Skip to navigation

Bug Fix Advisory e4fsprogs bug fix and enhancement update

Advisory: RHBA-2011:0076-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-01-13
Last updated on: 2011-01-13
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated e4fsprogs packages that fix a bug and add an enhancement are now
available for Red Hat Enterprise Linux 5.

The e4fsprogs packages contain a number of utilities for creating, checking,
modifying, and correcting inconsistencies in fourth extended (ext4 and ext4dev)
file systems. e4fsprogs contains e4fsck (used to repair file system
inconsistencies after an unclean shutdown), mke4fs (used to initialize a
partition to contain an empty ext4 file system), tune4fs (used to modify file
system parameters), and most other core ext4fs file system utilities.

This update fixes the following bug:

* To ensure the file system was recently checked, users were required to use the
fsck utility before running the "resize4fs -P" (minimum size query) command,
even though this is not actually necessary. With this update, the underlying
source code has been modified to target this issue, and running fsck before
querying the minimum size of the file system is no longer required. (BZ#643945)

As well, this update adds the following enhancement:

* The e4fsprogs package has been updated to the upstream version 1.41.12.
(BZ#604809)

All e4fsprogs users are advised to upgrade to these updated packages, which
resolve this issue, and add this enhancement.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
e4fsprogs-1.41.12-2.el5.src.rpm
File outdated by:  RHBA-2013:1789
    MD5: 9fb4ac7d37684254dbc4e3692f95c415
SHA-256: 5a2aaa0cfd511794c0631471604bf024589b63d540068035332efc249dab570d
 
IA-32:
e4fsprogs-devel-1.41.12-2.el5.i386.rpm
File outdated by:  RHBA-2013:1789
    MD5: 7cd95cc56a1875eacefb31d9903fdfc0
SHA-256: 6a4f6eff81610145df25a0a7207937571dd56f0cc5a5ca61c4656ae31caf7b97
 
x86_64:
e4fsprogs-devel-1.41.12-2.el5.i386.rpm
File outdated by:  RHBA-2013:1789
    MD5: 7cd95cc56a1875eacefb31d9903fdfc0
SHA-256: 6a4f6eff81610145df25a0a7207937571dd56f0cc5a5ca61c4656ae31caf7b97
e4fsprogs-devel-1.41.12-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:1789
    MD5: 0812d8d8f834ff716176fb366828cf1b
SHA-256: 6cb9a26ca5234241c3b1587a81ab23d6c0ca64289da256e166a312c88c8d7f51
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
e4fsprogs-1.41.12-2.el5.src.rpm
File outdated by:  RHBA-2013:1789
    MD5: 9fb4ac7d37684254dbc4e3692f95c415
SHA-256: 5a2aaa0cfd511794c0631471604bf024589b63d540068035332efc249dab570d
 
IA-32:
e4fsprogs-1.41.12-2.el5.i386.rpm
File outdated by:  RHBA-2013:1789
    MD5: 437e60fcf4e0dd7b88f6990e854a1489
SHA-256: 94543257b3f276908920c348b0aec913b96d40da3073ab5f8043bd89c0cfee52
e4fsprogs-devel-1.41.12-2.el5.i386.rpm
File outdated by:  RHBA-2013:1789
    MD5: 7cd95cc56a1875eacefb31d9903fdfc0
SHA-256: 6a4f6eff81610145df25a0a7207937571dd56f0cc5a5ca61c4656ae31caf7b97
e4fsprogs-libs-1.41.12-2.el5.i386.rpm
File outdated by:  RHBA-2013:1789
    MD5: 8e8d25e93e598adfb43ce6f3be619a2a
SHA-256: f31dcaf9045042bbc0b86c85d37c7cb0e3cbfcb3bb3a9e112ae1ca3061006009
 
IA-64:
e4fsprogs-1.41.12-2.el5.ia64.rpm
File outdated by:  RHBA-2013:1789
    MD5: 363cd162e8144e65f6a611e38d20e1f0
SHA-256: 755397137593dbd35f8f2e3041c1105bdce35a1445105791687310dae56a68be
e4fsprogs-devel-1.41.12-2.el5.ia64.rpm
File outdated by:  RHBA-2013:1789
    MD5: 03bbd38f4e8980180eeac8e75650299b
SHA-256: 1e53666e1851c7691211b9a4285d330930f9adfbb1cb0c704ab60cfdfa7cba45
e4fsprogs-libs-1.41.12-2.el5.ia64.rpm
File outdated by:  RHBA-2013:1789
    MD5: a9ca0a4c2810868d513fc78e430d43e1
SHA-256: 428c854799fde66010024159e523e9533e64d78f81bbe7fe4b97b82482662361
 
