- Issued:
- 2006-04-19
- Updated:
- 2006-08-09
RHBA-2006:0305 - Bug Fix Advisory
Synopsis
cpio bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated cpio packages that address various bugs are now available.
Description
GNU cpio copies files into or out of a cpio or tar archive.
This erratum addresses the following bugs:
- Cpio writes bad crcs in the cpio header on 64-bit machines.
- When cpio creates an ustar archive, the file modification times stored
in the archive are incorrect.
- If a file grew n bytes in copy-pass mode, these n bytes got prepended
to the contents of all subsequent files.
All users of cpio are advised to upgrade to these updated packages, which
contains backported fixes for these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 168401 - cpio -o -H ustar munges file modification times in created archive
- BZ - 171649 - cpio: checksum error on 64-bit machines
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
cpio-2.5-9.RHEL4.src.rpm | SHA-256: 48a7daeb7dd6d3124f22704c855e35ea0816fa6f63709693a3271e9e25d037d8 |
x86_64 | |
cpio-2.5-9.RHEL4.x86_64.rpm | SHA-256: f28f488339c029a8519a84ab2d98ad1ba88d3fd40af1a96bbbd0c8bccfffe209 |
cpio-2.5-9.RHEL4.x86_64.rpm | SHA-256: f28f488339c029a8519a84ab2d98ad1ba88d3fd40af1a96bbbd0c8bccfffe209 |
ia64 | |
cpio-2.5-9.RHEL4.ia64.rpm | SHA-256: 5845ec78aeeee8b36fa72ec451f0cc2dfb539fe9a30555704698684f8f05e969 |
cpio-2.5-9.RHEL4.ia64.rpm | SHA-256: 5845ec78aeeee8b36fa72ec451f0cc2dfb539fe9a30555704698684f8f05e969 |
i386 | |
cpio-2.5-9.RHEL4.i386.rpm | SHA-256: 04f71a3993baa7c1305064a2c206da9fa3e9d993e57d77e6495ba2b106575f44 |
cpio-2.5-9.RHEL4.i386.rpm | SHA-256: 04f71a3993baa7c1305064a2c206da9fa3e9d993e57d77e6495ba2b106575f44 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
cpio-2.5-9.RHEL4.src.rpm | SHA-256: 48a7daeb7dd6d3124f22704c855e35ea0816fa6f63709693a3271e9e25d037d8 |
x86_64 | |
cpio-2.5-9.RHEL4.x86_64.rpm | SHA-256: f28f488339c029a8519a84ab2d98ad1ba88d3fd40af1a96bbbd0c8bccfffe209 |
ia64 | |
cpio-2.5-9.RHEL4.ia64.rpm | SHA-256: 5845ec78aeeee8b36fa72ec451f0cc2dfb539fe9a30555704698684f8f05e969 |
i386 | |
cpio-2.5-9.RHEL4.i386.rpm | SHA-256: 04f71a3993baa7c1305064a2c206da9fa3e9d993e57d77e6495ba2b106575f44 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
cpio-2.5-9.RHEL4.src.rpm | SHA-256: 48a7daeb7dd6d3124f22704c855e35ea0816fa6f63709693a3271e9e25d037d8 |
x86_64 | |
cpio-2.5-9.RHEL4.x86_64.rpm | SHA-256: f28f488339c029a8519a84ab2d98ad1ba88d3fd40af1a96bbbd0c8bccfffe209 |
i386 | |
cpio-2.5-9.RHEL4.i386.rpm | SHA-256: 04f71a3993baa7c1305064a2c206da9fa3e9d993e57d77e6495ba2b106575f44 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
cpio-2.5-9.RHEL4.src.rpm | SHA-256: 48a7daeb7dd6d3124f22704c855e35ea0816fa6f63709693a3271e9e25d037d8 |
s390x | |
cpio-2.5-9.RHEL4.s390x.rpm | SHA-256: 5b9606e255e5c3e51f0fd14c7f3c11994281650cd6d31250c4d4610301a0a9fc |
s390 | |
cpio-2.5-9.RHEL4.s390.rpm | SHA-256: 9bc0f73556a0a8ef784afdc2c70be93b0ac6cad97ae209b2437eae721c23b016 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
cpio-2.5-9.RHEL4.src.rpm | SHA-256: 48a7daeb7dd6d3124f22704c855e35ea0816fa6f63709693a3271e9e25d037d8 |
ppc | |
cpio-2.5-9.RHEL4.ppc.rpm | SHA-256: f622e33c5d8ebc8696f98635b6dd21eb8289a5c0957732f72e35d349061a0a15 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.