Skip to navigation

Bug Fix Advisory esc bug fix update

Advisory: RHBA-2012:0472-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-04-11
Last updated on: 2012-04-11
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Server AUS (v. 6.2)
Red Hat Enterprise Linux Server EUS (v. 6.2.z)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated esc package that fixes two bugs is now available for Red Hat
Enterprise Linux 6.

The esc packages contain the Smart Card Manager GUI, which allows user to manage
security smart cards. The primary function of the tool is to enroll smart cards,
so that they can be used for common cryptographic operations, such as secure
e-mail and website access.

This update fixes the following bugs:

* The ESC utility did not start when the latest 10 series release of the
XULRunner runtime environment was installed on the system. This update includes
necessary changes to ensure that ESC works as expected with the latest version
of XULRunner. (BZ#807264)

* After removing and replacing an enrolled token, ESC could terminate
unexpectedly followed by a traceback. A patch has been applied to address this
issue and ESC now displays the enrolled smart card details as expected.
(BZ#807806)

All users of esc are advised to upgrade to these updated packages, which fix
these bugs.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

IA-32:
esc-1.1.0-24.el6_2.2.i686.rpm
File outdated by:  RHBA-2013:1698
    MD5: d5f1abbde4a772771e80f96b146bf866
SHA-256: 7d8ac09405e5a1e86d360a82c06ef6a026dc6fc892a74b7f9a480c48f3846d0d
esc-debuginfo-1.1.0-24.el6_2.2.i686.rpm
File outdated by:  RHBA-2013:1698
    MD5: 2f3d3bded57d06680e22d8d81a73461d
SHA-256: 6e69cdf80c11f4f9b04657a0a0ba080186629a0f9799bb7fb75500f28590291b
 
x86_64:
esc-1.1.0-24.el6_2.2.x86_64.rpm
File outdated by:  RHBA-2013:1698
    MD5: 7cc55e099f53dd3b2b3759c6674e0d29
SHA-256: d4385013dc0cd32272c617218260a6dac80d65b638ca9b249818b4c850dffef0
esc-debuginfo-1.1.0-24.el6_2.2.x86_64.rpm
File outdated by:  RHBA-2013:1698
    MD5: eaa72976e599d4fc69ac8ba8b239dcdf
SHA-256: 664146bb2359a98fd5aa141d02a132a33abee6a1fc10837cd7d6ecd43dd7e31e
 
Red Hat Enterprise Linux Server (v. 6)

IA-32:
esc-1.1.0-24.el6_2.2.i686.rpm
File outdated by:  RHBA-2013:1698
    MD5: d5f1abbde4a772771e80f96b146bf866
SHA-256: 7d8ac09405e5a1e86d360a82c06ef6a026dc6fc892a74b7f9a480c48f3846d0d
esc-debuginfo-1.1.0-24.el6_2.2.i686.rpm
File outdated by:  RHBA-2013:1698
    MD5: 2f3d3bded57d06680e22d8d81a73461d
SHA-256: 6e69cdf80c11f4f9b04657a0a0ba080186629a0f9799bb7fb75500f28590291b
 
PPC:
esc-1.1.0-24.el6_2.2.ppc64.rpm
File outdated by:  RHBA-2013:1698
    MD5: 4607c791191d8d2c4072e73cca55edaf
SHA-256: 5f7138b026a23b7d0076a2ebaa2fcd151f59d9c1f49a8fb2949278474f9895e9
esc-debuginfo-1.1.0-24.el6_2.2.ppc64.rpm
File outdated by:  RHBA-2013:1698
    MD5: e04375c379a535773011eb2be59864e0
SHA-256: 8031088c2e668c513581250d5ff79a5257458d5ad062d24c96958f4a0cf10dd2
 
x86_64:
esc-1.1.0-24.el6_2.2.x86_64.rpm
File outdated by:  RHBA-2013:1698
    MD5: 7cc55e099f53dd3b2b3759c6674e0d29
SHA-256: d4385013dc0cd32272c617218260a6dac80d65b638ca9b249818b4c850dffef0
esc-debuginfo-1.1.0-24.el6_2.2.x86_64.rpm
File outdated by:  RHBA-2013:1698
    MD5: eaa72976e599d4fc69ac8ba8b239dcdf
SHA-256: 664146bb2359a98fd5aa141d02a132a33abee6a1fc10837cd7d6ecd43dd7e31e
 
