- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHBA-2009:0071 - Bug Fix Advisory
Synopsis
procps bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated procps package that fixes various bugs and adds an enhancement
is now available.
Description
The procps package contains a set of system utilities that provide system
information. The procps package includes ps, free, skill, snice, sysctl,
tload, top, uptime, vmstat, w, and watch.
This updated procps package includes fixes for the following bugs:
- the "top" utility displayed results in the "%CPU" field as integer-only
significands. With this updated package, the field displays results as
fractional significands, presenting a decimal point and a value in the
10E-1 column. Note: this was a returned value error only. The computed
result was always a floating point number but top was presenting the result
as an integer.
- when the "ps" utility received a signal, the presented output included
text requesting "bug reports". This could be inferred to mean the received
signal was in error, or constituted an error. With this update that text no
longer displays.
- the "vmstat" utility did not display table headers under certain option
combinations: this has been fixed. Also, "vmstat" now displays a table
header when the "-d" and "-n" options are used together. As well, the
vmstat(8) manual page has been updated to reflect these changes.
- the sysctl(8) manual page contained misleading information about the '-a'
and '-A' options, which has been clarified.
- the "vmstat" utility failed to display detailed partition information
"vmstat -p " on Red Hat Enterprise Linux 5.3.
This updated package also adds the following enhancement:
- the sysctl(8) man page was updated. Documentation was added about values
in the "sysctl.conf" file that can be over-ridden when specific kernel
modules are loaded. The possibility of values in "sysctl.conf" not
persisting across reboots is also noted, as are as mechanisms for avoiding
this.
All procps users are advised to upgrade to this updated package, which
resolves these issues and includes this updated documentation.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 441656 - procps states a bug is hit when receiving a signal
- BZ - 450114 - %CPU value in top is reported as an integer
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
procps-3.2.7-11.1.el5.src.rpm | SHA-256: edbe6f4b6f1e1d6eb1a815190263d3c58fcfbf603626cd47d05e7cebdd3483ed |
x86_64 | |
procps-3.2.7-11.1.el5.x86_64.rpm | SHA-256: 4c41fab7cdfecd79535a8095b6a8c698284870aec26b507293f3e56b266c55aa |
ia64 | |
procps-3.2.7-11.1.el5.ia64.rpm | SHA-256: 6c2917153bf73cd12692ec5b14e1021e2810577520eb8e6591b65bd9022a25b7 |
i386 | |
procps-3.2.7-11.1.el5.i386.rpm | SHA-256: c2ddeade38dc76bd3e1c86b8ad0ae12fa684f0da31d5e0b09c45b3d4aac77785 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
procps-3.2.7-11.1.el5.src.rpm | SHA-256: edbe6f4b6f1e1d6eb1a815190263d3c58fcfbf603626cd47d05e7cebdd3483ed |
x86_64 | |
procps-3.2.7-11.1.el5.x86_64.rpm | SHA-256: 4c41fab7cdfecd79535a8095b6a8c698284870aec26b507293f3e56b266c55aa |
i386 | |
procps-3.2.7-11.1.el5.i386.rpm | SHA-256: c2ddeade38dc76bd3e1c86b8ad0ae12fa684f0da31d5e0b09c45b3d4aac77785 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
procps-3.2.7-11.1.el5.src.rpm | SHA-256: edbe6f4b6f1e1d6eb1a815190263d3c58fcfbf603626cd47d05e7cebdd3483ed |
x86_64 | |
procps-3.2.7-11.1.el5.x86_64.rpm | SHA-256: 4c41fab7cdfecd79535a8095b6a8c698284870aec26b507293f3e56b266c55aa |
i386 | |
procps-3.2.7-11.1.el5.i386.rpm | SHA-256: c2ddeade38dc76bd3e1c86b8ad0ae12fa684f0da31d5e0b09c45b3d4aac77785 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
procps-3.2.7-11.1.el5.src.rpm | SHA-256: edbe6f4b6f1e1d6eb1a815190263d3c58fcfbf603626cd47d05e7cebdd3483ed |
s390x | |
procps-3.2.7-11.1.el5.s390x.rpm | SHA-256: 318936f836fa09fff6f7de741d52a4f1397437f304d4d795c85171adae2c89f5 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
procps-3.2.7-11.1.el5.src.rpm | SHA-256: edbe6f4b6f1e1d6eb1a815190263d3c58fcfbf603626cd47d05e7cebdd3483ed |
ppc | |
procps-3.2.7-11.1.el5.ppc.rpm | SHA-256: 8436eafea2c2aa95bd062656c8711ed25ea324294e790f3d9484f038713856e4 |
procps-3.2.7-11.1.el5.ppc64.rpm | SHA-256: ca0235609c670ee81da689f863b7fbf1312ee27ea8d42c9acb7f74ec782acbaa |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
procps-3.2.7-11.1.el5.src.rpm | SHA-256: edbe6f4b6f1e1d6eb1a815190263d3c58fcfbf603626cd47d05e7cebdd3483ed |
x86_64 | |
procps-3.2.7-11.1.el5.x86_64.rpm | SHA-256: 4c41fab7cdfecd79535a8095b6a8c698284870aec26b507293f3e56b266c55aa |
i386 | |
procps-3.2.7-11.1.el5.i386.rpm | SHA-256: c2ddeade38dc76bd3e1c86b8ad0ae12fa684f0da31d5e0b09c45b3d4aac77785 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.