Skip to navigation

Bug Fix Advisory system-config-users bug fix update

Advisory: RHBA-2012:1387-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2012-10-18
Last updated on: 2013-02-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated system-config-users packages that fix three bugs are now available for
Red Hat Enterprise Linux 6.

The system-config-users packages provide a graphical utility for administrating
users and groups.

This update fixes the following bugs:

* Prior to this update, expiration dates at or before January 1,
1970 were not correctly calculated. As a consequence, the system-config-users
utility stored expiration dates off by one day into /etc/shadow. This update
modifies the underlying code so that account expiration dates are calculated and
stored correctly. (BZ#736037)

* Prior to this update, a string in the user interface was not correctly
localized into Japanese. This update modifies the string so that the text is now
correct. (BZ#801652)

* Prior to this update, the system-config-users utility determined incorrectly
whether to set an account as inactive if an expired password was not reset
during a specified period. This update modifies the underlying code to check for
this condition by hard-coding the value which indicates this condition.
(BZ#841886)

All users of system-config-users are advised to upgrade to these updated
packages, which fix these bugs.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
system-config-users-1.2.106-7.el6.src.rpm     MD5: 51c937005fb6ad40db384796655fd602
SHA-256: 1c37c9266baa06909afd86ecde20e34ad434010773ffba318f6530c61bc273db
 
IA-32:
system-config-users-1.2.106-7.el6.noarch.rpm     MD5: 0ab0dd4f6f5a8d9b893c65017549f599
SHA-256: 4d89694cf57db955ae99a57a87f2ddefe330b603fe098475975e6221de437558
 
x86_64:
system-config-users-1.2.106-7.el6.noarch.rpm     MD5: 0ab0dd4f6f5a8d9b893c65017549f599
SHA-256: 4d89694cf57db955ae99a57a87f2ddefe330b603fe098475975e6221de437558
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
system-config-users-1.2.106-7.el6.src.rpm     MD5: 51c937005fb6ad40db384796655fd602
SHA-256: 1c37c9266baa06909afd86ecde20e34ad434010773ffba318f6530c61bc273db
 
x86_64:
system-config-users-1.2.106-7.el6.noarch.rpm     MD5: 0ab0dd4f6f5a8d9b893c65017549f599
SHA-256: 4d89694cf57db955ae99a57a87f2ddefe330b603fe098475975e6221de437558
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
system-config-users-1.2.106-7.el6.src.rpm     MD5: 51c937005fb6ad40db384796655fd602
SHA-256: 1c37c9266baa06909afd86ecde20e34ad434010773ffba318f6530c61bc273db
 
IA-32:
system-config-users-1.2.106-7.el6.noarch.rpm     MD5: 0ab0dd4f6f5a8d9b893c65017549f599
SHA-256: 4d89694cf57db955ae99a57a87f2ddefe330b603fe098475975e6221de437558
 
PPC:
system-config-users-1.2.106-7.el6.noarch.rpm     MD5: 0ab0dd4f6f5a8d9b893c65017549f599
SHA-256: 4d89694cf57db955ae99a57a87f2ddefe330b603fe098475975e6221de437558
 
s390x:
system-config-users-1.2.106-7.el6.noarch.rpm     MD5: 0ab0dd4f6f5a8d9b893c65017549f599
SHA-256: 4d89694cf57db955ae99a57a87f2ddefe330b603fe098475975e6221de437558
 
x86_64:
system-config-users-1.2.106-7.el6.noarch.rpm     MD5: 0ab0dd4f6f5a8d9b893c65017549f599
SHA-256: 4d89694cf57db955ae99a57a87f2ddefe330b603fe098475975e6221de437558
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
system-config-users-1.2.106-7.el6.src.rpm     MD5: 51c937005fb6ad40db384796655fd602
SHA-256: 1c37c9266baa06909afd86ecde20e34ad434010773ffba318f6530c61bc273db
 
IA-32:
system-config-users-1.2.106-7.el6.noarch.rpm     MD5: 0ab0dd4f6f5a8d9b893c65017549f599
SHA-256: 4d89694cf57db955ae99a57a87f2ddefe330b603fe098475975e6221de437558
 
x86_64:
system-config-users-1.2.106-7.el6.noarch.rpm     MD5: 0ab0dd4f6f5a8d9b893c65017549f599
SHA-256: 4d89694cf57db955ae99a57a87f2ddefe330b603fe098475975e6221de437558
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

736037 - system-config-user calculates wrong expiry date



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/