Skip to navigation

Bug Fix Advisory expect bug fix update

Advisory: RHBA-2011:1501-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-02-20
Last updated on: 2012-02-20
Affected Products: RHEL Desktop Workstation (v. 5 client)
Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated expect packages that fix multiple bugs are now available for Red Hat
Enterprise Linux 5.

The "expect" packages contain a tool for automating and testing interactive
command line programs and Tk applications. Tcl is a portable and widely used
scripting language, while Tk is a graphical toolkit that eases development of
text-based and GUI applications.

This update fixes the following bugs:

* Prior to this update, the su binary was not called with the full path
(/bin/su). This problem has been fixed in this update. (BZ#702265)

* Prior to this update, the expect(1) man page was not formatted properly. As a
result, the content of the man page was not easily readable. The problem has
been fixed with this update. (BZ#699613)

* Prior to this update, the /usr/bin/passmass script expected a different
password change prompt than the one provided. As a result, the script did not
work properly. This problem has been fixed in this update. (BZ#567307)

* Prior to this update, expect paused for 1 second when exiting from an
interactive script. This unintended behavior has been fixed in this update.
(BZ#520451)

All users of "expect" are advised to upgrade to these updated packages, which
fix these bugs.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

RHEL Desktop Workstation (v. 5 client)

SRPMS:
expect-5.43.0-8.el5.src.rpm     MD5: 95df39d7f4dd12a522e94eb00fce4b98
SHA-256: 418ce422ffda93aa74798e1892d88a6cd07576f46bbed04ac924c8ede406eccd
 
IA-32:
expect-devel-5.43.0-8.el5.i386.rpm     MD5: 93c4f653ecca9d3fa33c3978017cc0e7
SHA-256: 760ee534c362f5bcc06819fd8b9b6f6411f33b8b740a610696f1f43ebc064c3a
 
x86_64:
expect-devel-5.43.0-8.el5.i386.rpm     MD5: 93c4f653ecca9d3fa33c3978017cc0e7
SHA-256: 760ee534c362f5bcc06819fd8b9b6f6411f33b8b740a610696f1f43ebc064c3a
expect-devel-5.43.0-8.el5.x86_64.rpm     MD5: 1c9b06257d08c2443bdcd9c55f09ef94
SHA-256: 8e7b9fa802270c4bfaf32ed122b6cb844e29f3c48da8baeb0d4beb51e5efcbb5
 
Red Hat Enterprise Linux (v. 5 server)

SRPMS:
expect-5.43.0-8.el5.src.rpm     MD5: 95df39d7f4dd12a522e94eb00fce4b98
SHA-256: 418ce422ffda93aa74798e1892d88a6cd07576f46bbed04ac924c8ede406eccd
 
IA-32:
expect-5.43.0-8.el5.i386.rpm     MD5: 016106523f16bd6000a8281df919204b
SHA-256: 492236fec7fe7c36ab1e4cdb21b01df47bc8672dd7c470da2688be225c967177
expect-devel-5.43.0-8.el5.i386.rpm     MD5: 93c4f653ecca9d3fa33c3978017cc0e7
SHA-256: 760ee534c362f5bcc06819fd8b9b6f6411f33b8b740a610696f1f43ebc064c3a
expectk-5.43.0-8.el5.i386.rpm     MD5: d09fc00c52348ad577ecdab02e74de14
SHA-256: 238982c582a0a745f334d0c6b06a2cc89f7825a94a7d8f273a4ddd4db054ecab
 
IA-64:
expect-5.43.0-8.el5.ia64.rpm     MD5: bbcabbafcae0f22b878dbf76af08cac3
SHA-256: 090487a34fe09dd22726bf222f15534cbac3e558282b85cd498d37d9c5b9a6f4
expect-devel-5.43.0-8.el5.ia64.rpm     MD5: 54b9f0663609d681dfbec4e73259e859
SHA-256: 53204acce12b3f7634cf8727e264016240bf17bb26eaeb20a9186b2ef2f9fc30
expectk-5.43.0-8.el5.ia64.rpm     MD5: a37c0fde14c46cb2804ef9de09626d17
SHA-256: 464d7204f9dc8be3415736c4278a4800af53d1a4792887794ee0f1f9dc8566be
 
