Skip to navigation

Bug Fix Advisory cpio bug fix update

Advisory: RHBA-2012:1055-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated cpio packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

The cpio packages provide the GNU cpio file archiver utility. GNU cpio can be
used to copy and extract files into or from cpio and Tar archives. This update
is related to the following bug:

* Prior to this update, the cpio man page did not document how to use tape
devices that do not use the default block size of 512 bytes for I/O operations.
As a result, the cpio utility could fail with the error message "cpio: read
error: Cannot allocate memory" if another block size was used. With this update,
the man page states that setting the block size with the "--block-size" long
option avoids this problem. (BZ#573943)

All users of cpio are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
cpio-2.6-25.el5.src.rpm
File outdated by:  RHBA-2013:1299
    MD5: 4750cb4635d4068c74245682f5a2a87a
SHA-256: f1ba440c0529578af6ee4b6114cb653693fce256eb5520812fe4f50fff43ae92
 
IA-32:
cpio-2.6-25.el5.i386.rpm
File outdated by:  RHBA-2013:1299
    MD5: f5e1471675dd3926c8a4c936d08e86c9
SHA-256: 2c6de1f5903a57489f788273ae1fadca83de1927d4ce3840c3dea6021f85e41b
cpio-debuginfo-2.6-25.el5.i386.rpm
File outdated by:  RHBA-2013:1299
    MD5: 27c913d49863ff6b5a531dbebd4c506a
SHA-256: 137c0d937305bf8be15fb7d6e526a7d53414be72c60246de3ebb60d6ebd2c7f7
 
IA-64:
cpio-2.6-25.el5.ia64.rpm
File outdated by:  RHBA-2013:1299
    MD5: 20f108f99de8070c4d6113dfd627d848
SHA-256: 7f08174666acc990d8201e03837e852cae693a43b4cba2f78061a00e07571413
cpio-debuginfo-2.6-25.el5.ia64.rpm
File outdated by:  RHBA-2013:1299
    MD5: 9f43c9206ada66e47cb25b19b54d4682
SHA-256: 5d8e802a95b8f591a82121b548a5faf9380176c6c2ee85d1526fa28af83b8b9e
 
PPC:
cpio-2.6-25.el5.ppc.rpm
File outdated by:  RHBA-2013:1299
    MD5: fda7a5f1634d83bf5e4f6c44258dfd1f
SHA-256: 7fce1a0a709421666d741624acd212e8be0cd0f1a1ee9e5dcc1788e5f852e2f6
cpio-debuginfo-2.6-25.el5.ppc.rpm
File outdated by:  RHBA-2013:1299
    MD5: 941df4492aa54bbbce4438a548a3a398
SHA-256: e46447a280669931e98e50629515419fb0752ebfe7d31640c286e2239019d750
 
s390x:
cpio-2.6-25.el5.s390x.rpm
File outdated by:  RHBA-2013:1299
    MD5: 6252ceec6e41d0ee2ad04739eece8cd8
SHA-256: 58115a771ed26aa7d7fb28b1e8ec230b5d91deddf038476b7d19dc2562239dc0
cpio-debuginfo-2.6-25.el5.s390x.rpm
File outdated by:  RHBA-2013:1299
    MD5: c62910bbf3237b663b065862a1299171
SHA-256: f2aaa931ff0ec5fefecd9f93e26b38bf76534c46608e627bfeda2d4ff8f024cc
 
x86_64:
cpio-2.6-25.el5.x86_64.rpm
File outdated by:  RHBA-2013:1299
    MD5: 4398bff2379eb5fad4da54b13c6def57
SHA-256: 9e2911c24065135cd534a92546210f12db91202fcd4b02121099cfb8c00f5d37
cpio-debuginfo-2.6-25.el5.x86_64.rpm
File outdated by:  RHBA-2013:1299
    MD5: ef518b7489707b6411c43655ca202581
SHA-256: a9e682ea3264b731d8fb1c65e73466170ba7fa2f7ee62ccefcaba974af792120
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
cpio-2.6-25.el5.src.rpm
File outdated by:  RHBA-2013:1299
    MD5: 4750cb4635d4068c74245682f5a2a87a
SHA-256: f1ba440c0529578af6ee4b6114cb653693fce256eb5520812fe4f50fff43ae92
 
IA-32:
cpio-2.6-25.el5.i386.rpm
File outdated by:  RHBA-2013:1299
    MD5: f5e1471675dd3926c8a4c936d08e86c9
SHA-256: 2c6de1f5903a57489f788273ae1fadca83de1927d4ce3840c3dea6021f85e41b
cpio-debuginfo-2.6-25.el5.i386.rpm
File outdated by:  RHBA-2013:1299
    MD5: 27c913d49863ff6b5a531dbebd4c506a
SHA-256: 137c0d937305bf8be15fb7d6e526a7d53414be72c60246de3ebb60d6ebd2c7f7
 
x86_64:
cpio-2.6-25.el5.x86_64.rpm
File outdated by:  RHBA-2013:1299
    MD5: 4398bff2379eb5fad4da54b13c6def57
SHA-256: 9e2911c24065135cd534a92546210f12db91202fcd4b02121099cfb8c00f5d37
cpio-debuginfo-2.6-25.el5.x86_64.rpm
File outdated by:  RHBA-2013:1299
    MD5: ef518b7489707b6411c43655ca202581
SHA-256: a9e682ea3264b731d8fb1c65e73466170ba7fa2f7ee62ccefcaba974af792120
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

573943 - Technical note: Better document cpio behavior when using tape mechanic (find proper block size)


Keywords

cpio


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/