Skip to navigation

Bug Fix Advisory psacct bug fix update

Advisory: RHBA-2012:1082-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-07-17
Last updated on: 2012-07-17
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server EUS (v. 6.3.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated psacct packages that fix multiple bugs are now available for Red Hat
Enterprise Linux 6.

The psacct packages contain utilities for monitoring process activities,
including ac, lastcomm, accton, dump-acct, dump-utmp and sa. The "ac" command
displays statistics about how long users have been logged on. The "lastcomm"
command displays information about previously executed commands. The "accton"
command turns process accounting on or off. The "dump-acct" command transforms
the output file from the accton format to a human-readable format. The
"dump-utmp" command prints utmp files in human-readable format. The "sa" command
summarizes information about previously executed commands.

This update fixes the following bugs:

* Previously, improper data type detection could have caused an arithmetic
overflow. As a consequence, the dump-acct tool reported incorrect elapsed time
values. A patch has been applied so that correct values are reported with this
update. (BZ#828728)

* Previously, improper data type conversion caused the dump-utmp tool to report
invalid timestamps. Consequently, mainly on the 64-bit PowerPC architecture,
dump-utmp could have terminated unexpectedly with a segmentation fault. A patch
has been applied so that correct values are reported and no crashes occur with
this update. (BZ#834217)

* Previously, accessing an incorrect and uninitialized memory structure used for
acquiring the user IDs caused the sa tool to report incorrect usernames.
Consequently, the sa tool could have terminated unexpectedly with a segmentation
fault. A patch has been applied so that correct values are reported and no
crashes occur with this update. (BZ#838998)

All users of psacct are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
psacct-6.3.2-63.el6_3.3.src.rpm     MD5: 648ef71382192035954b4a8896b1d6aa
SHA-256: 3b8e3a11fc6c7f3a84a18c49b4cb2bbca10142d683bff71fff17ef7a65004f20
 
IA-32:
psacct-6.3.2-63.el6_3.3.i686.rpm     MD5: 13eb88607fbd96ae24dfd7bbe7980293
SHA-256: 1ebdb327a9f52582193eb6e256ab2d0ad1aacb1e7b9a8423218216c76b3d8f15
psacct-debuginfo-6.3.2-63.el6_3.3.i686.rpm     MD5: 549dc27daae985abdfbd49f43aacf274
SHA-256: 1515a1e5789eb692f26c876e34a9ba0c9795a4c1dd43b0d4dfda4a4a1c271054
 
x86_64:
psacct-6.3.2-63.el6_3.3.x86_64.rpm     MD5: c231bfea320a8236f2788f784832e6c4
SHA-256: feb0d874ea7263511fc60528539c8b2be5e4984e00eab0b8a57faf7e1497273c
psacct-debuginfo-6.3.2-63.el6_3.3.x86_64.rpm     MD5: 57037894993755f8a3dcfe1fad82a727
SHA-256: e239a66ede553a8731ff90a746851a4afffa820e02f7e351e56dcdb331401eb2
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
psacct-6.3.2-63.el6_3.3.src.rpm     MD5: 648ef71382192035954b4a8896b1d6aa
SHA-256: 3b8e3a11fc6c7f3a84a18c49b4cb2bbca10142d683bff71fff17ef7a65004f20
 
x86_64:
psacct-6.3.2-63.el6_3.3.x86_64.rpm     MD5: c231bfea320a8236f2788f784832e6c4
SHA-256: feb0d874ea7263511fc60528539c8b2be5e4984e00eab0b8a57faf7e1497273c
psacct-debuginfo-6.3.2-63.el6_3.3.x86_64.rpm     MD5: 57037894993755f8a3dcfe1fad82a727
SHA-256: e239a66ede553a8731ff90a746851a4afffa820e02f7e351e56dcdb331401eb2
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
psacct-6.3.2-63.el6_3.3.src.rpm     MD5: 648ef71382192035954b4a8896b1d6aa
SHA-256: 3b8e3a11fc6c7f3a84a18c49b4cb2bbca10142d683bff71fff17ef7a65004f20
 
IA-32:
psacct-6.3.2-63.el6_3.3.i686.rpm     MD5: 13eb88607fbd96ae24dfd7bbe7980293
SHA-256: 1ebdb327a9f52582193eb6e256ab2d0ad1aacb1e7b9a8423218216c76b3d8f15
psacct-debuginfo-6.3.2-63.el6_3.3.i686.rpm     MD5: 549dc27daae985abdfbd49f43aacf274
SHA-256: 1515a1e5789eb692f26c876e34a9ba0c9795a4c1dd43b0d4dfda4a4a1c271054
 
