- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2011:1443 - Bug Fix Advisory
Synopsis
mktemp bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated mktemp package that fixes one bug is now available for Red Hat
Enterprise Linux 5.
Description
The mktemp utility takes a given file name template and overwrites a portion of
it to create a unique file name. This allows shell scripts and other programs to
safely create and use files in the /tmp directory.
This update fixes the following bug:
- Prior to this update, the mktemp-debuginfo package contained no debugging
information. With this update, the mktemp-debuginfo package now contains
debugging information, as expected. (BZ#500610)
All users of mktemp should upgrade to this updated package, which fixes this
bug.
Solution
Before applying this update, make sure all previously-released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 500610 - mktemp-debuginfo is empty
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
mktemp-1.5-24.el5.src.rpm | SHA-256: 97e65814ef3a762540493f2ea6e9b1e0195e096e37d7876af3b9694a57d0bc0b |
x86_64 | |
mktemp-1.5-24.el5.x86_64.rpm | SHA-256: db92609b8bebfdbfd61a4f3e275b9ca9d81822157fccf3fbabaf23fca4b92af7 |
ia64 | |
mktemp-1.5-24.el5.ia64.rpm | SHA-256: 06b0d75bda78f7f57687a0d6a2e9622abf3173fecb1e6c4090354c94ed4a321f |
i386 | |
mktemp-1.5-24.el5.i386.rpm | SHA-256: 110de92264965df9280a43a6c8598e76d401ac5411570c217f5cf19a3d1f4d53 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
mktemp-1.5-24.el5.src.rpm | SHA-256: 97e65814ef3a762540493f2ea6e9b1e0195e096e37d7876af3b9694a57d0bc0b |
x86_64 | |
mktemp-1.5-24.el5.x86_64.rpm | SHA-256: db92609b8bebfdbfd61a4f3e275b9ca9d81822157fccf3fbabaf23fca4b92af7 |
i386 | |
mktemp-1.5-24.el5.i386.rpm | SHA-256: 110de92264965df9280a43a6c8598e76d401ac5411570c217f5cf19a3d1f4d53 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
mktemp-1.5-24.el5.src.rpm | SHA-256: 97e65814ef3a762540493f2ea6e9b1e0195e096e37d7876af3b9694a57d0bc0b |
x86_64 | |
mktemp-1.5-24.el5.x86_64.rpm | SHA-256: db92609b8bebfdbfd61a4f3e275b9ca9d81822157fccf3fbabaf23fca4b92af7 |
i386 | |
mktemp-1.5-24.el5.i386.rpm | SHA-256: 110de92264965df9280a43a6c8598e76d401ac5411570c217f5cf19a3d1f4d53 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
mktemp-1.5-24.el5.src.rpm | SHA-256: 97e65814ef3a762540493f2ea6e9b1e0195e096e37d7876af3b9694a57d0bc0b |
s390x | |
mktemp-1.5-24.el5.s390x.rpm | SHA-256: 3c4b7e37f17ee4786027a648dcdffd9771a936793410cef67bdd51fcd65f57eb |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
mktemp-1.5-24.el5.src.rpm | SHA-256: 97e65814ef3a762540493f2ea6e9b1e0195e096e37d7876af3b9694a57d0bc0b |
ppc | |
mktemp-1.5-24.el5.ppc.rpm | SHA-256: fb162aa72c18e15112e5ea946ac4a90643acdcd6e23f2338e61a0d0f210fc37c |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
mktemp-1.5-24.el5.src.rpm | SHA-256: 97e65814ef3a762540493f2ea6e9b1e0195e096e37d7876af3b9694a57d0bc0b |
x86_64 | |
mktemp-1.5-24.el5.x86_64.rpm | SHA-256: db92609b8bebfdbfd61a4f3e275b9ca9d81822157fccf3fbabaf23fca4b92af7 |
i386 | |
mktemp-1.5-24.el5.i386.rpm | SHA-256: 110de92264965df9280a43a6c8598e76d401ac5411570c217f5cf19a3d1f4d53 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.