Skip to navigation

Bug Fix Advisory finger bug fix update

Advisory: RHBA-2011:0467-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated finger packages that fix one bug are now available for Red Hat
Enterprise Linux 5.

The finger utility allows users to display information about the system users,
including their login names, full names, and the time they logged in to the
system.

The update fixes the following bug:

* When the finger utility is run with no additional command line options, it
provides output in the form of a table. Prior to this update, this tabular
output did not include a separate column for information about a host, and this
information was incorrectly displayed in the "Office" column. This update adds a
new column named "Host", so that the host information no longer appears in the
wrong column. (BZ#563291)

All users of finger are advised to upgrade to these updated packages, which fix
this bug.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
finger-0.17-33.src.rpm     MD5: 1b0503effb2ab759ad1971edca9bdae5
SHA-256: 128ab4014d82b1b724198cedd1ef26aa1487625648c4fab56547cfb9d002931d
 
IA-32:
finger-server-0.17-33.i386.rpm     MD5: e4191b8d232c59dea074972f77c7e2f6
SHA-256: 7ede5a7372c1a0daa6175b9cccc5711650c11b22dd73c97a833c8034eb751f39
 
x86_64:
finger-server-0.17-33.x86_64.rpm     MD5: f7e55fa3876c0e449bf91cc37ef22aef
SHA-256: 2d04ffc524ddc77b9c6c14cfddc8066f8dce96e19b3f7fe81b1f0ad24d19a466
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
finger-0.17-33.src.rpm     MD5: 1b0503effb2ab759ad1971edca9bdae5
SHA-256: 128ab4014d82b1b724198cedd1ef26aa1487625648c4fab56547cfb9d002931d
 
IA-32:
finger-0.17-33.i386.rpm     MD5: d1de8555bd8e6e3428b8aed711c2bc63
SHA-256: a019fcb6147b281351e61ba0886a04085bbeb59732fd825d52b2427d9efb7420
finger-server-0.17-33.i386.rpm     MD5: e4191b8d232c59dea074972f77c7e2f6
SHA-256: 7ede5a7372c1a0daa6175b9cccc5711650c11b22dd73c97a833c8034eb751f39
 
IA-64:
finger-0.17-33.ia64.rpm     MD5: ad66bafc1ab3ce3cf29961c853f56520
SHA-256: 3b403856f25698304a72f6bd6182c7eee86830c7db5e41997e412a25434a18bc
finger-server-0.17-33.ia64.rpm     MD5: d1bf575e8e0114d39c6ec714e246fe1a
SHA-256: 633ccbbafef6d5be405529f767e1643c38fc27cb8eb5c8e5b2613123aac06616
 
PPC:
finger-0.17-33.ppc.rpm     MD5: 440ba7fb2b65ce46b05f9ed015b33bb7
SHA-256: a4ee7e882a1a6173c1d1a894a1c53c1f274dfbf1bd061cd2274fa97860f40aa9
finger-server-0.17-33.ppc.rpm     MD5: d03f5f91ad53f6f533f1e3dbb08eb7c3
SHA-256: 25ec7119cc3f6a373e805f3e77a3b9cdcb722f39528000aaf81d0671b230d3e1
 
s390x:
finger-0.17-33.s390x.rpm     MD5: a82a1d74c708db325e6f76d5a02d6c0d
SHA-256: 4f4bf1eef534b9a15feccf5c7ae0356bed1659efad716fee6898f259050c4dc3
finger-server-0.17-33.s390x.rpm     MD5: cbb78f5b82ad8e970f31b6e08d4c8867
SHA-256: 0342558d1069af138f4b103adf48e085d6a57c4623fc3edc6ec9ef6adec1372b
 
x86_64:
finger-0.17-33.x86_64.rpm     MD5: 938433c4ad1b5b7a3dd32f5cd3a095c3
SHA-256: 565072769c12a2edcaebb13b847e43e93f6139ce57114b802bc26e6867734214
finger-server-0.17-33.x86_64.rpm     MD5: f7e55fa3876c0e449bf91cc37ef22aef
SHA-256: 2d04ffc524ddc77b9c6c14cfddc8066f8dce96e19b3f7fe81b1f0ad24d19a466
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
finger-0.17-33.src.rpm     MD5: 1b0503effb2ab759ad1971edca9bdae5
SHA-256: 128ab4014d82b1b724198cedd1ef26aa1487625648c4fab56547cfb9d002931d
 
IA-32:
finger-0.17-33.i386.rpm     MD5: d1de8555bd8e6e3428b8aed711c2bc63
SHA-256: a019fcb6147b281351e61ba0886a04085bbeb59732fd825d52b2427d9efb7420
 
x86_64:
finger-0.17-33.x86_64.rpm     MD5: 938433c4ad1b5b7a3dd32f5cd3a095c3
SHA-256: 565072769c12a2edcaebb13b847e43e93f6139ce57114b802bc26e6867734214
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

563291 - finger prints host in office column



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/