Skip to navigation

Bug Fix Advisory cscope bug fix update

Advisory: RHBA-2012:1137-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)

Details

Updated cscope packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

The cscope packages contain ncurses-based C source code tree browsing tool which
allows users to search large source code bases for variables, functions, macros,
as well as perform general regex and plain text searches. Results are returned
in lists, from which the user can select individual matches for use in file
editing.

This update fixes the following bug:

* Previously, the spec file contained the %{dist} tag on the "Release" line. To
comply with the packaging and naming guidelines, the tag has been changed to
%{?dist} with this update. (BZ#440628)

All users of cscope are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
cscope-15.5-20.el5.src.rpm     MD5: 5b20a4f3cdd258b8a14817073093299c
SHA-256: 7ec9171cb35d0f32107093779cc482ac6192762dd093989bbed145ec9de39258
 
IA-32:
cscope-15.5-20.el5.i386.rpm     MD5: afa3639fe1b1b6c0dea172c34daa9459
SHA-256: 27b125e8f9bda2efb06eb5b5b9ab38dec527e5ef401c7e8a82672d029662cf78
cscope-debuginfo-15.5-20.el5.i386.rpm     MD5: bbc7ac02b27d89d0785c0696d1046a91
SHA-256: fd425d4b332e6108a5a58dc2705c59abe4280beaca446b01b3fc8b8c98149501
 
x86_64:
cscope-15.5-20.el5.x86_64.rpm     MD5: 2e5c4b575428563709abc1e84119c561
SHA-256: a2bad3a0bcad2e365f9b6bbde5e6a3f338279d11ec109ff844a47425cc8d8eca
cscope-debuginfo-15.5-20.el5.x86_64.rpm     MD5: 9fd59f4e534886ba121be2f0f00d9369
SHA-256: e80df1f26621f1c6cb2d44ba59288e4403b2b612e2fac7bb273c53840c871b9f
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
cscope-15.5-20.el5.src.rpm     MD5: 5b20a4f3cdd258b8a14817073093299c
SHA-256: 7ec9171cb35d0f32107093779cc482ac6192762dd093989bbed145ec9de39258
 
IA-32:
cscope-15.5-20.el5.i386.rpm     MD5: afa3639fe1b1b6c0dea172c34daa9459
SHA-256: 27b125e8f9bda2efb06eb5b5b9ab38dec527e5ef401c7e8a82672d029662cf78
cscope-debuginfo-15.5-20.el5.i386.rpm     MD5: bbc7ac02b27d89d0785c0696d1046a91
SHA-256: fd425d4b332e6108a5a58dc2705c59abe4280beaca446b01b3fc8b8c98149501
 
IA-64:
cscope-15.5-20.el5.ia64.rpm     MD5: c4339c2a7a09df241ca62ce201638cdb
SHA-256: e8820604bccca79ec4c41b296bbc56e506448afd3693841a12dfb932e59faf8f
cscope-debuginfo-15.5-20.el5.ia64.rpm     MD5: f120fc4b305fdc4ccd2ee3a7866509ce
SHA-256: f1e2cf8e0b573abb0bc5bf8bbc4c077d9dee2d263cbe69a381792f613ab97961
 
PPC:
cscope-15.5-20.el5.ppc.rpm     MD5: b2e76fbb7b250e9fc90761cf4aee83b7
SHA-256: f0732232220b31597177080adfa2e3e1d81035540a1a0bfabe39d21476d6630e
cscope-debuginfo-15.5-20.el5.ppc.rpm     MD5: 36793c799097bccc4952151364ab7ce2
SHA-256: 32d1a40912dc6887873491b67f2455cf210bf321b4fddd1e855826f805110f11
 
s390x:
cscope-15.5-20.el5.s390x.rpm     MD5: 4f4fd2b6668ebaa99c07cfe454cb898f
SHA-256: e7d16c70f8f36fc791d6b6357e41dfdeb4e7c4960cc23f24da1a5d912b715d61
cscope-debuginfo-15.5-20.el5.s390x.rpm     MD5: 3721a9c3e88bb180fc9157da16814c40
SHA-256: 1f63b516c499581b2c46491b4911ba184ec686c4dfbfdc434a1570f0eddf9987
 
x86_64:
cscope-15.5-20.el5.x86_64.rpm     MD5: 2e5c4b575428563709abc1e84119c561
SHA-256: a2bad3a0bcad2e365f9b6bbde5e6a3f338279d11ec109ff844a47425cc8d8eca
cscope-debuginfo-15.5-20.el5.x86_64.rpm     MD5: 9fd59f4e534886ba121be2f0f00d9369
SHA-256: e80df1f26621f1c6cb2d44ba59288e4403b2b612e2fac7bb273c53840c871b9f
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

440628 - there should be %{?dist} instead of %{dist} in the *.spec on the Release: line



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/