Skip to navigation

Bug Fix Advisory dump bug fix update

Advisory: RHBA-2011:1502-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-20
Last updated on: 2012-02-20
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated dump packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

The dump packages contain the "dump" and "restore" commands. The "dump" command
examines files in a file system, determines which ones need to be backed up, and
copies those files to a specified disk, tape, or other storage medium. The
"restore" command performs the inverse function of "dump"; it can restore a full
backup of a file system. Subsequent incremental backups can then be layered on
top of the full backup.

This update fixes the following bug:

* Previously, dump was linked against the libblkid library, which processed many
device-mapper devices inefficiently. With this update, dump has been rebuilt
against an updated version of the libblkid library, and it is now able to
process many device-mapper devices efficiently. (BZ#734039)

All users of dump should upgrade to these updated packages, which fix this bug.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
dump-0.4b41-6.el5.src.rpm     MD5: ef6a42a8925311c70eb9a8a05ab17aba
SHA-256: 5d677d2333cbc4e5899f979dc4de2c2ac64474712934381dddedb98cc06ae01d
 
IA-32:
dump-0.4b41-6.el5.i386.rpm     MD5: 14e7eb3530a9dd715e888798c9461087
SHA-256: 17922242d55a517e63e09a1709ce614ecf0b18214b3c1610ba5b78826b767731
rmt-0.4b41-6.el5.i386.rpm     MD5: 66012cd6f103bc89f568cae5ff7485a5
SHA-256: 9c3af3888a1738dec01dcf5825671e2f73e42feec4347d5e882a2052f6332fe4
 
IA-64:
dump-0.4b41-6.el5.ia64.rpm     MD5: 2bb4a7763a7236b8b63a80b04376a061
SHA-256: 72d17cc6722e79d23bee32f05eafb60eb74f7f45b11e5f924939f8c90c2582f3
rmt-0.4b41-6.el5.ia64.rpm     MD5: b2029013e9e744d0191abc98c3407937
SHA-256: a72141476888d082eb71df862daeb367c44e5b59743d7a06bcddc9c78daf41a9
 
PPC:
dump-0.4b41-6.el5.ppc.rpm     MD5: 10b5ffb5e356a2e4420cc482583db817
SHA-256: ab5e8f13ab1305de0a75a417c032ccfcf7a20da021583aa333dc0112457c07b1
rmt-0.4b41-6.el5.ppc.rpm     MD5: f384454f47698c5d245a8187711c4313
SHA-256: e0d6c9e4b2d6d2543c2e4dcc52f247a43d235e6836cd843e8240a288fc4602ab
 
s390x:
dump-0.4b41-6.el5.s390x.rpm     MD5: 67558f5431322820a850b62c823d6d79
SHA-256: fbdb90a8c914122aad73537c7277e2c549c98aeb92b0ea109909ae3d9c2503e7
rmt-0.4b41-6.el5.s390x.rpm     MD5: a29d094cc83afe25fd5065946ee53c0e
SHA-256: 99f39429b8ead0e1ad3eb6bede70f34e16a4fc7f9d2b1e96ff22982474069286
 
x86_64:
dump-0.4b41-6.el5.x86_64.rpm     MD5: ce7d17b30dd6c2ce289873d4ae90a7cf
SHA-256: 1b66a074793698044170b8605592bbd967716db70b9692becd51ec87f4231a72
rmt-0.4b41-6.el5.x86_64.rpm     MD5: 22506747181a97d636af0ac2456734a4
SHA-256: 1830c2ccb07486686e904a87719a24e3784a9d4282a07ca70366ab8a44bd650d
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
dump-0.4b41-6.el5.src.rpm     MD5: ef6a42a8925311c70eb9a8a05ab17aba
SHA-256: 5d677d2333cbc4e5899f979dc4de2c2ac64474712934381dddedb98cc06ae01d
 
IA-32:
dump-0.4b41-6.el5.i386.rpm     MD5: 14e7eb3530a9dd715e888798c9461087
SHA-256: 17922242d55a517e63e09a1709ce614ecf0b18214b3c1610ba5b78826b767731
rmt-0.4b41-6.el5.i386.rpm     MD5: 66012cd6f103bc89f568cae5ff7485a5
SHA-256: 9c3af3888a1738dec01dcf5825671e2f73e42feec4347d5e882a2052f6332fe4
 
x86_64:
dump-0.4b41-6.el5.x86_64.rpm     MD5: ce7d17b30dd6c2ce289873d4ae90a7cf
SHA-256: 1b66a074793698044170b8605592bbd967716db70b9692becd51ec87f4231a72
rmt-0.4b41-6.el5.x86_64.rpm     MD5: 22506747181a97d636af0ac2456734a4
SHA-256: 1830c2ccb07486686e904a87719a24e3784a9d4282a07ca70366ab8a44bd650d
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

734039 - include the latest libblkid in dump


Keywords

dump, libblkid, rebuild


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/