- Issued:
- 2009-09-02
- Updated:
- 2009-09-02
RHBA-2009:1310 - Bug Fix Advisory
Synopsis
esc bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated esc package that fixes various bugs is now available.
Description
The esc package contains the "Smart Card Manager" GUI tool, which allows
the user to manage security smart cards. The primary function of the tool
is to enroll smart cards, so that they can be used for common cryptographic
operations, such as secure email and website access.
This updated package fixes the following bugs:
- If a smart card were inserted when the esc daemon was already running
then there could be odd behaviors when the ESC GUI was opened. For example,
if the smart card was blank, then the Phone Home configuration dialog would
not open. When the smart card was removed, then esc could crash. (Bug
496410)
- If a user attempted to re-enroll a formatted token when the RE_ENROLL
value was set to NO, then the ESC wrongly gave an error that the token was
suspended, not that re-enrollment wasn't allowed. This message has been
corrected. (Bug 494981)
This update also includes enhancements for smart card management:
- Certificate System previously supported re-enrollment for tokens, which
allows a formatted token to be re-formatted with new certificates. This
enhancement also allows smart cards to have renewal operations, so existing
certificates can have renewed.
- This release includes enhancements to streamline the security officer
mode for ESC. Security officer mode allows designated users to perform
in-person token enrollments, as added security. This simplifies launching
the ESC GUI in security officer mode.
Users of esc are advised to upgrade to this updated package, which
resolves these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259.
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 235474 - Default esc.disable.password.prompt to no for secmode
- BZ - 236268 - ESC: get rid of the -secmode option
- BZ - 445274 - Make security officer enrollment work with Dogtag
- BZ - 493118 - Allow enrolled token to be re-enrolled with local ESC UI
- BZ - 494981 - CS 8.0 Alpha -- When Renrollment policy is set (RE_ENROLL) then the error message display erroneously specifies the card is suspended.
- BZ - 496410 - Problems launching ESC with token already plugged in
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
esc-1.1.0-9.el5.src.rpm | SHA-256: 052d173d0fed201487af436020f4fb01e07d217af39cfdfb2ee76d6e77524cb3 |
x86_64 | |
esc-1.1.0-9.el5.x86_64.rpm | SHA-256: 6d0429c896dd79c8e5a3a29b138eacba1e2a3820cc092564148b663a8dff12bf |
ia64 | |
esc-1.1.0-9.el5.ia64.rpm | SHA-256: 46488bd69d3c6ed5834fe50cd8f106aab808c93e539e5d32082aa5523be89f73 |
i386 | |
esc-1.1.0-9.el5.i386.rpm | SHA-256: a2083e8d5335f1b838314b9a4cff58b484f39d8eaf6d8679e39b3a454f9091d8 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
esc-1.1.0-9.el5.src.rpm | SHA-256: 052d173d0fed201487af436020f4fb01e07d217af39cfdfb2ee76d6e77524cb3 |
x86_64 | |
esc-1.1.0-9.el5.x86_64.rpm | SHA-256: 6d0429c896dd79c8e5a3a29b138eacba1e2a3820cc092564148b663a8dff12bf |
i386 | |
esc-1.1.0-9.el5.i386.rpm | SHA-256: a2083e8d5335f1b838314b9a4cff58b484f39d8eaf6d8679e39b3a454f9091d8 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
esc-1.1.0-9.el5.src.rpm | SHA-256: 052d173d0fed201487af436020f4fb01e07d217af39cfdfb2ee76d6e77524cb3 |
x86_64 | |
esc-1.1.0-9.el5.x86_64.rpm | SHA-256: 6d0429c896dd79c8e5a3a29b138eacba1e2a3820cc092564148b663a8dff12bf |
i386 | |
esc-1.1.0-9.el5.i386.rpm | SHA-256: a2083e8d5335f1b838314b9a4cff58b484f39d8eaf6d8679e39b3a454f9091d8 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
esc-1.1.0-9.el5.src.rpm | SHA-256: 052d173d0fed201487af436020f4fb01e07d217af39cfdfb2ee76d6e77524cb3 |
ppc | |
esc-1.1.0-9.el5.ppc.rpm | SHA-256: e870db1aa1d4a42a89288460ac47d6b10a5955e7d058a0c9d374848bb45994bf |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
esc-1.1.0-9.el5.src.rpm | SHA-256: 052d173d0fed201487af436020f4fb01e07d217af39cfdfb2ee76d6e77524cb3 |
x86_64 | |
esc-1.1.0-9.el5.x86_64.rpm | SHA-256: 6d0429c896dd79c8e5a3a29b138eacba1e2a3820cc092564148b663a8dff12bf |
i386 | |
esc-1.1.0-9.el5.i386.rpm | SHA-256: a2083e8d5335f1b838314b9a4cff58b484f39d8eaf6d8679e39b3a454f9091d8 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.