Red Hat Enterprise Linux Server AUS (v. 6.2)

x86_64:
esc-1.1.0-24.el6_2.2.x86_64.rpm     MD5: 7cc55e099f53dd3b2b3759c6674e0d29
SHA-256: d4385013dc0cd32272c617218260a6dac80d65b638ca9b249818b4c850dffef0
esc-debuginfo-1.1.0-24.el6_2.2.x86_64.rpm     MD5: eaa72976e599d4fc69ac8ba8b239dcdf
SHA-256: 664146bb2359a98fd5aa141d02a132a33abee6a1fc10837cd7d6ecd43dd7e31e
 
Red Hat Enterprise Linux Server EUS (v. 6.2.z)

IA-32:
esc-1.1.0-24.el6_2.2.i686.rpm     MD5: d5f1abbde4a772771e80f96b146bf866
SHA-256: 7d8ac09405e5a1e86d360a82c06ef6a026dc6fc892a74b7f9a480c48f3846d0d
esc-debuginfo-1.1.0-24.el6_2.2.i686.rpm     MD5: 2f3d3bded57d06680e22d8d81a73461d
SHA-256: 6e69cdf80c11f4f9b04657a0a0ba080186629a0f9799bb7fb75500f28590291b
 
PPC:
esc-1.1.0-24.el6_2.2.ppc64.rpm     MD5: 4607c791191d8d2c4072e73cca55edaf
SHA-256: 5f7138b026a23b7d0076a2ebaa2fcd151f59d9c1f49a8fb2949278474f9895e9
esc-debuginfo-1.1.0-24.el6_2.2.ppc64.rpm     MD5: e04375c379a535773011eb2be59864e0
SHA-256: 8031088c2e668c513581250d5ff79a5257458d5ad062d24c96958f4a0cf10dd2
 
x86_64:
esc-1.1.0-24.el6_2.2.x86_64.rpm     MD5: 7cc55e099f53dd3b2b3759c6674e0d29
SHA-256: d4385013dc0cd32272c617218260a6dac80d65b638ca9b249818b4c850dffef0
esc-debuginfo-1.1.0-24.el6_2.2.x86_64.rpm     MD5: eaa72976e599d4fc69ac8ba8b239dcdf
SHA-256: 664146bb2359a98fd5aa141d02a132a33abee6a1fc10837cd7d6ecd43dd7e31e
 
Red Hat Enterprise Linux Workstation (v. 6)

IA-32:
esc-1.1.0-24.el6_2.2.i686.rpm
File outdated by:  RHBA-2013:1698
    MD5: d5f1abbde4a772771e80f96b146bf866
SHA-256: 7d8ac09405e5a1e86d360a82c06ef6a026dc6fc892a74b7f9a480c48f3846d0d
esc-debuginfo-1.1.0-24.el6_2.2.i686.rpm
File outdated by:  RHBA-2013:1698
    MD5: 2f3d3bded57d06680e22d8d81a73461d
SHA-256: 6e69cdf80c11f4f9b04657a0a0ba080186629a0f9799bb7fb75500f28590291b
 
x86_64:
esc-1.1.0-24.el6_2.2.x86_64.rpm
File outdated by:  RHBA-2013:1698
    MD5: 7cc55e099f53dd3b2b3759c6674e0d29
SHA-256: d4385013dc0cd32272c617218260a6dac80d65b638ca9b249818b4c850dffef0
esc-debuginfo-1.1.0-24.el6_2.2.x86_64.rpm
File outdated by:  RHBA-2013:1698
    MD5: eaa72976e599d4fc69ac8ba8b239dcdf
SHA-256: 664146bb2359a98fd5aa141d02a132a33abee6a1fc10837cd7d6ecd43dd7e31e
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

807264 - esc ceased working after Firefox/xulrunner update to 10 series
807806 - ESC crashes when an enrolled smart card is inserted.



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/