Date: Thu, 30 Dec 1999 11:50:29 -0500 (EST)
From: Preston Brown <pbrown@redhat.com>
To: redhat-watch-list@redhat.com
Subject: RHBA-1999:063-01: Y2K compliant sharutils available
---------------------------------------------------------------------
Red Hat, Inc. Bug Fix Advisory
Synopsis: Y2K compliant sharutils available
Advisory ID: RHBA-1999:063-01
Issue date: 1999-12-30
Updated on: 1999-12-30
Keywords: sharutils touch y2k uudecode spaces
Cross references: N-A
---------------------------------------------------------------------
1. Topic:
Sharutils as shipped with all previous releases of Red Hat Linux may
have problems with creating new shell archives because it assumed a
two digit format for the year. This bug fix corrects the problem for
all releases and architectures.
2. Relevant releases/architectures:
Red Hat Linux 4.x - i386 alpha sparc
Red Hat Linux 5.x - i386 alpha sparc
Red Hat Linux 6.1 - i386 alpha sparc
3. Problem description:
Sharutils 4.2 and earlier used a two digit formatting routine for
years in shar.c (the source code for the program to create shell
archives). In addition, uudecode could not handle encoded filenames
that contained spaces.
4. Solution:
Version 4.2.1 of sharutils corrects all known Y2K issues and has been
thoroughly audited for undiscovered problems. All other known
problems with sharutils are fixed as well.
5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla for more info):
5971 - Filenames with spaces are truncated by uudecode
7435 - sharutils.mo should be in /usr/share/locale/ja/LC_MESSAGES/
6. Obsoleted by:
N-A
7. Conflicts with:
N-A
8. RPMs required:
Red Hat Linux 4.x:
Intel:
ftp://updates.redhat.com/4.2/i386/sharutils-4.2.1-1.4.2.i386.rpm
Alpha:
ftp://updates.redhat.com/4.2/alpha/sharutils-4.2.1-1.4.2.alpha.rpm
Sparc:
ftp://updates.redhat.com/4.2/sparc/sharutils-4.2.1-1.4.2.sparc.rpm
Source packages:
ftp://updates.redhat.com/4.2/SRPMS/sharutils-4.2.1-1.4.2.src.rpm
Red Hat Linux 5.x:
Intel:
ftp://updates.redhat.com/5.2/i386/sharutils-4.2.1-1.5.2.i386.rpm
Alpha:
ftp://updates.redhat.com/5.2/alpha/sharutils-4.2.1-1.5.2.alpha.rpm
Sparc:
ftp://updates.redhat.com/5.2/sparc/sharutils-4.2.1-1.5.2.sparc.rpm
Source packages:
ftp://updates.redhat.com/5.2/SRPMS/sharutils-4.2.1-1.5.2.src.rpm
Red Hat Linux 6.1:
Intel:
ftp://updates.redhat.com/6.1/i386/sharutils-4.2.1-1.6.1.i386.rpm
Alpha:
ftp://updates.redhat.com/6.1/alpha/sharutils-4.2.1-1.6.1.alpha.rpm
Sparc:
ftp://updates.redhat.com/6.1/sparc/sharutils-4.2.1-1.6.1.sparc.rpm
Source packages:
ftp://updates.redhat.com/6.1/SRPMS/sharutils-4.2.1-1.6.1.src.rpm
9. Verification:
MD5 sum Package Name
--------------------------------------------------------------------------
6e86baef0b23a2efdba4b1f5fb2b216b i386/sharutils-4.2.1-1.4.2.i386.rpm
618ce122850bc6b4006051c65026101e alpha/sharutils-4.2.1-1.4.2.alpha.rpm
ea706cfb7ca5964e5ecea579ea2fa8da sparc/sharutils-4.2.1-1.4.2.sparc.rpm
9ca7187d64055c84d0e44e832b9ee298 SRPMS/sharutils-4.2.1-1.4.2.src.rpm
2ced6b856e5dadd5fc53ea98aedc55ff i386/sharutils-4.2.1-1.5.2.i386.rpm
28e2afab7402978984944d26f1c5b427 alpha/sharutils-4.2.1-1.5.2.alpha.rpm
f596474b4802967acc746492db1c0f6c sparc/sharutils-4.2.1-1.5.2.sparc.rpm
ee220cd00a876fd366da528f128b947d SRPMS/sharutils-4.2.1-1.5.2.src.rpm
92d63b5dd1952a017523907f5c7dfca1 i386/sharutils-4.2.1-1.6.1.i386.rpm
2c6b0b9a10c0d451a179d903837ba6ae alpha/sharutils-4.2.1-1.6.1.alpha.rpm
56e27b5217c6a67bf18d23fc10827686 sparc/sharutils-4.2.1-1.6.1.sparc.rpm
deae8350e5b9bf245ceeb4b3f361fda5 SRPMS/sharutils-4.2.1-1.6.1.src.rpm
These packages are GPG signed by Red Hat, Inc. for security. Our key
is available at:
http://www.redhat.com/corp/contact.html
You can verify each package with the following command:
rpm --checksig
If you only wish to verify that each package has not been corrupted or
tampered with, examine only the md5sum with the following command:
rpm --checksig --nogpg
10. References:
http://www.gnu.org/software/year2000-list.html
---
Preston Brown
Red Hat, Inc.
pbrown@redhat.com
--
To unsubscribe: mail redhat-watch-list-request@redhat.com with
"unsubscribe" as the Subject.