Bug Fix Advisory mailx bug fix update

Advisory: RHBA-2013:1129-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-08-01
Last updated on: 2013-11-20
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

Updated mailx packages that fix two bugs are now available for Red Hat
Enterprise Linux 6.

The mailx packages contain a mail user agent that is mostly used to manage mail
using scripts.

This update fixes the following bugs:

* Prior to this update, the "mail" utility provided with the Red Hat Enterprise
Linux 6 mailx packages was not fully compatible with the utility provided with
the Red Hat Enterprise Linux 5 mailx package and packages in earlier releases of
Red Hat Enterprise Linux. Consequently, some user scripts written for the mail
utility did not work with "mail" in Red Hat Enterprise Linux 6. Support for
multiple versions of the "mail" utility has been added to the mailx packages.
This allows the user to install alternative packages providing this utility, for
example, bsd-mailx. (BZ#845098)

* The mailx command did not set the error return code when it failed to send an
e-mail because the TMPDIR environment variable was set to an invalid path. As a
consequence, error checking was incorrect and therefore not helpful. With this
update, the correct return code is set when mailx fails to send an e-mail. The
error checking now works properly. (BZ#857120)

Users of mailx are advised to upgrade to these updated packages, which fix these
bugs.


Solution

Before applying this update, make sure all previously-released errata relevant
to your system have been applied.

This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
mailx-12.4-7.el6.src.rpm
File outdated by:  RHSA-2014:1999
    MD5: 31c113a8b90db4e3832ffdbad97d82cb
SHA-256: 35df38e2e7dbd6c9cb893b18586c30b3f0bf8ae9cf4f0bf0116b482faf6eb25b
 
IA-32:
mailx-12.4-7.el6.i686.rpm
File outdated by:  RHSA-2014:1999
    MD5: 2f1e802828b3b047418c068f8c3f61f6
SHA-256: 14ce83a31254ba0c219a61c0eae1d638260140006ed787c4873115418ae69f18
mailx-debuginfo-12.4-7.el6.i686.rpm
File outdated by:  RHSA-2014:1999
    MD5: 6eb3f31ffe296efbd5850b48b64159cc
SHA-256: 024aad4b0b5fbe071b3d51cdc3503cdd9a2d6e7ab25c88ffd91776bed1d33dfb
 
x86_64:
mailx-12.4-7.el6.x86_64.rpm
File outdated by:  RHSA-2014:1999
    MD5: aab4fae54b0c8e86848f407b43916bb7
SHA-256: ce3617659373a862476cbd384366921b84a6f9e28ad45cdf361a9dc0a34acfc5
mailx-debuginfo-12.4-7.el6.x86_64.rpm
File outdated by:  RHSA-2014:1999
    MD5: 05c7bebbe984caf37f18042ac0b2d271
SHA-256: df0498350215969431865de7442be69aca0fe20232f11f77c35098bfa39d3b51
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
mailx-12.4-7.el6.src.rpm
File outdated by:  RHSA-2014:1999
    MD5: 31c113a8b90db4e3832ffdbad97d82cb
SHA-256: 35df38e2e7dbd6c9cb893b18586c30b3f0bf8ae9cf4f0bf0116b482faf6eb25b
 
x86_64:
mailx-12.4-7.el6.x86_64.rpm
File outdated by:  RHSA-2014:1999
    MD5: aab4fae54b0c8e86848f407b43916bb7
SHA-256: ce3617659373a862476cbd384366921b84a6f9e28ad45cdf361a9dc0a34acfc5
mailx-debuginfo-12.4-7.el6.x86_64.rpm
File outdated by:  RHSA-2014:1999
    MD5: 05c7bebbe984caf37f18042ac0b2d271
SHA-256: df0498350215969431865de7442be69aca0fe20232f11f77c35098bfa39d3b51
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
mailx-12.4-7.el6.src.rpm
File outdated by:  RHSA-2014:1999
    MD5: 31c113a8b90db4e3832ffdbad97d82cb
SHA-256: 35df38e2e7dbd6c9cb893b18586c30b3f0bf8ae9cf4f0bf0116b482faf6eb25b
 