PPC:
expect-5.43.0-8.el5.ppc.rpm     MD5: 65345027d4c83b226d843e751eb91158
SHA-256: f5fd8b23f7afc2a61ca879275263f5fdc345755e421aa6cf4cc28f1aa3ee3331
expect-5.43.0-8.el5.ppc64.rpm     MD5: e5bf485e272ba314bd6f2f3a0893150f
SHA-256: f65c550224c14819b39450aa2128d1c1282ac742e61ec5aeafc34499851f64e7
expect-devel-5.43.0-8.el5.ppc.rpm     MD5: 67d583f24ddcc7aa90df2e6bbace0146
SHA-256: 2cf3e6f092018fdded2e9ef5851744f26e3e1a163e5fd8a4a035e7d055e4c442
expect-devel-5.43.0-8.el5.ppc64.rpm     MD5: 0d4c00d482d9bebc2e29030451d5eb75
SHA-256: c3e012a0b6f8ab6a0c5a4ddf3623cb8671c472cf2f6ec183be6122305cd57c60
expectk-5.43.0-8.el5.ppc.rpm     MD5: f9c73bb8b700de7d383530680bf101cc
SHA-256: 9d8973469b0ce0465de71e1c2bbcd6b7c7563eea8cf80d021e8b50ec5247b147
 
s390x:
expect-5.43.0-8.el5.s390.rpm     MD5: a457838fc7a6f53a768c8e597df00747
SHA-256: 5d5fb27c1c3da1da14a76a84ce3cb4011046efb133601cd40ab821742f90f181
expect-5.43.0-8.el5.s390x.rpm     MD5: cc47a9c5d2101fbda5e68109073e32f0
SHA-256: 4cda4ccd4242c8ccb2e52082e28fe1da101875850f2d65513d296469e0e85ef0
expect-devel-5.43.0-8.el5.s390.rpm     MD5: 9eba7c2c696cacdd1e6912c5abbe9656
SHA-256: e35891fbccddf9d97ab11f245f84a15662341861726188ab4f744b4f5cd0bf83
expect-devel-5.43.0-8.el5.s390x.rpm     MD5: 04dfd22626843717d0996500ab8c1a2a
SHA-256: a4e0bc6291b668ac9f788c35f6653c0349afb302063e763a2fb9cbed99110340
expectk-5.43.0-8.el5.s390x.rpm     MD5: bc31f51f94259af6ed827b0f308b760e
SHA-256: 4c20cb4fc1dacb0f39e4c64b64e45481adb92b08102e0b414c6fc2f48b1bc293
 
x86_64:
expect-5.43.0-8.el5.i386.rpm     MD5: 016106523f16bd6000a8281df919204b
SHA-256: 492236fec7fe7c36ab1e4cdb21b01df47bc8672dd7c470da2688be225c967177
expect-5.43.0-8.el5.x86_64.rpm     MD5: 8fe79483b54d24e636bda3a125be3d18
SHA-256: 057db67b127dca389f508fd65732e5e9d9cc70be1aea68bdc52239e246544cfe
expect-devel-5.43.0-8.el5.i386.rpm     MD5: 93c4f653ecca9d3fa33c3978017cc0e7
SHA-256: 760ee534c362f5bcc06819fd8b9b6f6411f33b8b740a610696f1f43ebc064c3a
expect-devel-5.43.0-8.el5.x86_64.rpm     MD5: 1c9b06257d08c2443bdcd9c55f09ef94
SHA-256: 8e7b9fa802270c4bfaf32ed122b6cb844e29f3c48da8baeb0d4beb51e5efcbb5
expectk-5.43.0-8.el5.x86_64.rpm     MD5: 832815b80934dc6e72e75b36cc041ab7
SHA-256: 0be162f79bdc37f2582aae99a85595487b8568976418405430c00c580282d57c
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
expect-5.43.0-8.el5.src.rpm     MD5: 95df39d7f4dd12a522e94eb00fce4b98
SHA-256: 418ce422ffda93aa74798e1892d88a6cd07576f46bbed04ac924c8ede406eccd
 
IA-32:
expect-5.43.0-8.el5.i386.rpm     MD5: 016106523f16bd6000a8281df919204b
SHA-256: 492236fec7fe7c36ab1e4cdb21b01df47bc8672dd7c470da2688be225c967177
expectk-5.43.0-8.el5.i386.rpm     MD5: d09fc00c52348ad577ecdab02e74de14
SHA-256: 238982c582a0a745f334d0c6b06a2cc89f7825a94a7d8f273a4ddd4db054ecab
 
x86_64:
expect-5.43.0-8.el5.i386.rpm     MD5: 016106523f16bd6000a8281df919204b
SHA-256: 492236fec7fe7c36ab1e4cdb21b01df47bc8672dd7c470da2688be225c967177
expect-5.43.0-8.el5.x86_64.rpm     MD5: 8fe79483b54d24e636bda3a125be3d18
SHA-256: 057db67b127dca389f508fd65732e5e9d9cc70be1aea68bdc52239e246544cfe
expectk-5.43.0-8.el5.x86_64.rpm     MD5: 832815b80934dc6e72e75b36cc041ab7
SHA-256: 0be162f79bdc37f2582aae99a85595487b8568976418405430c00c580282d57c
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

520451 - expect pauses on exit
567307 - /usr/bin/passmass does not cope with RHEL5 password prompts
699613 - Man page is bad formatted



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/