---

Red Hat Bug Fix Advisory: sharutils

Date: Mon, 3 Jan 2000 12:11:17 -0500 (EST)
From: Preston Brown pbrown@redhat.com
To: redhat-watch-list@redhat.com


Red Hat, Inc. Bug Fix Advisory

Component: sharutils
Synopsis: Y2K compliant sharutils available
Advisory ID: RHBA-1999:063-02
Issue date: 1999-12-30
Updated on: 2000-01-03
Keywords: sharutils touch y2k uudecode spaces
Cross references: N-A


1. Topic:

Sharutils as shipped with all previous releases of Red Hat Linux
may have problems with creating new shell archives because it
assumed a two digit format for the year. This bug fix corrects the
problem for all releases and architectures.

(2000-01-03) Packages properly GPG signed and MD5 sums updated.
The maintainer of sharutils has also reported that any date-related
issues in sharutils 4.2 are minor, and so this bug fix is not
mandatory.

2. Relevant releases/architectures:

Red Hat Linux 4.x – i386 alpha sparc
Red Hat Linux 5.x – i386 alpha sparc
Red Hat Linux 6.x – i386 alpha sparc

3. Problem description:

Sharutils 4.2 and earlier used a two digit formatting routine
for years in shar.c (the source code for the program to create
shell
archives). In addition, uudecode could not handle encoded filenames
that contained spaces.

4. Solution:

Version 4.2.1 of sharutils corrects all known Y2K issues and has
been thoroughly audited for undiscovered problems. All other known
problems with sharutils are fixed as well.

5. Bug IDs fixed (http://bugzilla.redhat.com/bugzilla
for more info):

5971 – Filenames with spaces are truncated by uudecode
7435 – sharutils.mo should be in
/usr/share/locale/ja/LC_MESSAGES/

6. Obsoleted by:

N-A

7. Conflicts with:

N-A

8. RPMs required:

Red Hat Linux 4.x:

Intel:
ftp://updates.redhat.com/4.2/i386/sharutils-4.2.1-1.4.2.i386.rpm

Alpha:

ftp://updates.redhat.com/4.2/alpha/sharutils-4.2.1-1.4.2.alpha.rpm

Sparc:

ftp://updates.redhat.com/4.2/sparc/sharutils-4.2.1-1.4.2.sparc.rpm

Source packages:
ftp://updates.redhat.com/4.2/SRPMS/sharutils-4.2.1-1.4.2.src.rpm

Red Hat Linux 5.x:

Intel:
ftp://updates.redhat.com/5.2/i386/sharutils-4.2.1-1.5.2.i386.rpm

Alpha:

ftp://updates.redhat.com/5.2/alpha/sharutils-4.2.1-1.5.2.alpha.rpm

Sparc:

ftp://updates.redhat.com/5.2/sparc/sharutils-4.2.1-1.5.2.sparc.rpm

Source packages:
ftp://updates.redhat.com/5.2/SRPMS/sharutils-4.2.1-1.5.2.src.rpm

Red Hat Linux 6.x:

Intel:
ftp://updates.redhat.com/6.1/i386/sharutils-4.2.1-1.6.1.i386.rpm

Alpha:

ftp://updates.redhat.com/6.1/alpha/sharutils-4.2.1-1.6.1.alpha.rpm

Sparc:

ftp://updates.redhat.com/6.1/sparc/sharutils-4.2.1-1.6.1.sparc.rpm

Source packages:
ftp://updates.redhat.com/6.1/SRPMS/sharutils-4.2.1-1.6.1.src.rpm

9. Verification:

MD5 sum                           Package Name

f506241d54344ad15f062da3fdf32a00 i386/sharutils-4.2.1-1.4.2.i386.rpm
d9425ab5dba02927be2a417d8ce4653c alpha/sharutils-4.2.1-1.4.2.alpha.rpm
e8337d0ffb534a30880df4503fabcdd4 sparc/sharutils-4.2.1-1.4.2.sparc.rpm
47a7cb22ba36b3cfd11d1dd3261769c4 SRPMS/sharutils-4.2.1-1.4.2.src.rpm

bdf5e04619cb8ab814c75579d86632a3 i386/sharutils-4.2.1-1.5.2.i386.rpm
3c82acfb7250c2f69dfebaff02560864 alpha/sharutils-4.2.1-1.5.2.alpha.rpm
6ec89f455ffca64d072428754374c684 sparc/sharutils-4.2.1-1.5.2.sparc.rpm
7e776fe2ac0849d187de427d3ee240b5 SRPMS/sharutils-4.2.1-1.5.2.src.rpm

f950fe244105a350d77dc5e8df0f3fc8 i386/sharutils-4.2.1-1.6.1.i386.rpm
194e00e2961159398fa6fe2d80a39407 alpha/sharutils-4.2.1-1.6.1.alpha.rpm
6e7a0aff9a601cd983c2ca56842ef800 sparc/sharutils-4.2.1-1.6.1.sparc.rpm
c2ebe34ee1112979dae88ec4b222c51d SRPMS/sharutils-4.2.1-1.6.1.src.rpm

These packages are GPG signed by Red Hat, Inc. for security. Our
key is available at:
http://www.redhat.com/corp/contact.html

You can verify each package with the following command:
rpm –checksig

If you only wish to verify that each package has not been
corrupted or tampered with, examine only the md5sum with the
following command:
rpm –checksig –nogpg

10. References:

http://www.gnu.org/software/year2000-list.html


Preston Brown
Red Hat, Inc.
pbrown@redhat.com

Get the Free Newsletter!

Subscribe to Developer Insider for top news, trends, & analysis