Skip to navigation

Bug Fix Advisory gfs-utils bug fix update

Advisory: RHBA-2013:0095-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: RHEL Cluster-Storage (v. 5 server)

Details

Updated gfs-utils packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

The gfs-utils packages provide various user-space tools necessary to mount,
create, maintain, and test Global File Systems (GFS).

This update fixes the following bug:

* Prior to this update, the gfs_fsck file system checker failed to detect "bad
indirect block pointer" corruptions due to incorrect error paths. This update
modifies the gfs_fsck error paths. Now, gfs_fsck detects and repairs corruptions
as expected. (BZ#788694)

All users of gfs-utils are advised to upgrade to these updated packages, which
fix this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Cluster-Storage (v. 5 server)

SRPMS:
gfs-utils-0.1.20-14.el5.src.rpm     MD5: b6db039771ac6387324aef198f71ac60
SHA-256: 61be47b0f55369704016e5b92c838c65e3db2ba0461b9505040b29fcb34f920d
 
IA-32:
gfs-utils-0.1.20-14.el5.i386.rpm     MD5: 6ca157c97c72f0cb11fd7a5f2514e2b1
SHA-256: 755a06bed965578eecfa43af26705c4be794a10a5548e5734181acc25c28929f
gfs-utils-debuginfo-0.1.20-14.el5.i386.rpm     MD5: 4cbc01ce8b38e044767e0cff5223d032
SHA-256: 294ba1742cf331c9028dab44f4537542a7999de756bcdce034b7e925a2c38bbe
 
IA-64:
gfs-utils-0.1.20-14.el5.ia64.rpm     MD5: 61193ba6299ca588a0a528d7537e770b
SHA-256: cb609cd8930bc4245e9c9113233e50ea2fc1225561fdefcdbdb6d3aa77138a5c
gfs-utils-debuginfo-0.1.20-14.el5.ia64.rpm     MD5: 338034bdff90963040b00e0fa3f7187e
SHA-256: 8908166bd0c1464e5c87dd5d32fc48f5f3b9f9556c8b6f22cfff716d582ad4d1
 
PPC:
gfs-utils-0.1.20-14.el5.ppc.rpm     MD5: 55faca92a1b6bbe01186b5debd01a638
SHA-256: d8520442c55ec88cf40c0c8c1e13a24de314a72afdefbbd121082e441afd1464
gfs-utils-debuginfo-0.1.20-14.el5.ppc.rpm     MD5: 12a112d9e4fad2a3575e6e01f7069b7d
SHA-256: b63d136c49c02dca13402ed4124c29dfe6f0061f1468cf5b2fe3026ffcfdfafc
 
x86_64:
gfs-utils-0.1.20-14.el5.x86_64.rpm     MD5: a9cdd74f9b7f9e021d87b432a0d818a1
SHA-256: 9a521b3a245c2401c1bb1aec4868ffb6940a37a07a63b2f6c69cb42d0a1d2de0
gfs-utils-debuginfo-0.1.20-14.el5.x86_64.rpm     MD5: a631f60d00d9eadeb38837a5deb11350
SHA-256: a50d4cbf1d1627eeaa0d2176dcc718469b8114b514459492859e05b2f33f8532
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/