- Issued:
- 2007-11-15
- Updated:
- 2007-11-15
RHBA-2007:0758 - Bug Fix Advisory
Synopsis
e2fsprogs bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated e2fsprogs packages that fix various bugs are now available.
Description
The e2fsprogs packages contain a number of utilities for creating,
checking, modifying, and correcting any inconsistencies in second extended
(ext2) file systems. e2fsprogs contains e2fsck (used to repair file system
inconsistencies after an unclean shutdown), mke2fs (used to initialize a
partition to contain an empty ext2 file system), debugfs (used to examine
the internal structure of a file system, to manually repair a corrupted
file system, or to create test cases for e2fsck), tune2fs (used to modify
file system parameters), and most of the other core ext2fs file system
utilities.
- several defects discovered by the Coverity source code checker
that could result in memory leaks, segmentation faults, or memory
corruption, have been resolved in these updated packages.
- the "dump_unused" command in debugfs caused a segmentation fault when
being run without an open file system.
- the "logdump" command in debugfs could hang when following symbolic links
in the /dev directory.
- running the ext2online command on an ext2 file system (on a re-sizable
logical volume) caused a "ext2online: ext2_ioctl: Inappropriate ioctl for
device" error. The ext2online command can only be run on ext3 file
systems. The documentation has been updated to reflect this.
- a file system containing a corrupted resize inode, that contained blocks
claimed by other inodes, was unable to be repaired using the e2fsck
command. Manually running the fsck command asked you to re-create the
resize inode, but this operation failed. Corrupted resize inodes can be
repaired in these updated packages.
- bad superblocks could potentially be written to backups when fsck
replayed a corrupt journal. This has been resolved in these updated
packages.
- a corrupted extended attribute could cause e2fsck to dereference bad
memory, resulting in a segmentation fault. A extra validity test occurs for
extended attributes in these updated packages.
Users of the e2fsprogs are advised to upgrade to these updated packages,
which resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 178927 - ext2online will not extend ext2 filesystem without journal
- BZ - 227670 - resize inode not valid
- BZ - 228706 - [RHEL4] [patch] cid-11 Avoid static buffer overruns in debugfs
- BZ - 228716 - [RHEL4] [patch] cid-12 Avoid static buffer overruns in debugfs
- BZ - 228722 - [RHEL4] [patch] cid-10 Add missing NULL check to e2fsck_get_dir_info()
- BZ - 228725 - [RHEL4] [patch] cid-21 Fix memory leak in libss (ss_execute_line)
- BZ - 228737 - [RHEL4] [patch] cid-32 Fix memory leak in fsck on error paths
- BZ - 228749 - [RHEL4][patch] cid-17 cid-18 Fix memory leak in libe2p (e2p_edit_mntopts)
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
e2fsprogs-1.35-12.11.el4.src.rpm | SHA-256: c8c7a4999a30c505266c8c77b0b501b21c0dc0a273b48b8e1f4c8e2392bab7d4 |
x86_64 | |
e2fsprogs-1.35-12.11.el4.i386.rpm | SHA-256: 39cebab1cedac9d5a493ea0a9b6bae705df6d2de54712b3d72d1a5cceb958584 |
e2fsprogs-1.35-12.11.el4.i386.rpm | SHA-256: 39cebab1cedac9d5a493ea0a9b6bae705df6d2de54712b3d72d1a5cceb958584 |
e2fsprogs-1.35-12.11.el4.x86_64.rpm | SHA-256: 182c1aa451cbde88eccf8c8da2be8aefa278a605efdabe6c906af933340508a7 |
e2fsprogs-1.35-12.11.el4.x86_64.rpm | SHA-256: 182c1aa451cbde88eccf8c8da2be8aefa278a605efdabe6c906af933340508a7 |
e2fsprogs-devel-1.35-12.11.el4.x86_64.rpm | SHA-256: a165d061e62ffeff559f1d96e9514592e6d7516e130acd77158cfb6bf863f6e5 |
e2fsprogs-devel-1.35-12.11.el4.x86_64.rpm | SHA-256: a165d061e62ffeff559f1d96e9514592e6d7516e130acd77158cfb6bf863f6e5 |
ia64 | |
e2fsprogs-1.35-12.11.el4.i386.rpm | SHA-256: 39cebab1cedac9d5a493ea0a9b6bae705df6d2de54712b3d72d1a5cceb958584 |
e2fsprogs-1.35-12.11.el4.i386.rpm | SHA-256: 39cebab1cedac9d5a493ea0a9b6bae705df6d2de54712b3d72d1a5cceb958584 |
e2fsprogs-1.35-12.11.el4.ia64.rpm | SHA-256: 3ac8a40a90a88c5384a13382cf1234f2a70fd0693616ab30ec16382b1f0ba15c |
