Skip to navigation

Bug Fix Advisory gfs2-utils bug fix update

Advisory: RHBA-2013:0079-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated gfs2-utils packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

The gfs2-utils packages provide the user-space utilities necessary to mount,
create, maintain and test GFS2 file systems.

This update fixes the following bug:

* Prior to this update, an overly long cluster name in /etc/cluster/cluster.conf
could cause a buffer overflow when running fsck.gfs2 on a GFS2 file system with
a corrupt super block. This update modifies the underlying code to to ensure
that the cluster name is truncated appropriately when the super block is being
rebuilt. Now, this buffer overflow condition is prevented. (BZ#838910)

All users of gfs2-utils are advised to upgrade to these updated packages, which
fix this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
gfs2-utils-0.1.62-35.el5.src.rpm
File outdated by:  RHBA-2013:1339
    MD5: e1350f252e2165f45babe6b96259e0af
SHA-256: 04c486f91465b8424be8bd8ff260700f8bd24846ebfecc1a381236fb4efb7752
 
IA-32:
gfs2-utils-0.1.62-35.el5.i386.rpm
File outdated by:  RHBA-2013:1339
    MD5: 35b79676dfe7af24badb47660af1222c
SHA-256: dbfef1332c667d77f9bfb5d1b28989277c8e9bd5df4f9596fc13629b773367e2
gfs2-utils-debuginfo-0.1.62-35.el5.i386.rpm
File outdated by:  RHBA-2013:1339
    MD5: 192f5fddd8acc73a2349f8f4c1f98bbe
SHA-256: 095aa76c8a71e0e4ee17084943aeec446b696a9703c182ba74e5b530ae124d00
 
IA-64:
gfs2-utils-0.1.62-35.el5.ia64.rpm
File outdated by:  RHBA-2013:1339
    MD5: 77e69cff5e3823970449016175364523
SHA-256: f9b8b554c6769c580730f41ccd0c42a02609520593c3c0ff21926b05f600ca67
gfs2-utils-debuginfo-0.1.62-35.el5.ia64.rpm
File outdated by:  RHBA-2013:1339
    MD5: 3e555074f2c68b9c42bcc4fd57959eba
SHA-256: 233ab86f24795e2e89353ae2f15f7fdfa126e5bd073a90805ceb648a204cc342
 
PPC:
gfs2-utils-0.1.62-35.el5.ppc.rpm
File outdated by:  RHBA-2013:1339
    MD5: ab3ea4dd6d3ba1441acc9c967fa6be32
SHA-256: fe8b830a41e14fe13a75b21af8a0cc2929e42354303f4ed0a99c3f11ee892f52
gfs2-utils-debuginfo-0.1.62-35.el5.ppc.rpm
File outdated by:  RHBA-2013:1339
    MD5: 1b7080dcdfeb8fd6b4f4354088814f2d
SHA-256: b8ef19ced8178e6969e8ea0411dc25ed21ae9ed44152f4500a81155b82c6ed52
 
x86_64:
gfs2-utils-0.1.62-35.el5.x86_64.rpm
File outdated by:  RHBA-2013:1339
    MD5: b760290172b840deddd90f3c99b3d759
SHA-256: 03d38039c137d4664ffefd89649b8673e60b214f5ec1b22df9f87d4c77d82807
gfs2-utils-debuginfo-0.1.62-35.el5.x86_64.rpm
File outdated by:  RHBA-2013:1339
    MD5: 007268b27b021160e2ea8ac552465a27
SHA-256: 0e2175d1e9eedb616cc0af3bfbfbb8a0c778e511b3b688a5b22ad593dca1b665
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
gfs2-utils-0.1.62-35.el5.src.rpm
File outdated by:  RHBA-2013:1339
    MD5: e1350f252e2165f45babe6b96259e0af
SHA-256: 04c486f91465b8424be8bd8ff260700f8bd24846ebfecc1a381236fb4efb7752
 
IA-32:
gfs2-utils-0.1.62-35.el5.i386.rpm
File outdated by:  RHBA-2013:1339
    MD5: 35b79676dfe7af24badb47660af1222c
SHA-256: dbfef1332c667d77f9bfb5d1b28989277c8e9bd5df4f9596fc13629b773367e2
gfs2-utils-debuginfo-0.1.62-35.el5.i386.rpm
File outdated by:  RHBA-2013:1339
    MD5: 192f5fddd8acc73a2349f8f4c1f98bbe
SHA-256: 095aa76c8a71e0e4ee17084943aeec446b696a9703c182ba74e5b530ae124d00
 
x86_64:
gfs2-utils-0.1.62-35.el5.x86_64.rpm
File outdated by:  RHBA-2013:1339
    MD5: b760290172b840deddd90f3c99b3d759
SHA-256: 03d38039c137d4664ffefd89649b8673e60b214f5ec1b22df9f87d4c77d82807
gfs2-utils-debuginfo-0.1.62-35.el5.x86_64.rpm
File outdated by:  RHBA-2013:1339
    MD5: 007268b27b021160e2ea8ac552465a27
SHA-256: 0e2175d1e9eedb616cc0af3bfbfbb8a0c778e511b3b688a5b22ad593dca1b665
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

838910 - fsck.gfs2: Buffer overflow when cluster name is too long



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/