Skip to navigation

Bug Fix Advisory system-config-lvm bug fix update

Advisory: RHBA-2013:0070-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated system-config-lvm package that fixes two bugs is now available for
Red Hat Enterprise Linux 5.

The system-config-lvm package contains a utility for configuring logical volumes
(LVs) using a graphical user interface.

This update fixes the following bugs:

* The system-config-lvm utility did not start correctly when there were too many
existing LVs and returned a traceback. This was due to a bug in the best_fit
function, which tried to fit all existing LVs into the display area. This update
modifies the underlying source code to make the system-config-lvm utility fully
functional even when there are more then 350 LVs existing on the system.
(BZ#834231)

* Initializing a disk via the system-config-lvm utility with an EFI GPT
partition table did not work correctly because the fdisk utility, which is used
by system-config-lvm to manipulate disk partition tables, does not support EFI
GPT partition tables. With this update, attempting to initialize a disk using an
EFI GPT partition table returns an informative error message. Support for EFI
GPT partition tables was not added. (BZ#700253)

All users of system-config-lvm are advised to upgrade to this updated package,
which fixes these bugs.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
system-config-lvm-1.1.5-13.el5.src.rpm
File outdated by:  RHBA-2013:1347
    MD5: 1b2fa757469dbb570f8bce1eccbfbc0c
SHA-256: 60735042b25d32c9856d5fbba585ff9222e95fbd3ad31f63a59f9cbd3e220b29
 
IA-32:
system-config-lvm-1.1.5-13.el5.noarch.rpm
File outdated by:  RHBA-2013:1347
    MD5: 041c71ca860830b8f50e9ff90fab64bd
SHA-256: b093aa6c220130d9e4c24ac85eb375b909c99b0bf5b02a1626ba342e54ee7e46
 
IA-64:
system-config-lvm-1.1.5-13.el5.noarch.rpm
File outdated by:  RHBA-2013:1347
    MD5: 041c71ca860830b8f50e9ff90fab64bd
SHA-256: b093aa6c220130d9e4c24ac85eb375b909c99b0bf5b02a1626ba342e54ee7e46
 
PPC:
system-config-lvm-1.1.5-13.el5.noarch.rpm
File outdated by:  RHBA-2013:1347
    MD5: 041c71ca860830b8f50e9ff90fab64bd
SHA-256: b093aa6c220130d9e4c24ac85eb375b909c99b0bf5b02a1626ba342e54ee7e46
 
s390x:
system-config-lvm-1.1.5-13.el5.noarch.rpm
File outdated by:  RHBA-2013:1347
    MD5: 041c71ca860830b8f50e9ff90fab64bd
SHA-256: b093aa6c220130d9e4c24ac85eb375b909c99b0bf5b02a1626ba342e54ee7e46
 
x86_64:
system-config-lvm-1.1.5-13.el5.noarch.rpm
File outdated by:  RHBA-2013:1347
    MD5: 041c71ca860830b8f50e9ff90fab64bd
SHA-256: b093aa6c220130d9e4c24ac85eb375b909c99b0bf5b02a1626ba342e54ee7e46
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
system-config-lvm-1.1.5-13.el5.src.rpm
File outdated by:  RHBA-2013:1347
    MD5: 1b2fa757469dbb570f8bce1eccbfbc0c
SHA-256: 60735042b25d32c9856d5fbba585ff9222e95fbd3ad31f63a59f9cbd3e220b29
 
IA-32:
system-config-lvm-1.1.5-13.el5.noarch.rpm
File outdated by:  RHBA-2013:1347
    MD5: 041c71ca860830b8f50e9ff90fab64bd
SHA-256: b093aa6c220130d9e4c24ac85eb375b909c99b0bf5b02a1626ba342e54ee7e46
 
x86_64:
system-config-lvm-1.1.5-13.el5.noarch.rpm
File outdated by:  RHBA-2013:1347
    MD5: 041c71ca860830b8f50e9ff90fab64bd
SHA-256: b093aa6c220130d9e4c24ac85eb375b909c99b0bf5b02a1626ba342e54ee7e46
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

700253 - disk initialization fails



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/