Skip to navigation

Enhancement Advisory pcre enhancement update

Advisory: RHEA-2011:0022-1
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2011-01-12
Last updated on: 2011-01-12
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An enhanced pcre package is now available for Red Hat Enterprise Linux 5.

PCRE is a Perl-compatible regular expression library.

This updated pcre package adds the following enhancement:

* Unicode properties have been enabled to support \p{..}, \P{..}, and \X escape
sequences. (BZ#457064)

Users of pcre are advised to upgrade to this updated package, which adds this
enhancement.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red Hat
Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
pcre-6.6-6.el5.src.rpm
File outdated by:  RHBA-2013:1298
    MD5: e71122084d4d1b35f5e6baf06572218d
SHA-256: 3ba77ee98c67d0428c1764208f13c5966e9e1dee534d8ccf7d7b4fe68fae556f
 
IA-32:
pcre-devel-6.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:1298
    MD5: 3a3456655ccb823ca28a9e696cc398fe
SHA-256: 3c29706a704847639aa16ea2162011e2b4f5605ab5f145cfff781cc64eec6636
 
x86_64:
pcre-devel-6.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:1298
    MD5: 3a3456655ccb823ca28a9e696cc398fe
SHA-256: 3c29706a704847639aa16ea2162011e2b4f5605ab5f145cfff781cc64eec6636
pcre-devel-6.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:1298
    MD5: 65d952f499e015fb667cf64e21ebb68f
SHA-256: 01545ff473a875348490fd4cbe0474a957e84f12e326439f57e1fac3da5fccdd
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
pcre-6.6-6.el5.src.rpm
File outdated by:  RHBA-2013:1298
    MD5: e71122084d4d1b35f5e6baf06572218d
SHA-256: 3ba77ee98c67d0428c1764208f13c5966e9e1dee534d8ccf7d7b4fe68fae556f
 
IA-32:
pcre-6.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:1298
    MD5: 2e5670b8051d280bfeb577ccd817bb99
SHA-256: 8990d9ef142b1ad0fa54d57e1ad9724351a4d0a7a42b8ca7c38f22b97d685870
pcre-devel-6.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:1298
    MD5: 3a3456655ccb823ca28a9e696cc398fe
SHA-256: 3c29706a704847639aa16ea2162011e2b4f5605ab5f145cfff781cc64eec6636
 
IA-64:
pcre-6.6-6.el5.ia64.rpm
File outdated by:  RHBA-2013:1298
    MD5: 6b97fd8b312482a0238f4430b5e4f2e9
SHA-256: df32f43b52261e189d5ff102e362e06125de8e235ca3b5dda308122d8ace3a2d
pcre-devel-6.6-6.el5.ia64.rpm
File outdated by:  RHBA-2013:1298
    MD5: 51b9833f4e0607860af1fa89b4f69092
SHA-256: 1095ca7af006f04ea5e0c29518a8fdfecf4d982f3a7e0d48f12140f36dd03858
 
PPC:
pcre-6.6-6.el5.ppc.rpm
File outdated by:  RHBA-2013:1298
    MD5: 30255bd1fa64d1904b071abcd7e176ca
SHA-256: 2931c9da1adb615900c772ac090bfa563fa49c2fd10eea2a39bc3f366b6d4096
pcre-6.6-6.el5.ppc64.rpm
File outdated by:  RHBA-2013:1298
    MD5: 486774c31b195d1d77fda61bb7b8f7e9
SHA-256: 8d8ccf9daa0553c5f987b3c7f868e04d75510e4377666d8bfa7cfc8114fa2f89
pcre-devel-6.6-6.el5.ppc.rpm
File outdated by:  RHBA-2013:1298
    MD5: 28b83b5a414b0afdb6c737ef4699f5e8
SHA-256: be1bafbe12b51907de1da7a6c7e867f9ea0b2ef65909900036e65869a8f82de4
pcre-devel-6.6-6.el5.ppc64.rpm
File outdated by:  RHBA-2013:1298
    MD5: 60b2a68368bba9e94d156e6af600aade
SHA-256: 8976d31f22e5986bb6292310f26bac59172d2d8f2daf65afd8c244057d474ea5
 
s390x:
pcre-6.6-6.el5.s390.rpm
File outdated by:  RHBA-2013:1298
    MD5: aee3cf1d9565c4412eed645f32a6839f
SHA-256: db28b3a42cd4bb69b2a245e769631b6bf6a68b08a0536b8b068eb853389f2286
pcre-6.6-6.el5.s390x.rpm
File outdated by:  RHBA-2013:1298
    MD5: f904cb527fe209cafc9da36021aecb61
SHA-256: dfcb52bbbef55476746836cc58dfc3c12dd6558e4867fec23fcc1871333fa327
pcre-devel-6.6-6.el5.s390.rpm
File outdated by:  RHBA-2013:1298
    MD5: 5baa29fec88e3ae33ecf9220f6a5b071
SHA-256: f86360fbade4b3e43cb2bc494d43b72e4eed77e90d27ee2da93659752f2fbec8
pcre-devel-6.6-6.el5.s390x.rpm
File outdated by:  RHBA-2013:1298
    MD5: ecaef2d5a68ce08fb76f6c01937ea9cd
SHA-256: 781b60eaef7cebff5e437e8490b4a3f96edf8b2146dece76cf09f67876dc2b1e
 
x86_64:
pcre-6.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:1298
    MD5: 2e5670b8051d280bfeb577ccd817bb99
SHA-256: 8990d9ef142b1ad0fa54d57e1ad9724351a4d0a7a42b8ca7c38f22b97d685870
pcre-6.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:1298
    MD5: 42c1c9a395a5827bedf5e595489ef1de
SHA-256: 305062d7e9bc460fadd0b2b8a2c02214c66dcef87086841649c80e39642de89c
pcre-devel-6.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:1298
    MD5: 3a3456655ccb823ca28a9e696cc398fe
SHA-256: 3c29706a704847639aa16ea2162011e2b4f5605ab5f145cfff781cc64eec6636
pcre-devel-6.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:1298
    MD5: 65d952f499e015fb667cf64e21ebb68f
SHA-256: 01545ff473a875348490fd4cbe0474a957e84f12e326439f57e1fac3da5fccdd
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
pcre-6.6-6.el5.src.rpm
File outdated by:  RHBA-2013:1298
    MD5: e71122084d4d1b35f5e6baf06572218d
SHA-256: 3ba77ee98c67d0428c1764208f13c5966e9e1dee534d8ccf7d7b4fe68fae556f
 
IA-32:
pcre-6.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:1298
    MD5: 2e5670b8051d280bfeb577ccd817bb99
SHA-256: 8990d9ef142b1ad0fa54d57e1ad9724351a4d0a7a42b8ca7c38f22b97d685870
 
x86_64:
pcre-6.6-6.el5.i386.rpm
File outdated by:  RHBA-2013:1298
    MD5: 2e5670b8051d280bfeb577ccd817bb99
SHA-256: 8990d9ef142b1ad0fa54d57e1ad9724351a4d0a7a42b8ca7c38f22b97d685870
pcre-6.6-6.el5.x86_64.rpm
File outdated by:  RHBA-2013:1298
    MD5: 42c1c9a395a5827bedf5e595489ef1de
SHA-256: 305062d7e9bc460fadd0b2b8a2c02214c66dcef87086841649c80e39642de89c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

457064 - pcre is configured with no support for Unicode properties



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/