- Issued:
- 2005-10-05
- Updated:
- 2005-10-05
RHBA-2005:359 - Bug Fix Advisory
Synopsis
dump bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated dump packages that include various bug fixes and enhancements are
now available.
Description
The dump package contains both dump and restore. Dump examines files
in a file system, determines which ones need to be backed up, and
copies those files to a specified disk, tape, or other storage medium.
The restore command performs the inverse function of dump; it can
restore a full backup of a file system. Subsequent incremental backups
can then be layered on top of the full backup. Single files and
directory subtrees may also be restored from full or partial backups.
The updated dump package now includes support for EA/ACL, in-inode EAs, and
big inodes.
The updated dump package also contains fixes for negative size issues with
the -s and -d options.
Users should upgrade to these updated packages, which include these
enhancements and resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied. Use Red Hat
Network to download and update your packages. To launch the Red Hat
Update Agent, use the following command:
up2date
For information on how to install packages manually, refer to the
following Web page for the System Administration or Customization
guide specific to your system:
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 146567 - [RFE] dump is unable to store EA/ACL
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
dump-0.4b39-3.EL4.2.src.rpm | SHA-256: c956c2c031f8b3f2d049d9806bc16e36843a4ee74643e3fa329795839746f7f3 |
x86_64 | |
dump-0.4b39-3.EL4.2.x86_64.rpm | SHA-256: d161e92dfe4416ebbbe24b613f63110269f7785ca1e25d8d0782ed9de3abcdff |
dump-0.4b39-3.EL4.2.x86_64.rpm | SHA-256: d161e92dfe4416ebbbe24b613f63110269f7785ca1e25d8d0782ed9de3abcdff |
rmt-0.4b39-3.EL4.2.x86_64.rpm | SHA-256: 2f98550b812675db9b5e46eb7870768a402dccd48e095eda2e363a2562d6f7fa |
rmt-0.4b39-3.EL4.2.x86_64.rpm | SHA-256: 2f98550b812675db9b5e46eb7870768a402dccd48e095eda2e363a2562d6f7fa |
ia64 | |
dump-0.4b39-3.EL4.2.ia64.rpm | SHA-256: 24404906985be301f440c4c494a4f8af64535ff9777c8232a56a5521e8d2ed8f |
dump-0.4b39-3.EL4.2.ia64.rpm | SHA-256: 24404906985be301f440c4c494a4f8af64535ff9777c8232a56a5521e8d2ed8f |
rmt-0.4b39-3.EL4.2.ia64.rpm | SHA-256: e85f66c0f7f23c4127bfcf50e1405d64fc29e84456e661f4c6f78cd169ee80d1 |
rmt-0.4b39-3.EL4.2.ia64.rpm | SHA-256: e85f66c0f7f23c4127bfcf50e1405d64fc29e84456e661f4c6f78cd169ee80d1 |
i386 | |
dump-0.4b39-3.EL4.2.i386.rpm | SHA-256: 7e2050790b0cc777fe2116a0b09d2c8ba0ce900ca2d6a8d7c7fc46a82a550461 |
dump-0.4b39-3.EL4.2.i386.rpm | SHA-256: 7e2050790b0cc777fe2116a0b09d2c8ba0ce900ca2d6a8d7c7fc46a82a550461 |
rmt-0.4b39-3.EL4.2.i386.rpm | SHA-256: d05351383d340ff1a08e3955100cbd2fc64bc4c5e013f5ed527e1fb83f31a4f2 |
rmt-0.4b39-3.EL4.2.i386.rpm | SHA-256: d05351383d340ff1a08e3955100cbd2fc64bc4c5e013f5ed527e1fb83f31a4f2 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
dump-0.4b39-3.EL4.2.src.rpm | SHA-256: c956c2c031f8b3f2d049d9806bc16e36843a4ee74643e3fa329795839746f7f3 |
x86_64 | |
dump-0.4b39-3.EL4.2.x86_64.rpm | SHA-256: d161e92dfe4416ebbbe24b613f63110269f7785ca1e25d8d0782ed9de3abcdff |
rmt-0.4b39-3.EL4.2.x86_64.rpm | SHA-256: 2f98550b812675db9b5e46eb7870768a402dccd48e095eda2e363a2562d6f7fa |
ia64 | |
dump-0.4b39-3.EL4.2.ia64.rpm | SHA-256: 24404906985be301f440c4c494a4f8af64535ff9777c8232a56a5521e8d2ed8f |
rmt-0.4b39-3.EL4.2.ia64.rpm | SHA-256: e85f66c0f7f23c4127bfcf50e1405d64fc29e84456e661f4c6f78cd169ee80d1 |
i386 | |
dump-0.4b39-3.EL4.2.i386.rpm | SHA-256: 7e2050790b0cc777fe2116a0b09d2c8ba0ce900ca2d6a8d7c7fc46a82a550461 |
rmt-0.4b39-3.EL4.2.i386.rpm | SHA-256: d05351383d340ff1a08e3955100cbd2fc64bc4c5e013f5ed527e1fb83f31a4f2 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
dump-0.4b39-3.EL4.2.src.rpm | SHA-256: c956c2c031f8b3f2d049d9806bc16e36843a4ee74643e3fa329795839746f7f3 |
x86_64 | |
dump-0.4b39-3.EL4.2.x86_64.rpm | SHA-256: d161e92dfe4416ebbbe24b613f63110269f7785ca1e25d8d0782ed9de3abcdff |
rmt-0.4b39-3.EL4.2.x86_64.rpm | SHA-256: 2f98550b812675db9b5e46eb7870768a402dccd48e095eda2e363a2562d6f7fa |
i386 | |
dump-0.4b39-3.EL4.2.i386.rpm | SHA-256: 7e2050790b0cc777fe2116a0b09d2c8ba0ce900ca2d6a8d7c7fc46a82a550461 |
rmt-0.4b39-3.EL4.2.i386.rpm | SHA-256: d05351383d340ff1a08e3955100cbd2fc64bc4c5e013f5ed527e1fb83f31a4f2 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
dump-0.4b39-3.EL4.2.src.rpm | SHA-256: c956c2c031f8b3f2d049d9806bc16e36843a4ee74643e3fa329795839746f7f3 |
s390x | |
dump-0.4b39-3.EL4.2.s390x.rpm | SHA-256: af2cdf364686d51c196724d51872b099634471f30c84e1fbfeee45e6cbfb318e |
rmt-0.4b39-3.EL4.2.s390x.rpm | SHA-256: 8f8f93b6ed5bc709cf254f972c489c51c1f9b3bd9120c97948f2d0745267722f |
s390 | |
dump-0.4b39-3.EL4.2.s390.rpm | SHA-256: 8aa722110547522df5caafc561f1e6e4b88bb0d799be7d6819c67eb90f4994c0 |
rmt-0.4b39-3.EL4.2.s390.rpm | SHA-256: f96abbad60425426dbc08a6b66f25d0384f93b2698d1b8cb0051f58165855dbe |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
dump-0.4b39-3.EL4.2.src.rpm | SHA-256: c956c2c031f8b3f2d049d9806bc16e36843a4ee74643e3fa329795839746f7f3 |
ppc | |
dump-0.4b39-3.EL4.2.ppc.rpm | SHA-256: 716265a9241353cc75567933970e0d377f437f1d6f3622ff05663b7de64d8d0e |
rmt-0.4b39-3.EL4.2.ppc.rpm | SHA-256: a00e10f7f4ad192a2a7af9f0ba526df64affc05abc6185919ab31524b8d73f6b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.