- Issued:
- 2009-03-18
- Updated:
- 2009-09-02
RHBA-2009:0379 - Bug Fix Advisory
Synopsis
cpio bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated cpio package that fixes various bugs is now available.
Description
GNU cpio copies files into or out of a cpio or Tar archive.
This updated cpio package includes fixes for the following bugs:
- when called with the "--pass-through" ('-p') option, which enables
copy-pass mode, cpio did not always set the permissions of copied
directories correctly. In certain circumstances, cpio always created
directories with a permissions mode of 700 and did not respect the system
umask. With this updated package, cpio copies directories while honoring
the umask setting when using copy-pass mode, which resolves the issue.
- cpio was unable to write to a file on a remote system when using the "-O
[archive]" option along with "--rsh-command". With this update, cpio is
once again able to write files to remote systems. Note that the default
remote shell is defined as /usr/bin/rsh.
All users of cpio are advised to upgrade to this updated package, which
resolves these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
cpio-2.6-23.el5.src.rpm | SHA-256: 4624b7c997ce443f3d59a4d6ba6fd1e2bfdb020d427dab6155ce0839db2b44d3 |
x86_64 | |
cpio-2.6-23.el5.x86_64.rpm | SHA-256: 4af7336182648fc3a7f6c50a51c9d6aa4d63d6c11238b4518247df124d919991 |
ia64 | |
cpio-2.6-23.el5.ia64.rpm | SHA-256: 9238134d7ab56472016081ee13fce77b60e228e39a173a10de4006ab0e9ed972 |
i386 | |
cpio-2.6-23.el5.i386.rpm | SHA-256: 912e7f271fd3cd4083469c92030b3fae5bead78977b09003d664ca0bb08c5541 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
cpio-2.6-23.el5.src.rpm | SHA-256: 4624b7c997ce443f3d59a4d6ba6fd1e2bfdb020d427dab6155ce0839db2b44d3 |
x86_64 | |
cpio-2.6-23.el5.x86_64.rpm | SHA-256: 4af7336182648fc3a7f6c50a51c9d6aa4d63d6c11238b4518247df124d919991 |
i386 | |
cpio-2.6-23.el5.i386.rpm | SHA-256: 912e7f271fd3cd4083469c92030b3fae5bead78977b09003d664ca0bb08c5541 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
cpio-2.6-23.el5.src.rpm | SHA-256: 4624b7c997ce443f3d59a4d6ba6fd1e2bfdb020d427dab6155ce0839db2b44d3 |
x86_64 | |
cpio-2.6-23.el5.x86_64.rpm | SHA-256: 4af7336182648fc3a7f6c50a51c9d6aa4d63d6c11238b4518247df124d919991 |
i386 | |
cpio-2.6-23.el5.i386.rpm | SHA-256: 912e7f271fd3cd4083469c92030b3fae5bead78977b09003d664ca0bb08c5541 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
cpio-2.6-23.el5.src.rpm | SHA-256: 4624b7c997ce443f3d59a4d6ba6fd1e2bfdb020d427dab6155ce0839db2b44d3 |
s390x | |
cpio-2.6-23.el5.s390x.rpm | SHA-256: ca6710bc3b048af4c79c65b842d4275f0a2838c03a4f409c8495fea18236e1db |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
cpio-2.6-23.el5.src.rpm | SHA-256: 4624b7c997ce443f3d59a4d6ba6fd1e2bfdb020d427dab6155ce0839db2b44d3 |
ppc | |
cpio-2.6-23.el5.ppc.rpm | SHA-256: c6263d822e92801c1c49c4aaa27251f337d58e1f7fbb9b30676ce2ee85aef9c9 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
cpio-2.6-23.el5.src.rpm | SHA-256: 4624b7c997ce443f3d59a4d6ba6fd1e2bfdb020d427dab6155ce0839db2b44d3 |
x86_64 | |
cpio-2.6-23.el5.x86_64.rpm | SHA-256: 4af7336182648fc3a7f6c50a51c9d6aa4d63d6c11238b4518247df124d919991 |
i386 | |
cpio-2.6-23.el5.i386.rpm | SHA-256: 912e7f271fd3cd4083469c92030b3fae5bead78977b09003d664ca0bb08c5541 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.