Bug Fix Advisory procps bug fix update

Advisory: RHBA-2011:0249-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-02-16
Last updated on: 2011-02-16
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)

Details

An updated procps package that fixes multiple bugs is now available for Red Hat
Enterprise Linux 4.

The procps package contains a set of system utilities that provide system
information. The procps package includes ps, free, pgrep, pkill, pmap, skill,
slabtop, snice, sysctl, tload, top, uptime, vmstat, w, and watch.

This update fixes the following bugs:

* Previously, no header was displayed when vmstat used the options -n and -m.
This update fixes the problem by adding a header, and the header is displayed
correctly. (BZ#492128)

* Previously, an incomplete condition in ps could cause it to access the wrong
memory. Due to this behavior, ps could fail and unexpectedly close. This update
adds a condition in the code, and ps no longer fails. (BZ#521200)

* Previously, the command vmstat did not correctly accept the -SM parameter that
specifies memory units. Due to this behavior, an error message about incorrect
parameters was printed. This update modifies the handling of the parameters.
Now, vmstat accepts this parameter, and no more error messages appear.
(BZ#587342)

* Previously, the sorting process with the ps command option pcpu did not work
correctly. This update modifies the sorting condition, and the sorting option
pcpu works as expected. (BZ#598568)

All users of procps are advised to upgrade to this updated package, which
resolves these issues.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
procps-3.2.3-8.21.src.rpm     MD5: 06575067f08bd01b78a2a0331c1ae1ad
SHA-256: 5cecc1ab3d94560ba5eabd8f76c9962831355a9520d57fb4c051d2e905dec37c
 
IA-32:
procps-3.2.3-8.21.i386.rpm     MD5: f68d4c79f7c77787fb25510599f2ab92
SHA-256: a74f84659a48b7dc777cf3677e953f7c4fa1bf6429237ce33d2d9594253bc33c
 
x86_64:
procps-3.2.3-8.21.x86_64.rpm     MD5: 97c2355d33ac8e9fd8031c1b63ff87e4
SHA-256: bcb04b96880818af5913d64b752e1c0dac181c4484802cea9cda9451375eacb1
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
procps-3.2.3-8.21.src.rpm     MD5: 06575067f08bd01b78a2a0331c1ae1ad
SHA-256: 5cecc1ab3d94560ba5eabd8f76c9962831355a9520d57fb4c051d2e905dec37c
 
IA-32:
procps-3.2.3-8.21.i386.rpm     MD5: f68d4c79f7c77787fb25510599f2ab92
SHA-256: a74f84659a48b7dc777cf3677e953f7c4fa1bf6429237ce33d2d9594253bc33c
 
IA-64:
procps-3.2.3-8.21.ia64.rpm     MD5: e22312bbf72fbf9a1ecce1a56de8161c
SHA-256: 43dea9b483892021d54193ca59681a2441ae7a18f5bf42a368cd8677302234ae
 
PPC:
procps-3.2.3-8.21.ppc.rpm     MD5: 1862501f3849b023643019b65216cd9e
SHA-256: 50680166dd6adec24905dcd8a883687ec31f10a5d418b3a86bb431bc050d834d
 
s390:
procps-3.2.3-8.21.s390.rpm     MD5: 42496df2faf5d719f786b04460e60d36
SHA-256: 29cc02d87064cd113e933257711478d3edc7dc915cd046edc4d261a214f0608c
 
s390x:
procps-3.2.3-8.21.s390x.rpm     MD5: 77f42f44ab3e7463a035ebb7d0d32354
SHA-256: 5c2c79e88e330e0a1aecc99cc1bab42f81d63f0381f9f53546ac74853b776f68
 
x86_64:
procps-3.2.3-8.21.x86_64.rpm     MD5: 97c2355d33ac8e9fd8031c1b63ff87e4
SHA-256: bcb04b96880818af5913d64b752e1c0dac181c4484802cea9cda9451375eacb1
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
procps-3.2.3-8.21.src.rpm     MD5: 06575067f08bd01b78a2a0331c1ae1ad
SHA-256: 5cecc1ab3d94560ba5eabd8f76c9962831355a9520d57fb4c051d2e905dec37c
 
IA-32:
procps-3.2.3-8.21.i386.rpm     MD5: f68d4c79f7c77787fb25510599f2ab92
SHA-256: a74f84659a48b7dc777cf3677e953f7c4fa1bf6429237ce33d2d9594253bc33c
 
IA-64:
procps-3.2.3-8.21.ia64.rpm     MD5: e22312bbf72fbf9a1ecce1a56de8161c
SHA-256: 43dea9b483892021d54193ca59681a2441ae7a18f5bf42a368cd8677302234ae
 
x86_64:
procps-3.2.3-8.21.x86_64.rpm     MD5: 97c2355d33ac8e9fd8031c1b63ff87e4
SHA-256: bcb04b96880818af5913d64b752e1c0dac181c4484802cea9cda9451375eacb1
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
procps-3.2.3-8.21.src.rpm     MD5: 06575067f08bd01b78a2a0331c1ae1ad
SHA-256: 5cecc1ab3d94560ba5eabd8f76c9962831355a9520d57fb4c051d2e905dec37c
 
IA-32:
procps-3.2.3-8.21.i386.rpm     MD5: f68d4c79f7c77787fb25510599f2ab92
SHA-256: a74f84659a48b7dc777cf3677e953f7c4fa1bf6429237ce33d2d9594253bc33c
 
IA-64:
procps-3.2.3-8.21.ia64.rpm     MD5: e22312bbf72fbf9a1ecce1a56de8161c
SHA-256: 43dea9b483892021d54193ca59681a2441ae7a18f5bf42a368cd8677302234ae
 
x86_64:
procps-3.2.3-8.21.x86_64.rpm     MD5: 97c2355d33ac8e9fd8031c1b63ff87e4
SHA-256: bcb04b96880818af5913d64b752e1c0dac181c4484802cea9cda9451375eacb1
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

492128 - vmstat -m -n does not display header even once
521200 - ps aborted with "double free or corruption"


Keywords

procps, ps, vmstat


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/