Skip to navigation

Bug Fix Advisory esc bug fix update

Advisory: RHBA-2011:1718-2
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-12-06
Last updated on: 2011-12-06
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated esc package that fixes various bugs is now available for Red Hat
Enterprise Linux 6.

The esc package contains the Smart Card Manager GUI (Graphical User Interface),
which allows the user to manage security smart cards. The primary function of
the tool is to enroll smart cards, so that they can be used for common
cryptographic operations, such as secure email and website access.

This update fixes the following bugs:

* If the user resized an ESC window and closed it, the window did not preserve
its size when opening it again. If the user wanted the window to be larger, for
example, to make it easier to read, the user had to resize the window every
single time when it was opened again. A patch has been applied to address this
issue and the previous window size is now restored when opening ESC. (BZ#253077)

* Previously, during the shut down sequence of the escd daemon, the daemon
reported a failure of certain instances. ESC terminated unexpectedly with a
segmentation fault as a consequence. This update modifies the daemon to exit
quietly. As a result, ESC no longer terminates unexpectedly. (BZ#682216)

* The esc-prefs.js file contains helpful commented settings designed to assist
the user in trying rarely used settings if the situation warrants. A number of
these settings in the file contained typos. The typos have been corrected with
this update. (BZ#702683)

* Previously, ESC could have terminated with a segmentation fault after the user
had inserted a new smart card into the reader. This was due to a bug in the code
which helped to bring a pop-up window to the foreground. The code is no longer
needed to assure window focus, therefore it is no longer being executed. As a
result, ESC no longer terminates in the scenario described. (BZ#704281)

All users of esc are advised to upgrade to this updated package, which fixes
these bugs.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
esc-1.1.0-23.el6.src.rpm
File outdated by:  RHBA-2013:1698
    MD5: 79de22e08686809d943aaf1a30c72121
SHA-256: 94e2d3653798de5d7567b23004917778922f8f446e040e49ca7d52d9fd73e688
 
IA-32:
esc-1.1.0-23.el6.i686.rpm
File outdated by:  RHBA-2013:1698
    MD5: 2c086344d143854c1bcbc06581d63e0f
SHA-256: 6976e7c136d900e491cfc1788631180fe0d0aec9fb18eca256977ca74e9b2f7d
esc-debuginfo-1.1.0-23.el6.i686.rpm
File outdated by:  RHBA-2013:1698
    MD5: 1ac22f64bd210a80d20980681c1344b2
SHA-256: 6f915d979ce29ecf227c201656358fd4da7f75c1183e801a9785a356cc1771be
 
x86_64:
esc-1.1.0-23.el6.x86_64.rpm
File outdated by:  RHBA-2013:1698
    MD5: f3e841261d9d49fbbc568471b910be2c
SHA-256: efd10500c901661d042851c86954f0b341c3c5b4954e218e2ac25fef501e6036
esc-debuginfo-1.1.0-23.el6.x86_64.rpm
File outdated by:  RHBA-2013:1698
    MD5: b08b64386c9d5a00836e587b8fe01cf8
SHA-256: 0effa0d2b251b90cb4cb8e0126d74019b8d5332091cf5752978f39ba3f9fcecb
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
esc-1.1.0-23.el6.src.rpm
File outdated by:  RHBA-2013:1698
    MD5: 79de22e08686809d943aaf1a30c72121
SHA-256: 94e2d3653798de5d7567b23004917778922f8f446e040e49ca7d52d9fd73e688
 
IA-32:
esc-1.1.0-23.el6.i686.rpm
File outdated by:  RHBA-2013:1698
    MD5: 2c086344d143854c1bcbc06581d63e0f
SHA-256: 6976e7c136d900e491cfc1788631180fe0d0aec9fb18eca256977ca74e9b2f7d
esc-debuginfo-1.1.0-23.el6.i686.rpm
File outdated by:  RHBA-2013:1698
    MD5: 1ac22f64bd210a80d20980681c1344b2
SHA-256: 6f915d979ce29ecf227c201656358fd4da7f75c1183e801a9785a356cc1771be
 
PPC:
esc-1.1.0-23.el6.ppc64.rpm
File outdated by:  RHBA-2013:1698
    MD5: 368ec02e95262dd27b1d01d9f3c3a749
SHA-256: 6495aa4e22fecb6cb913b2498c3bfee73ea91d2877b37981b3f6ffc8c0ee2235
esc-debuginfo-1.1.0-23.el6.ppc64.rpm
File outdated by:  RHBA-2013:1698
    MD5: 869d4a0af9e72095cecc6dea51d748a2
SHA-256: 05706f75d1a6a60f14a5d47fb47a299551073927539f0dadcc3fc50c02fa422b
 
x86_64:
esc-1.1.0-23.el6.x86_64.rpm
File outdated by:  RHBA-2013:1698
    MD5: f3e841261d9d49fbbc568471b910be2c
SHA-256: efd10500c901661d042851c86954f0b341c3c5b4954e218e2ac25fef501e6036
esc-debuginfo-1.1.0-23.el6.x86_64.rpm
File outdated by:  RHBA-2013:1698
    MD5: b08b64386c9d5a00836e587b8fe01cf8
SHA-256: 0effa0d2b251b90cb4cb8e0126d74019b8d5332091cf5752978f39ba3f9fcecb
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
esc-1.1.0-23.el6.src.rpm
File outdated by:  RHBA-2013:1698
    MD5: 79de22e08686809d943aaf1a30c72121
SHA-256: 94e2d3653798de5d7567b23004917778922f8f446e040e49ca7d52d9fd73e688
 
IA-32:
esc-1.1.0-23.el6.i686.rpm
File outdated by:  RHBA-2013:1698
    MD5: 2c086344d143854c1bcbc06581d63e0f
SHA-256: 6976e7c136d900e491cfc1788631180fe0d0aec9fb18eca256977ca74e9b2f7d
esc-debuginfo-1.1.0-23.el6.i686.rpm
File outdated by:  RHBA-2013:1698
    MD5: 1ac22f64bd210a80d20980681c1344b2
SHA-256: 6f915d979ce29ecf227c201656358fd4da7f75c1183e801a9785a356cc1771be
 
x86_64:
esc-1.1.0-23.el6.x86_64.rpm
File outdated by:  RHBA-2013:1698
    MD5: f3e841261d9d49fbbc568471b910be2c
SHA-256: efd10500c901661d042851c86954f0b341c3c5b4954e218e2ac25fef501e6036
esc-debuginfo-1.1.0-23.el6.x86_64.rpm
File outdated by:  RHBA-2013:1698
    MD5: b08b64386c9d5a00836e587b8fe01cf8
SHA-256: 0effa0d2b251b90cb4cb8e0126d74019b8d5332091cf5752978f39ba3f9fcecb
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

682216 - [abrt] esc-1.1.0-21.el6: __strcmp_ssse3: Process /usr/lib64/esc-1.1.0/escd was killed by signal 11 (SIGSEGV)
702683 - esc-prefs.js file has a typo
704281 - [abrt] esc-1.1.0-12.fc14: Process /usr/lib64/esc-1.1.0/esc was killed by signal 11 (SIGSEGV)
729027 - Debuginfo package issues in esc



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/