- Issued:
- 2011-01-13
- Updated:
- 2011-01-13
RHBA-2010:0684 - Bug Fix Advisory
Synopsis
dump bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated dump packages that fix various bugs are now available.
Description
The dump package contains both dump and restore commands. The dump command
examines files in a file system, determines which ones need to be backed up, and
copies those files to a specified disk, tape, or other storage medium. The
restore command performs the inverse function of dump; it can restore a full
backup of a file system. Subsequent incremental backups can then be layered on
top of the full backup. Single files and directory subtrees may also be restored
from full or partial backups.
These updated dump packages fix the following bugs:
- errors in calculating offsets from which to continue file restoration meant
that, if a file was split across multiple tapes during a backup, the split file
was corrupted and presented with a different md5sum hash to the original when
restoration was attempted. This update corrects the offset calculations and
allows restoration of split files as expected. (BZ#563532)
- previously, the restore command attempted to restore extended attributes of a
file after the immutable flag had been set. As a result, the attributes were not
fully restored, and a warning message was displayed on standard error (STDERR).
With this update, these operations are now performed in the correct order, and
the restore command no longer fails to set the extended attributes. (BZ#494303)
All dump users should upgrade to these updated packages, which resolve these
issues.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 494303 - EA set security.selinux ... failed
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
dump-0.4b41-5.el5.src.rpm | SHA-256: a9291e86f9e86c846cdc50cb3810404424fcb7e839f2f8d51d9f83f7185cb53d |
x86_64 | |
dump-0.4b41-5.el5.x86_64.rpm | SHA-256: 8ea5511a11619249696a08721d5decfc8159f2aac22276cb7eddbe5c39a99169 |
rmt-0.4b41-5.el5.x86_64.rpm | SHA-256: aea417b6f416af2fd47d32afbf3cf6c9cd48927658f85d8a4027aa5bb79910e3 |
ia64 | |
dump-0.4b41-5.el5.ia64.rpm | SHA-256: 2de09ec9db1715ab56f6fcdefa0e3294ef6f3be3aba186584c7f15052acee1a6 |
rmt-0.4b41-5.el5.ia64.rpm | SHA-256: 662134242076f954302e4c0e49246d253f3cf621744e1a86671902dc7712b3f3 |
i386 | |
dump-0.4b41-5.el5.i386.rpm | SHA-256: d001870dbef80628ba84d8c8394d3ca45772ba670bee0160fc2bf537c556e179 |
rmt-0.4b41-5.el5.i386.rpm | SHA-256: 266d9faa6286c5e54aff53bb36518688d7dc64d72eb63d3ee3c7dfac48672eb7 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
dump-0.4b41-5.el5.src.rpm | SHA-256: a9291e86f9e86c846cdc50cb3810404424fcb7e839f2f8d51d9f83f7185cb53d |
x86_64 | |
dump-0.4b41-5.el5.x86_64.rpm | SHA-256: 8ea5511a11619249696a08721d5decfc8159f2aac22276cb7eddbe5c39a99169 |
rmt-0.4b41-5.el5.x86_64.rpm | SHA-256: aea417b6f416af2fd47d32afbf3cf6c9cd48927658f85d8a4027aa5bb79910e3 |
i386 | |
dump-0.4b41-5.el5.i386.rpm | SHA-256: d001870dbef80628ba84d8c8394d3ca45772ba670bee0160fc2bf537c556e179 |
rmt-0.4b41-5.el5.i386.rpm | SHA-256: 266d9faa6286c5e54aff53bb36518688d7dc64d72eb63d3ee3c7dfac48672eb7 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
dump-0.4b41-5.el5.src.rpm | SHA-256: a9291e86f9e86c846cdc50cb3810404424fcb7e839f2f8d51d9f83f7185cb53d |
x86_64 | |
dump-0.4b41-5.el5.x86_64.rpm | SHA-256: 8ea5511a11619249696a08721d5decfc8159f2aac22276cb7eddbe5c39a99169 |
rmt-0.4b41-5.el5.x86_64.rpm | SHA-256: aea417b6f416af2fd47d32afbf3cf6c9cd48927658f85d8a4027aa5bb79910e3 |
i386 | |
dump-0.4b41-5.el5.i386.rpm | SHA-256: d001870dbef80628ba84d8c8394d3ca45772ba670bee0160fc2bf537c556e179 |
rmt-0.4b41-5.el5.i386.rpm | SHA-256: 266d9faa6286c5e54aff53bb36518688d7dc64d72eb63d3ee3c7dfac48672eb7 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
dump-0.4b41-5.el5.src.rpm | SHA-256: a9291e86f9e86c846cdc50cb3810404424fcb7e839f2f8d51d9f83f7185cb53d |
s390x | |
dump-0.4b41-5.el5.s390x.rpm | SHA-256: 1d795dc577863ddf4a0a96983abbb455f4eed12418422e00ba676d1b32473cfb |
rmt-0.4b41-5.el5.s390x.rpm | SHA-256: 581b4323b1d001303fd12677c98f226bbcfce4273f96aac9cfc2537b58ee3b2e |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
dump-0.4b41-5.el5.src.rpm | SHA-256: a9291e86f9e86c846cdc50cb3810404424fcb7e839f2f8d51d9f83f7185cb53d |
ppc | |
dump-0.4b41-5.el5.ppc.rpm | SHA-256: f1d4d351ad6379fb046507d82fee7824b4fe73264838fef4ebe843fe86a6f84c |
rmt-0.4b41-5.el5.ppc.rpm | SHA-256: 2e8ae97feaa1031d9e985ba2dbfd33ec3a3e1642aab6a794f07357e3f5275538 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
dump-0.4b41-5.el5.src.rpm | SHA-256: a9291e86f9e86c846cdc50cb3810404424fcb7e839f2f8d51d9f83f7185cb53d |
x86_64 | |
dump-0.4b41-5.el5.x86_64.rpm | SHA-256: 8ea5511a11619249696a08721d5decfc8159f2aac22276cb7eddbe5c39a99169 |
rmt-0.4b41-5.el5.x86_64.rpm | SHA-256: aea417b6f416af2fd47d32afbf3cf6c9cd48927658f85d8a4027aa5bb79910e3 |
i386 | |
dump-0.4b41-5.el5.i386.rpm | SHA-256: d001870dbef80628ba84d8c8394d3ca45772ba670bee0160fc2bf537c556e179 |
rmt-0.4b41-5.el5.i386.rpm | SHA-256: 266d9faa6286c5e54aff53bb36518688d7dc64d72eb63d3ee3c7dfac48672eb7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.