PPC:
psacct-6.3.2-63.el6_3.3.ppc64.rpm     MD5: 149f30b3f9419764a2e4eb828755c10a
SHA-256: 241f8a21efa8170b9599b8a297626a05ac4e6c8f64011f4ee3b13449d9886a5f
psacct-debuginfo-6.3.2-63.el6_3.3.ppc64.rpm     MD5: daf5bfa05683280b39bc49c17841e912
SHA-256: 82d99003ff51189501ba1c4323e333d36ed9ca0a76e10bf99e6a676da66300ec
 
s390x:
psacct-6.3.2-63.el6_3.3.s390x.rpm     MD5: 85f429e57d9335825b984884d557aa5e
SHA-256: ee06e1024055cc92349d24a2b4d6b58aeae4c43805bdcb33baa8bd5c78098877
psacct-debuginfo-6.3.2-63.el6_3.3.s390x.rpm     MD5: 82c54790874a9cce4b7f5459b1c9d5af
SHA-256: 7ced2a6eec35603ab8d9c20da6dc27144d0ddbdd9208153cda8c677fd6e53e4d
 
x86_64:
psacct-6.3.2-63.el6_3.3.x86_64.rpm     MD5: c231bfea320a8236f2788f784832e6c4
SHA-256: feb0d874ea7263511fc60528539c8b2be5e4984e00eab0b8a57faf7e1497273c
psacct-debuginfo-6.3.2-63.el6_3.3.x86_64.rpm     MD5: 57037894993755f8a3dcfe1fad82a727
SHA-256: e239a66ede553a8731ff90a746851a4afffa820e02f7e351e56dcdb331401eb2
 
Red Hat Enterprise Linux Server EUS (v. 6.3.z)

SRPMS:
psacct-6.3.2-63.el6_3.3.src.rpm     MD5: 648ef71382192035954b4a8896b1d6aa
SHA-256: 3b8e3a11fc6c7f3a84a18c49b4cb2bbca10142d683bff71fff17ef7a65004f20
 
IA-32:
psacct-6.3.2-63.el6_3.3.i686.rpm     MD5: 13eb88607fbd96ae24dfd7bbe7980293
SHA-256: 1ebdb327a9f52582193eb6e256ab2d0ad1aacb1e7b9a8423218216c76b3d8f15
psacct-debuginfo-6.3.2-63.el6_3.3.i686.rpm     MD5: 549dc27daae985abdfbd49f43aacf274
SHA-256: 1515a1e5789eb692f26c876e34a9ba0c9795a4c1dd43b0d4dfda4a4a1c271054
 
PPC:
psacct-6.3.2-63.el6_3.3.ppc64.rpm     MD5: 149f30b3f9419764a2e4eb828755c10a
SHA-256: 241f8a21efa8170b9599b8a297626a05ac4e6c8f64011f4ee3b13449d9886a5f
psacct-debuginfo-6.3.2-63.el6_3.3.ppc64.rpm     MD5: daf5bfa05683280b39bc49c17841e912
SHA-256: 82d99003ff51189501ba1c4323e333d36ed9ca0a76e10bf99e6a676da66300ec
 
s390x:
psacct-6.3.2-63.el6_3.3.s390x.rpm     MD5: 85f429e57d9335825b984884d557aa5e
SHA-256: ee06e1024055cc92349d24a2b4d6b58aeae4c43805bdcb33baa8bd5c78098877
psacct-debuginfo-6.3.2-63.el6_3.3.s390x.rpm     MD5: 82c54790874a9cce4b7f5459b1c9d5af
SHA-256: 7ced2a6eec35603ab8d9c20da6dc27144d0ddbdd9208153cda8c677fd6e53e4d
 
x86_64:
psacct-6.3.2-63.el6_3.3.x86_64.rpm     MD5: c231bfea320a8236f2788f784832e6c4
SHA-256: feb0d874ea7263511fc60528539c8b2be5e4984e00eab0b8a57faf7e1497273c
psacct-debuginfo-6.3.2-63.el6_3.3.x86_64.rpm     MD5: 57037894993755f8a3dcfe1fad82a727
SHA-256: e239a66ede553a8731ff90a746851a4afffa820e02f7e351e56dcdb331401eb2
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
psacct-6.3.2-63.el6_3.3.src.rpm     MD5: 648ef71382192035954b4a8896b1d6aa
SHA-256: 3b8e3a11fc6c7f3a84a18c49b4cb2bbca10142d683bff71fff17ef7a65004f20
 
IA-32:
psacct-6.3.2-63.el6_3.3.i686.rpm     MD5: 13eb88607fbd96ae24dfd7bbe7980293
SHA-256: 1ebdb327a9f52582193eb6e256ab2d0ad1aacb1e7b9a8423218216c76b3d8f15
psacct-debuginfo-6.3.2-63.el6_3.3.i686.rpm     MD5: 549dc27daae985abdfbd49f43aacf274
SHA-256: 1515a1e5789eb692f26c876e34a9ba0c9795a4c1dd43b0d4dfda4a4a1c271054
 
x86_64:
psacct-6.3.2-63.el6_3.3.x86_64.rpm     MD5: c231bfea320a8236f2788f784832e6c4
SHA-256: feb0d874ea7263511fc60528539c8b2be5e4984e00eab0b8a57faf7e1497273c
psacct-debuginfo-6.3.2-63.el6_3.3.x86_64.rpm     MD5: 57037894993755f8a3dcfe1fad82a727
SHA-256: e239a66ede553a8731ff90a746851a4afffa820e02f7e351e56dcdb331401eb2
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

834217 - dump-utmp Segmentation fault on ppc64
838998 - sa -u cause Segmentation fault


Keywords

dump-acct, elapsed, incorrect, psacct, time


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/