e2fsprogs-1.35-12.11.el4.ia64.rpm | SHA-256: 3ac8a40a90a88c5384a13382cf1234f2a70fd0693616ab30ec16382b1f0ba15c |
e2fsprogs-devel-1.35-12.11.el4.ia64.rpm | SHA-256: 95f25bf563aae36266a13e8b7b522d5f515c73c26e89c5edaca1409a498c0d99 |
e2fsprogs-devel-1.35-12.11.el4.ia64.rpm | SHA-256: 95f25bf563aae36266a13e8b7b522d5f515c73c26e89c5edaca1409a498c0d99 |
i386 | |
e2fsprogs-1.35-12.11.el4.i386.rpm | SHA-256: 39cebab1cedac9d5a493ea0a9b6bae705df6d2de54712b3d72d1a5cceb958584 |
e2fsprogs-1.35-12.11.el4.i386.rpm | SHA-256: 39cebab1cedac9d5a493ea0a9b6bae705df6d2de54712b3d72d1a5cceb958584 |
e2fsprogs-devel-1.35-12.11.el4.i386.rpm | SHA-256: fa64012dc0480a76f85ab842c4188b2ef010c9776980f41df6d22c225a892d9a |
e2fsprogs-devel-1.35-12.11.el4.i386.rpm | SHA-256: fa64012dc0480a76f85ab842c4188b2ef010c9776980f41df6d22c225a892d9a |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
e2fsprogs-1.35-12.11.el4.src.rpm | SHA-256: c8c7a4999a30c505266c8c77b0b501b21c0dc0a273b48b8e1f4c8e2392bab7d4 |
x86_64 | |
e2fsprogs-1.35-12.11.el4.i386.rpm | SHA-256: 39cebab1cedac9d5a493ea0a9b6bae705df6d2de54712b3d72d1a5cceb958584 |
e2fsprogs-1.35-12.11.el4.x86_64.rpm | SHA-256: 182c1aa451cbde88eccf8c8da2be8aefa278a605efdabe6c906af933340508a7 |
e2fsprogs-devel-1.35-12.11.el4.x86_64.rpm | SHA-256: a165d061e62ffeff559f1d96e9514592e6d7516e130acd77158cfb6bf863f6e5 |
ia64 | |
e2fsprogs-1.35-12.11.el4.i386.rpm | SHA-256: 39cebab1cedac9d5a493ea0a9b6bae705df6d2de54712b3d72d1a5cceb958584 |
e2fsprogs-1.35-12.11.el4.ia64.rpm | SHA-256: 3ac8a40a90a88c5384a13382cf1234f2a70fd0693616ab30ec16382b1f0ba15c |
e2fsprogs-devel-1.35-12.11.el4.ia64.rpm | SHA-256: 95f25bf563aae36266a13e8b7b522d5f515c73c26e89c5edaca1409a498c0d99 |
i386 | |
e2fsprogs-1.35-12.11.el4.i386.rpm | SHA-256: 39cebab1cedac9d5a493ea0a9b6bae705df6d2de54712b3d72d1a5cceb958584 |
e2fsprogs-devel-1.35-12.11.el4.i386.rpm | SHA-256: fa64012dc0480a76f85ab842c4188b2ef010c9776980f41df6d22c225a892d9a |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
e2fsprogs-1.35-12.11.el4.src.rpm | SHA-256: c8c7a4999a30c505266c8c77b0b501b21c0dc0a273b48b8e1f4c8e2392bab7d4 |
x86_64 | |
e2fsprogs-1.35-12.11.el4.i386.rpm | SHA-256: 39cebab1cedac9d5a493ea0a9b6bae705df6d2de54712b3d72d1a5cceb958584 |
e2fsprogs-1.35-12.11.el4.x86_64.rpm | SHA-256: 182c1aa451cbde88eccf8c8da2be8aefa278a605efdabe6c906af933340508a7 |
e2fsprogs-devel-1.35-12.11.el4.x86_64.rpm | SHA-256: a165d061e62ffeff559f1d96e9514592e6d7516e130acd77158cfb6bf863f6e5 |
i386 | |
e2fsprogs-1.35-12.11.el4.i386.rpm | SHA-256: 39cebab1cedac9d5a493ea0a9b6bae705df6d2de54712b3d72d1a5cceb958584 |
e2fsprogs-devel-1.35-12.11.el4.i386.rpm | SHA-256: fa64012dc0480a76f85ab842c4188b2ef010c9776980f41df6d22c225a892d9a |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
e2fsprogs-1.35-12.11.el4.src.rpm | SHA-256: c8c7a4999a30c505266c8c77b0b501b21c0dc0a273b48b8e1f4c8e2392bab7d4 |
s390x | |
e2fsprogs-1.35-12.11.el4.s390.rpm | SHA-256: ef409cc31d1bb81739c8c81e3dbe02342e9d80d2e62fe61dfd5af570133a61bb |
e2fsprogs-1.35-12.11.el4.s390x.rpm | SHA-256: 8a087ae6fc36208c5e9d2eb3524294a4f64f22fa3056eec402413112fb4f1dc6 |
e2fsprogs-devel-1.35-12.11.el4.s390x.rpm | SHA-256: f8138c641ec1357a1cd9276a63b5874f5db46c9a7e3f5e7086a6e2bd2ef510b4 |
s390 | |
e2fsprogs-1.35-12.11.el4.s390.rpm | SHA-256: ef409cc31d1bb81739c8c81e3dbe02342e9d80d2e62fe61dfd5af570133a61bb |
e2fsprogs-devel-1.35-12.11.el4.s390.rpm | SHA-256: 506f6cc841c9c958cd985be4243b47df699caedb70b47e528c00aa1e8746f79e |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
e2fsprogs-1.35-12.11.el4.src.rpm | SHA-256: c8c7a4999a30c505266c8c77b0b501b21c0dc0a273b48b8e1f4c8e2392bab7d4 |
ppc | |
e2fsprogs-1.35-12.11.el4.ppc.rpm | SHA-256: 43cfe1bd020d653702f6156e6f8cca7dd84c457f503fcabac5a3dd074584f294 |
e2fsprogs-1.35-12.11.el4.ppc64.rpm | SHA-256: af689f5cf0480aab48e95362acf27017de7bb7b81ed4483c46ef048aca769cdb |
e2fsprogs-devel-1.35-12.11.el4.ppc.rpm | SHA-256: 879ec9e1f8bae38c09893d162a34c93b569c1ae01190d56a4be465c3aab95c59 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.