Bug Fix Advisory psmisc bug fix update

Advisory: RHBA-2014:0199-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2014-02-24
Last updated on: 2014-02-24
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.5)
Red Hat Enterprise Linux Server EUS (v. 6.5.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated psmisc packages that fix one bug are now available for Red Hat
Enterprise Linux 6.

The psmisc packages contain utilities for managing processes on your system:
pstree, killall, fuser, and peekfd. The pstree command displays a tree structure
of all of the running processes on your system. The killall command sends a
specified signal (SIGTERM if nothing is specified) to processes identified by
name. The fuser command identifies the PIDs of processes that are using
specified files or file systems. The peekfd command attaches to a running
process and intercepts all reads and writes to file descriptors.

This update fixes the following bug:

* Previously, the fuser utility did not expect process IDs to have more than 5
digits. As a consequence, IDs longer than 5 digits were concatenated with the
previously printed process IDs due to a missing space separator. With this
update, all IDs are properly separated with one or more space characters, thus
fixing the bug. (BZ#1058421)

Users of psmisc are advised to upgrade to these updated packages, which fix this
bug.


Solution

Before applying this update, make sure all previously released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
psmisc-22.6-19.el6_5.src.rpm     MD5: 919c2661fac9c3eebaf8315f5b997989
SHA-256: bd140d126545ca6a2987c69acf4c4175dd27abbd80f0f813222be234a538eeeb
 
IA-32:
psmisc-22.6-19.el6_5.i686.rpm     MD5: 2deaa788310737c8e73617ddbc46271b
SHA-256: b079d80474265dd8b83863191c877eca3da5cd03bd91f4d9da27ff7f4aef224a
psmisc-debuginfo-22.6-19.el6_5.i686.rpm     MD5: 89dcb364be7eb9e8b5b1979f2dc9930e
SHA-256: b00b3b3a3a399b41d349a58a7aba81bf65c60997698390dffa4989b0c610faea
 
x86_64:
psmisc-22.6-19.el6_5.x86_64.rpm     MD5: 94205089fde1a3c38ee275c3caddfd68
SHA-256: c2d0a370cd3d92938c14bfcb351d6c02292d343027d457a0414dd40b2f0bf5eb
psmisc-debuginfo-22.6-19.el6_5.x86_64.rpm     MD5: 5ecd90cb80142bee8661d065fe73759e
SHA-256: 93c9fa22a03d609da1e89a45d448847d8b808a8919feb046de642c1bbbc591cd
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
psmisc-22.6-19.el6_5.src.rpm     MD5: 919c2661fac9c3eebaf8315f5b997989
SHA-256: bd140d126545ca6a2987c69acf4c4175dd27abbd80f0f813222be234a538eeeb
 
x86_64:
psmisc-22.6-19.el6_5.x86_64.rpm     MD5: 94205089fde1a3c38ee275c3caddfd68
SHA-256: c2d0a370cd3d92938c14bfcb351d6c02292d343027d457a0414dd40b2f0bf5eb
psmisc-debuginfo-22.6-19.el6_5.x86_64.rpm     MD5: 5ecd90cb80142bee8661d065fe73759e
SHA-256: 93c9fa22a03d609da1e89a45d448847d8b808a8919feb046de642c1bbbc591cd
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
psmisc-22.6-19.el6_5.src.rpm     MD5: 919c2661fac9c3eebaf8315f5b997989
SHA-256: bd140d126545ca6a2987c69acf4c4175dd27abbd80f0f813222be234a538eeeb
 
IA-32:
psmisc-22.6-19.el6_5.i686.rpm     MD5: 2deaa788310737c8e73617ddbc46271b
SHA-256: b079d80474265dd8b83863191c877eca3da5cd03bd91f4d9da27ff7f4aef224a
psmisc-debuginfo-22.6-19.el6_5.i686.rpm     MD5: 89dcb364be7eb9e8b5b1979f2dc9930e
SHA-256: b00b3b3a3a399b41d349a58a7aba81bf65c60997698390dffa4989b0c610faea
 
PPC:
psmisc-22.6-19.el6_5.ppc64.rpm     MD5: ae211f9f5344b042bd7c5e4f0e1fb8f8
SHA-256: 551e9337e809118d0ad2f95f24607a621d628438cfdbb04086c8f4e1f2c41400
psmisc-debuginfo-22.6-19.el6_5.ppc64.rpm     MD5: 4cf823887aa358ad72c941fc5327cfc7
SHA-256: bac85f420a27b779b497222a558c531f00aa2d4375ae94d4e2f05e5c911783a2
 
s390x:
psmisc-22.6-19.el6_5.s390x.rpm     MD5: a51fd5e956029bc4d94664ada5c8f52a
SHA-256: b67289906f927b266360bb841571751c117e249bb67f3b6568056a5f4b405d42
psmisc-debuginfo-22.6-19.el6_5.s390x.rpm     MD5: db94a4cdda2fe8ebbc6dc41f8f8b9194
SHA-256: 78bf176ec47ed52755e0e67e2895f65cce8d0d274d276b2c4216d196ec5de961
 
x86_64:
psmisc-22.6-19.el6_5.x86_64.rpm     MD5: 94205089fde1a3c38ee275c3caddfd68
SHA-256: c2d0a370cd3d92938c14bfcb351d6c02292d343027d457a0414dd40b2f0bf5eb
psmisc-debuginfo-22.6-19.el6_5.x86_64.rpm     MD5: 5ecd90cb80142bee8661d065fe73759e
SHA-256: 93c9fa22a03d609da1e89a45d448847d8b808a8919feb046de642c1bbbc591cd
 
