Skip to navigation

Bug Fix Advisory gawk bug fix update

Advisory: RHBA-2012:0738-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated gawk packages that fix one bug are now available for Red Hat Enterprise
Linux 5.

Problem Description:
The gawk package contains the GNU version of awk, a text processing utility. Awk
interprets a special-purpose programming language to do quick and easy text
pattern matching and reformatting jobs.

This update fixes the following bug:

* Prior to this update, the "re_string_skip_chars" function incorrectly used the
character count instead of the raw length to estimate the string length. As a
consequence, text in multi-byte encoding that did not use the UTF-8 format
failed to be processed correctly. This update modifies the underlying code so
that the correct string length is used. multi-byte encoding is processed
correctly. (BZ#827372)

All users of gawk requiring multi-byte encodings that do not use UTF-8 are
advised to upgrade to these updated packages, which fix this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
gawk-3.1.5-16.el5.src.rpm     MD5: 59a222810b1f851aae4c472e02874354
SHA-256: 3536fa784ff4c825a64c0673509c6e62c13aa19729069ce617afa5da3176a3ac
 
IA-32:
gawk-3.1.5-16.el5.i386.rpm     MD5: 6290d42c1cd6306d3cb33333ce90558c
SHA-256: a7bed4ce52bc0a6fa97f977b67d1ea23c5c50606fd6e4511f988044eaf957a8e
gawk-debuginfo-3.1.5-16.el5.i386.rpm     MD5: ae2e2275c10232ad1e5f5d2bce91ad9d
SHA-256: b8801ab55783729f8a07b6d31941eb2c834c71b61c0fe5096a6b8a9cb5449188
 
IA-64:
gawk-3.1.5-16.el5.ia64.rpm     MD5: 4ede39fbdc72ff5be6d876783277f220
SHA-256: 069ec1a14125d00763ee100a07f475293b669b7d99ad164698e12fe7984c0aa2
gawk-debuginfo-3.1.5-16.el5.ia64.rpm     MD5: e57c1d81f57fb8ab88f60d3e3d659c99
SHA-256: 1d10a5c8b439eb6a9a8aa6fd67963bde10284d62e44f2674f99c73b4627c68db
 
PPC:
gawk-3.1.5-16.el5.ppc.rpm     MD5: 84a892816c416ad731107fa142c31ae6
SHA-256: 67ebcbb133e62d5879ae562b77caac01b7bf0cb71b75aafc2c1a04b2bdc6d311
gawk-debuginfo-3.1.5-16.el5.ppc.rpm     MD5: 3c9c0aff2d7d03f445f290f3eb26aebe
SHA-256: 090db08554bbf413230e037c597b8f31c5ffae5209490f0b554a79dd58d43fd2
 
s390x:
gawk-3.1.5-16.el5.s390x.rpm     MD5: da999176d60a62afb15343ca6da50771
SHA-256: 1aa33f8784b8b9b346ae66aececea457c8073246e2580129e914ef8c7607d961
gawk-debuginfo-3.1.5-16.el5.s390x.rpm     MD5: 2361cbb92d53956cf9fa006ce088d948
SHA-256: 337b77d8c11ffe94f4b2fe67406510f6e1ffcec47e75482932f54223601ceef8
 
x86_64:
gawk-3.1.5-16.el5.x86_64.rpm     MD5: e951b1f8ef29b35bf1a43f53d2abfac0
SHA-256: 03175d82e5c20a77296daff261779da66aea5c4e277cf9b58008482479cf5a63
gawk-debuginfo-3.1.5-16.el5.x86_64.rpm     MD5: 2e966bb3d385ef32bbe33db6fa88762d
SHA-256: a71d088aa7796eadb69f47e8c3032f668165bdbae436a0d5559a86cceba522e8
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
gawk-3.1.5-16.el5.src.rpm     MD5: 59a222810b1f851aae4c472e02874354
SHA-256: 3536fa784ff4c825a64c0673509c6e62c13aa19729069ce617afa5da3176a3ac
 
IA-32:
gawk-3.1.5-16.el5.i386.rpm     MD5: 6290d42c1cd6306d3cb33333ce90558c
SHA-256: a7bed4ce52bc0a6fa97f977b67d1ea23c5c50606fd6e4511f988044eaf957a8e
gawk-debuginfo-3.1.5-16.el5.i386.rpm     MD5: ae2e2275c10232ad1e5f5d2bce91ad9d
SHA-256: b8801ab55783729f8a07b6d31941eb2c834c71b61c0fe5096a6b8a9cb5449188
 
x86_64:
gawk-3.1.5-16.el5.x86_64.rpm     MD5: e951b1f8ef29b35bf1a43f53d2abfac0
SHA-256: 03175d82e5c20a77296daff261779da66aea5c4e277cf9b58008482479cf5a63
gawk-debuginfo-3.1.5-16.el5.x86_64.rpm     MD5: 2e966bb3d385ef32bbe33db6fa88762d
SHA-256: a71d088aa7796eadb69f47e8c3032f668165bdbae436a0d5559a86cceba522e8
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/