Bug Fix Advisory iotop bug fix update

Advisory: RHBA-2013:1719-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-11-20
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated iotop package that fixes several bugs is now available for Red Hat
Enterprise Linux 6.

The iotop package provides a program with a UI similar to the "top" utility. The
program watches input-output (I/O) usage information output by the Linux kernel
and displays a table of current I/O usage by processes on the system.

This update fixes the following bugs:

* Previously, the iotop utility terminated unexpectedly when it was run by a
non-root user. This was because a recently-applied patch in CVE-2011-2494 made
I/O statistics from the taskstats kernel subsystem accessible only to root
users, and iotop did not anticipate that its "taskstats" call could fail when
run by a non-root user. This update adds permission checks to iotop, and when
the user does not have the necessary permissions, iotop exits with an
explanation that root privileges are now required. (BZ#746240, BZ#908149)

* Previously, the iotop utility did not handle platform strings correctly.
Consequently, the iotop command could not show the I/O scheduling class and its
priority ("PRIO") column on 64-bit PowerPC systems properly. With this update,
the bug has been fixed so that the iotop command now shows the "PRIO" column on
64-bit PowerPC systems as expected. (BZ#826875)

* When an invalid locale was set, the iotop utility failed to start with the
following traceback error:

locale.Error: unsupported locale setting

With this update, the underlying source code has been modified. As a result,
when an invalid locale is set, the default locale is used instead and a warning
about this change is returned. (BZ#849559)

Users of iotop are advised to upgrade to this updated package, which fixes these
bugs.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
iotop-0.3.2-7.el6.src.rpm
File outdated by:  RHBA-2017:0726
    MD5: 774a3e4b0c9efbeeec108ff9db644700
SHA-256: de3bf87c671643f145b29d9cfb341604bb39ca0ad20d011f30ef8d12f162f24d
 
IA-32:
iotop-0.3.2-7.el6.noarch.rpm
File outdated by:  RHBA-2017:0726
    MD5: 80feb908bd18a0be878f31dbd830b2d6
SHA-256: 2dbc907b1708004568d18e9057d283cf8f1cf7e7e6fa41be1df44476cb4450f7
 
x86_64:
iotop-0.3.2-7.el6.noarch.rpm
File outdated by:  RHBA-2017:0726
    MD5: 80feb908bd18a0be878f31dbd830b2d6
SHA-256: 2dbc907b1708004568d18e9057d283cf8f1cf7e7e6fa41be1df44476cb4450f7
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
iotop-0.3.2-7.el6.src.rpm
File outdated by:  RHBA-2017:0726
    MD5: 774a3e4b0c9efbeeec108ff9db644700
SHA-256: de3bf87c671643f145b29d9cfb341604bb39ca0ad20d011f30ef8d12f162f24d
 
x86_64:
iotop-0.3.2-7.el6.noarch.rpm
File outdated by:  RHBA-2017:0726
    MD5: 80feb908bd18a0be878f31dbd830b2d6
SHA-256: 2dbc907b1708004568d18e9057d283cf8f1cf7e7e6fa41be1df44476cb4450f7
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
iotop-0.3.2-7.el6.src.rpm
File outdated by:  RHBA-2017:0726
    MD5: 774a3e4b0c9efbeeec108ff9db644700
SHA-256: de3bf87c671643f145b29d9cfb341604bb39ca0ad20d011f30ef8d12f162f24d
 
IA-32:
iotop-0.3.2-7.el6.noarch.rpm
File outdated by:  RHBA-2017:0726
    MD5: 80feb908bd18a0be878f31dbd830b2d6
SHA-256: 2dbc907b1708004568d18e9057d283cf8f1cf7e7e6fa41be1df44476cb4450f7
 
PPC:
iotop-0.3.2-7.el6.noarch.rpm
File outdated by:  RHBA-2017:0726
    MD5: 80feb908bd18a0be878f31dbd830b2d6
SHA-256: 2dbc907b1708004568d18e9057d283cf8f1cf7e7e6fa41be1df44476cb4450f7
 
s390x:
iotop-0.3.2-7.el6.noarch.rpm
File outdated by:  RHBA-2017:0726
    MD5: 80feb908bd18a0be878f31dbd830b2d6
SHA-256: 2dbc907b1708004568d18e9057d283cf8f1cf7e7e6fa41be1df44476cb4450f7
 
x86_64:
iotop-0.3.2-7.el6.noarch.rpm
File outdated by:  RHBA-2017:0726
    MD5: 80feb908bd18a0be878f31dbd830b2d6
SHA-256: 2dbc907b1708004568d18e9057d283cf8f1cf7e7e6fa41be1df44476cb4450f7
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
iotop-0.3.2-7.el6.src.rpm
File outdated by:  RHBA-2017:0726
    MD5: 774a3e4b0c9efbeeec108ff9db644700
SHA-256: de3bf87c671643f145b29d9cfb341604bb39ca0ad20d011f30ef8d12f162f24d
 
IA-32:
iotop-0.3.2-7.el6.noarch.rpm
File outdated by:  RHBA-2017:0726
    MD5: 80feb908bd18a0be878f31dbd830b2d6
SHA-256: 2dbc907b1708004568d18e9057d283cf8f1cf7e7e6fa41be1df44476cb4450f7
 
x86_64:
iotop-0.3.2-7.el6.noarch.rpm
File outdated by:  RHBA-2017:0726
    MD5: 80feb908bd18a0be878f31dbd830b2d6
SHA-256: 2dbc907b1708004568d18e9057d283cf8f1cf7e7e6fa41be1df44476cb4450f7
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

849559 - iotop fails to start with wrong locale



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/