Linux Today: Linux News On Internet Time.
Search Linux Today
Linux News Sections:  Developer -  High Performance -  Infrastructure -  IT Management -  Security -  Storage -
Linux Today Navigation
LT Home
Contribute
Contribute
Link to Us
Linux Jobs


Top White Papers

More on LinuxToday


Red Hat Errata Advisory: new e2fsprogs packages available

Oct 28, 1999, 18:51 (0 Talkback[s])

Date: Thu, 28 Oct 1999 12:19:37 -0400
From: Bill Nottingham
To: redhat-watch-list@redhat.com
Reply to: redhat-watch-list@redhat.com


Red Hat, Inc. Errata Advisory

Synopsis: new e2fsprogs packages available
Advisory ID: RHEA-1999:047-01
Issue date: 1999-10-28
Updated on: 1999-10-28
Keywords:
Cross references: e2fsprogs progress bar signal 10 SIGUSR1


1. Topic:

New e2fsprogs packages are available to fix a problem in the e2fsprogs packages that shipped with Red Hat Linux 6.1.

2. Problem description:

When displaying the progress bar for a filesystem check, it was possible for a SIGUSR1 to be sent to a e2fsck process that did not yet have a signal handler enabled, causing fsck to prematurely exit.

Thanks go to Ted Ts'o for providing a fix.

3. Bug IDs fixed (http://developer.redhat.com/bugzilla for more info):

5987 6279 6327

4. Relevant releases/architectures:

Red Hat Linux 6.1, Intel

5. Obsoleted by:

6. Conflicts with:

7. RPMs required:

Intel:
ftp://updates.redhat.com/6.1/i386/e2fsprogs-1.17-1.i386.rpm
ftp://updates.redhat.com/6.1/i386/e2fsprogs-devel-1.17-1.i386.rpm

Source packages:
ftp://updates.redhat.com/6.1/SRPMS/e2fsprogs-1.17-1.src.rpm

8. Solution:

For each RPM for your particular architecture, run:
rpm -Uvh
where filename is the name of the RPM.

9. Verification:

MD5 sum Package Name


c561a73148092270d5ac11e725338d49 e2fsprogs-1.17-1.src.rpm
4f583f4b9b427fbc1b33f9db1334b4c5 e2fsprogs-1.17-1.i386.rpm
420cfa9238e2de27abe7d297b482b37e e2fsprogs-devel-1.17-1.i386.rpm

These packages are GPG signed by Red Hat, Inc. for security. Our key is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm --checksig

If you only wish to verify that each package has not been corrupted or tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg


10. References:

--
To unsubscribe: mail redhat-watch-list-request@redhat.com with "unsubscribe" as the Subject.