Skip to navigation

Bug Fix Advisory coreutils bug fix update

Advisory: RHBA-2007:0786-5
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2007-11-15
Last updated on: 2007-11-15
Affected Products: Red Hat Desktop (v. 4)
Red Hat Enterprise Linux AS (v. 4)
Red Hat Enterprise Linux ES (v. 4)
Red Hat Enterprise Linux WS (v. 4)

Details

Updated coreutils packages that fix several bugs are now available.

The coreutils package contains core GNU utilities. It is the combination of
the old GNU fileutils, sh-utils, and textutils packages.

These updated packages fix the following bugs:

* running the chgrp command on a symbolic link caused the User ID (UID) of
the link to be copied to the target. If the target was owned by user and
group "a", and the link owned by user and group "b", running the "chgrp b"
command on the symbolic link would cause the target to be owned by user and
group "b", instead of user "a" and group "b".

* using the su command to switch to a user whose account had expired caused
a "Your account has expired; please contact your system administrator su:
incorrect password" error. The root user can now switch to expired user
accounts.

* the stat command returned a zero (success) exit code even when the target
file or directory did not exist.

* due to a buffer handling problem in the csplit command, piping sed output
to csplit may have caused corrupt output.

* running simultaneous "rm -rf" commands on the root of a deep directory
could cause one of the rm commands to segfault.

* in certain circumstances, the "du -sk" command caused a segmentation
fault when run in a Network File System (NFS) mounted directory, which
contained a large number of files or directories, or both. The following
error occurred in these circumstances:

du: fts_read failed: Stale NFS file handle
*** glibc detected *** double free or corruption (top): [hexadecimal
address]
***
Aborted

(The value of [hexadecimal address] would be different in each error).

The du command now handles these situations correctly.

* the du command did not count the size of unreadable sub-directories (ie
directories it did not have read and execute permissions to) into the
total. The total from the du command now includes the size of unreadable
sub-directories.

All coreutils users should upgrade to these updated packages, which resolve
these issues.


Solution

Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188

Updated packages

Red Hat Desktop (v. 4)

SRPMS:
coreutils-5.2.1-31.7.src.rpm
File outdated by:  RHBA-2011:0230
    MD5: b49d6b0d5bef4e3b16049b214362c554
 
IA-32:
coreutils-5.2.1-31.7.i386.rpm
File outdated by:  RHBA-2011:0230
    MD5: 5aa92b1d94c428f98d5f8a1d706db94a
 
x86_64:
coreutils-5.2.1-31.7.x86_64.rpm
File outdated by:  RHBA-2011:0230
    MD5: dc897ed6230b8065fccf9119346c738a
 
Red Hat Enterprise Linux AS (v. 4)

SRPMS:
coreutils-5.2.1-31.7.src.rpm
File outdated by:  RHBA-2011:0230
    MD5: b49d6b0d5bef4e3b16049b214362c554
 
IA-32:
coreutils-5.2.1-31.7.i386.rpm
File outdated by:  RHBA-2011:0230
    MD5: 5aa92b1d94c428f98d5f8a1d706db94a
 
IA-64:
coreutils-5.2.1-31.7.ia64.rpm
File outdated by:  RHBA-2011:0230
    MD5: 9fc9137602affa40a1f46d2cea44c36c
 
PPC:
coreutils-5.2.1-31.7.ppc.rpm
File outdated by:  RHBA-2011:0230
    MD5: 1723db6fb4aa1c8b987ee38b7437d144
 
s390:
coreutils-5.2.1-31.7.s390.rpm
File outdated by:  RHBA-2011:0230
    MD5: b85c0e761dafb578914d8461d1232493
 
s390x:
coreutils-5.2.1-31.7.s390x.rpm
File outdated by:  RHBA-2011:0230
    MD5: ffe2e10f8dc5efe03a788c8f6c421382
 
x86_64:
coreutils-5.2.1-31.7.x86_64.rpm
File outdated by:  RHBA-2011:0230
    MD5: dc897ed6230b8065fccf9119346c738a
 
Red Hat Enterprise Linux ES (v. 4)

SRPMS:
coreutils-5.2.1-31.7.src.rpm
File outdated by:  RHBA-2011:0230
    MD5: b49d6b0d5bef4e3b16049b214362c554
 
IA-32:
coreutils-5.2.1-31.7.i386.rpm
File outdated by:  RHBA-2011:0230
    MD5: 5aa92b1d94c428f98d5f8a1d706db94a
 
IA-64:
coreutils-5.2.1-31.7.ia64.rpm
File outdated by:  RHBA-2011:0230
    MD5: 9fc9137602affa40a1f46d2cea44c36c
 
x86_64:
coreutils-5.2.1-31.7.x86_64.rpm
File outdated by:  RHBA-2011:0230
    MD5: dc897ed6230b8065fccf9119346c738a
 
Red Hat Enterprise Linux WS (v. 4)

SRPMS:
coreutils-5.2.1-31.7.src.rpm
File outdated by:  RHBA-2011:0230
    MD5: b49d6b0d5bef4e3b16049b214362c554
 
IA-32:
coreutils-5.2.1-31.7.i386.rpm
File outdated by:  RHBA-2011:0230
    MD5: 5aa92b1d94c428f98d5f8a1d706db94a
 
IA-64:
coreutils-5.2.1-31.7.ia64.rpm
File outdated by:  RHBA-2011:0230
    MD5: 9fc9137602affa40a1f46d2cea44c36c
 
x86_64:
coreutils-5.2.1-31.7.x86_64.rpm
File outdated by:  RHBA-2011:0230
    MD5: dc897ed6230b8065fccf9119346c738a
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

215373 - chgrp alters uid of a file when run on symlinks
231019 - stat returns incorrect exit status
238121 - rm can segfault when racing another rm to delete a directory
250077 - RHEL4 du doesn't report size of unreadable sub directories



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/