798ac87c3dcfb513aa118e87857a210a25 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.