IA-32:
mailx-12.4-7.el6.i686.rpm
File outdated by:  RHSA-2014:1999
    MD5: 2f1e802828b3b047418c068f8c3f61f6
SHA-256: 14ce83a31254ba0c219a61c0eae1d638260140006ed787c4873115418ae69f18
mailx-debuginfo-12.4-7.el6.i686.rpm
File outdated by:  RHSA-2014:1999
    MD5: 6eb3f31ffe296efbd5850b48b64159cc
SHA-256: 024aad4b0b5fbe071b3d51cdc3503cdd9a2d6e7ab25c88ffd91776bed1d33dfb
 
PPC:
mailx-12.4-7.el6.ppc64.rpm
File outdated by:  RHSA-2014:1999
    MD5: e32d8d45a941d2e8748a10cf17008589
SHA-256: 7ada9cff31946d8904397c149671935e585b7ba65bcce5a03bb76c3724f08a5b
mailx-debuginfo-12.4-7.el6.ppc64.rpm
File outdated by:  RHSA-2014:1999
    MD5: bf8ae0f4953943b3eee0e95b3cf094df
SHA-256: 4ee77e457c2b65999cb8ed50d919b8a3ca22c91963a98a61b882f9649d54c90a
 
s390x:
mailx-12.4-7.el6.s390x.rpm
File outdated by:  RHSA-2014:1999
    MD5: 8eacef88291a4ab7bb0a17388faa6ae4
SHA-256: b0f0adb91534396340f3bef6c6e1aecbe90ece63450ab0c3537a7937c0ab74c5
mailx-debuginfo-12.4-7.el6.s390x.rpm
File outdated by:  RHSA-2014:1999
    MD5: cfada5071d19e53df0646446ca68b22e
SHA-256: 87ffdab5242920f911ce66f3914fcea0396934e3233023da483d14836d193d14
 
x86_64:
mailx-12.4-7.el6.x86_64.rpm
File outdated by:  RHSA-2014:1999
    MD5: aab4fae54b0c8e86848f407b43916bb7
SHA-256: ce3617659373a862476cbd384366921b84a6f9e28ad45cdf361a9dc0a34acfc5
mailx-debuginfo-12.4-7.el6.x86_64.rpm
File outdated by:  RHSA-2014:1999
    MD5: 05c7bebbe984caf37f18042ac0b2d271
SHA-256: df0498350215969431865de7442be69aca0fe20232f11f77c35098bfa39d3b51
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
mailx-12.4-7.el6.src.rpm
File outdated by:  RHSA-2014:1999
    MD5: 31c113a8b90db4e3832ffdbad97d82cb
SHA-256: 35df38e2e7dbd6c9cb893b18586c30b3f0bf8ae9cf4f0bf0116b482faf6eb25b
 
IA-32:
mailx-12.4-7.el6.i686.rpm
File outdated by:  RHSA-2014:1999
    MD5: 2f1e802828b3b047418c068f8c3f61f6
SHA-256: 14ce83a31254ba0c219a61c0eae1d638260140006ed787c4873115418ae69f18
mailx-debuginfo-12.4-7.el6.i686.rpm
File outdated by:  RHSA-2014:1999
    MD5: 6eb3f31ffe296efbd5850b48b64159cc
SHA-256: 024aad4b0b5fbe071b3d51cdc3503cdd9a2d6e7ab25c88ffd91776bed1d33dfb
 
x86_64:
mailx-12.4-7.el6.x86_64.rpm
File outdated by:  RHSA-2014:1999
    MD5: aab4fae54b0c8e86848f407b43916bb7
SHA-256: ce3617659373a862476cbd384366921b84a6f9e28ad45cdf361a9dc0a34acfc5
mailx-debuginfo-12.4-7.el6.x86_64.rpm
File outdated by:  RHSA-2014:1999
    MD5: 05c7bebbe984caf37f18042ac0b2d271
SHA-256: df0498350215969431865de7442be69aca0fe20232f11f77c35098bfa39d3b51
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/