PPC:
e4fsprogs-1.41.12-2.el5.ppc.rpm
File outdated by:  RHBA-2013:1789
    MD5: bba52967b7b22b6ec44bafd328fc929c
SHA-256: 4920f8f730dbdeec2ab82d6d5031979a612beb81e901ea39d1b3ac97ceb463c6
e4fsprogs-devel-1.41.12-2.el5.ppc.rpm
File outdated by:  RHBA-2013:1789
    MD5: 7156ade77dc055a15cb32f7490c01c0a
SHA-256: 6082702514df4bdf1a07d1d24f59168d7f65ae34bb4b66226d1112f4f841b945
e4fsprogs-devel-1.41.12-2.el5.ppc64.rpm
File outdated by:  RHBA-2013:1789
    MD5: 1d3586a951f26090e2f2736cf31d8022
SHA-256: 336c47a32d9bbeafb9e71377cdf0b114a260546900be121d7936a23f7f7c8329
e4fsprogs-libs-1.41.12-2.el5.ppc.rpm
File outdated by:  RHBA-2013:1789
    MD5: e761e31ac41694529099ea0d4b16bab1
SHA-256: 8ec61d91de23f06632b359f8562a1a92a0ff4596f1818dfef226f2cbe9ada2d1
 
s390x:
e4fsprogs-1.41.12-2.el5.s390x.rpm
File outdated by:  RHBA-2013:1789
    MD5: 1408d8b7bcbbd5ef86b5c747c19bff26
SHA-256: 09245a4f3c8031af03f794be43072aafc078edafa32e1aa1eb56b2f417c451a6
e4fsprogs-devel-1.41.12-2.el5.s390.rpm
File outdated by:  RHBA-2013:1789
    MD5: b2182f8160042c077acb704105b4057c
SHA-256: 48307a056589f3a8aac6b8cbf4e1d7c5737716c7196dbbd7b0ea15f39c418c2e
e4fsprogs-devel-1.41.12-2.el5.s390x.rpm
File outdated by:  RHBA-2013:1789
    MD5: ec5e34127fbfbbb15ed5bf42482daeac
SHA-256: c75156f2359000bc2c23d5681369185a1d1bc94ef5713632855993b53c0b0658
e4fsprogs-libs-1.41.12-2.el5.s390x.rpm
File outdated by:  RHBA-2013:1789
    MD5: be68973d9a9fd9f244eaa54775cd145e
SHA-256: 3d74c51be4934d40913c3f46096f4425c97a637733aa24a1ab64157910c7c260
 
x86_64:
e4fsprogs-1.41.12-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:1789
    MD5: ca79f3876ebdc416aea7e6f44d1fe92a
SHA-256: b2fa356dbdd33c444f1fba2a23caaa9525880d49a6805a65cecb66f746abbc7e
e4fsprogs-devel-1.41.12-2.el5.i386.rpm
File outdated by:  RHBA-2013:1789
    MD5: 7cd95cc56a1875eacefb31d9903fdfc0
SHA-256: 6a4f6eff81610145df25a0a7207937571dd56f0cc5a5ca61c4656ae31caf7b97
e4fsprogs-devel-1.41.12-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:1789
    MD5: 0812d8d8f834ff716176fb366828cf1b
SHA-256: 6cb9a26ca5234241c3b1587a81ab23d6c0ca64289da256e166a312c88c8d7f51
e4fsprogs-libs-1.41.12-2.el5.i386.rpm
File outdated by:  RHBA-2013:1789
    MD5: 8e8d25e93e598adfb43ce6f3be619a2a
SHA-256: f31dcaf9045042bbc0b86c85d37c7cb0e3cbfcb3bb3a9e112ae1ca3061006009
e4fsprogs-libs-1.41.12-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:1789
    MD5: 8c3163947bbf733b6a9d174666dd997f
SHA-256: 75d3facc30a1b7715cd0a81dd14280da84fa906772764032c83918ed17d780cd
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
e4fsprogs-1.41.12-2.el5.src.rpm
File outdated by:  RHBA-2013:1789
    MD5: 9fb4ac7d37684254dbc4e3692f95c415
SHA-256: 5a2aaa0cfd511794c0631471604bf024589b63d540068035332efc249dab570d
 
IA-32:
e4fsprogs-1.41.12-2.el5.i386.rpm
File outdated by:  RHBA-2013:1789
    MD5: 437e60fcf4e0dd7b88f6990e854a1489
SHA-256: 94543257b3f276908920c348b0aec913b96d40da3073ab5f8043bd89c0cfee52
e4fsprogs-libs-1.41.12-2.el5.i386.rpm
File outdated by:  RHBA-2013:1789
    MD5: 8e8d25e93e598adfb43ce6f3be619a2a
SHA-256: f31dcaf9045042bbc0b86c85d37c7cb0e3cbfcb3bb3a9e112ae1ca3061006009
 
x86_64:
e4fsprogs-1.41.12-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:1789
    MD5: ca79f3876ebdc416aea7e6f44d1fe92a
SHA-256: b2fa356dbdd33c444f1fba2a23caaa9525880d49a6805a65cecb66f746abbc7e
e4fsprogs-libs-1.41.12-2.el5.i386.rpm
File outdated by:  RHBA-2013:1789
    MD5: 8e8d25e93e598adfb43ce6f3be619a2a
SHA-256: f31dcaf9045042bbc0b86c85d37c7cb0e3cbfcb3bb3a9e112ae1ca3061006009
e4fsprogs-libs-1.41.12-2.el5.x86_64.rpm
File outdated by:  RHBA-2013:1789
    MD5: 8c3163947bbf733b6a9d174666dd997f
SHA-256: 75d3facc30a1b7715cd0a81dd14280da84fa906772764032c83918ed17d780cd
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

604809 - e4fsprogs: Update to 1.41.12
643945 - resize2fs: relax -P (query minimum size) requirements



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/