Red Hat Enterprise Linux Server AUS (v. 6.5)

SRPMS:
psmisc-22.6-19.el6_5.src.rpm     MD5: 919c2661fac9c3eebaf8315f5b997989
SHA-256: bd140d126545ca6a2987c69acf4c4175dd27abbd80f0f813222be234a538eeeb
 
x86_64:
psmisc-22.6-19.el6_5.x86_64.rpm     MD5: 94205089fde1a3c38ee275c3caddfd68
SHA-256: c2d0a370cd3d92938c14bfcb351d6c02292d343027d457a0414dd40b2f0bf5eb
psmisc-debuginfo-22.6-19.el6_5.x86_64.rpm     MD5: 5ecd90cb80142bee8661d065fe73759e
SHA-256: 93c9fa22a03d609da1e89a45d448847d8b808a8919feb046de642c1bbbc591cd
 
Red Hat Enterprise Linux Server EUS (v. 6.5.z)

SRPMS:
psmisc-22.6-19.el6_5.src.rpm     MD5: 919c2661fac9c3eebaf8315f5b997989
SHA-256: bd140d126545ca6a2987c69acf4c4175dd27abbd80f0f813222be234a538eeeb
 
IA-32:
psmisc-22.6-19.el6_5.i686.rpm     MD5: 2deaa788310737c8e73617ddbc46271b
SHA-256: b079d80474265dd8b83863191c877eca3da5cd03bd91f4d9da27ff7f4aef224a
psmisc-debuginfo-22.6-19.el6_5.i686.rpm     MD5: 89dcb364be7eb9e8b5b1979f2dc9930e
SHA-256: b00b3b3a3a399b41d349a58a7aba81bf65c60997698390dffa4989b0c610faea
 
PPC:
psmisc-22.6-19.el6_5.ppc64.rpm     MD5: ae211f9f5344b042bd7c5e4f0e1fb8f8
SHA-256: 551e9337e809118d0ad2f95f24607a621d628438cfdbb04086c8f4e1f2c41400
psmisc-debuginfo-22.6-19.el6_5.ppc64.rpm     MD5: 4cf823887aa358ad72c941fc5327cfc7
SHA-256: bac85f420a27b779b497222a558c531f00aa2d4375ae94d4e2f05e5c911783a2
 
s390x:
psmisc-22.6-19.el6_5.s390x.rpm     MD5: a51fd5e956029bc4d94664ada5c8f52a
SHA-256: b67289906f927b266360bb841571751c117e249bb67f3b6568056a5f4b405d42
psmisc-debuginfo-22.6-19.el6_5.s390x.rpm     MD5: db94a4cdda2fe8ebbc6dc41f8f8b9194
SHA-256: 78bf176ec47ed52755e0e67e2895f65cce8d0d274d276b2c4216d196ec5de961
 
x86_64:
psmisc-22.6-19.el6_5.x86_64.rpm     MD5: 94205089fde1a3c38ee275c3caddfd68
SHA-256: c2d0a370cd3d92938c14bfcb351d6c02292d343027d457a0414dd40b2f0bf5eb
psmisc-debuginfo-22.6-19.el6_5.x86_64.rpm     MD5: 5ecd90cb80142bee8661d065fe73759e
SHA-256: 93c9fa22a03d609da1e89a45d448847d8b808a8919feb046de642c1bbbc591cd
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
psmisc-22.6-19.el6_5.src.rpm     MD5: 919c2661fac9c3eebaf8315f5b997989
SHA-256: bd140d126545ca6a2987c69acf4c4175dd27abbd80f0f813222be234a538eeeb
 
IA-32:
psmisc-22.6-19.el6_5.i686.rpm     MD5: 2deaa788310737c8e73617ddbc46271b
SHA-256: b079d80474265dd8b83863191c877eca3da5cd03bd91f4d9da27ff7f4aef224a
psmisc-debuginfo-22.6-19.el6_5.i686.rpm     MD5: 89dcb364be7eb9e8b5b1979f2dc9930e
SHA-256: b00b3b3a3a399b41d349a58a7aba81bf65c60997698390dffa4989b0c610faea
 
x86_64:
psmisc-22.6-19.el6_5.x86_64.rpm     MD5: 94205089fde1a3c38ee275c3caddfd68
SHA-256: c2d0a370cd3d92938c14bfcb351d6c02292d343027d457a0414dd40b2f0bf5eb
psmisc-debuginfo-22.6-19.el6_5.x86_64.rpm     MD5: 5ecd90cb80142bee8661d065fe73759e
SHA-256: 93c9fa22a03d609da1e89a45d448847d8b808a8919feb046de642c1bbbc591cd
 
(The unlinked packages above are only available from the Red Hat Network)

Keywords

killall, peekfd, psmisc


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/