- Issued:
- 2008-07-24
- Updated:
- 2008-07-24
RHEA-2008:0745 - Product Enhancement Advisory
Synopsis
new package: pexpect
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
A new pexpect package for assisting with remote access tasks is now
available for Red Hat Enterprise Linux 4.
Description
Pexpect is a pure Python module for spawning child applications,
controlling them, and responding to expected patterns in their output.
Pexpect works like Don Libes' Expect. Pexpect allows your script to spawn a
child application and control it as if a human were typing commands.
Pexpect can be used for automating interactive applications such as ssh,
ftp, passwd, telnet, etc. It can also be used to automate setup scripts for
duplicating software package installations on different servers and for
automated software testing.
All users requiring pexpect should install this newly-released package,
which adds this enhancement.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
pexpect-2.3-1.el4.src.rpm | SHA-256: 64359a534f8e5f44b2481ddf03d5cf4ec230e8d4f90426abce5c14efbb08b140 |
x86_64 | |
pexpect-2.3-1.el4.noarch.rpm | SHA-256: b96aa23af7a51338100bbccf214800aa263a57313cb4b86a7d2cbf54e6e00f07 |
pexpect-2.3-1.el4.noarch.rpm | SHA-256: b96aa23af7a51338100bbccf214800aa263a57313cb4b86a7d2cbf54e6e00f07 |
ia64 | |
pexpect-2.3-1.el4.noarch.rpm | SHA-256: b96aa23af7a51338100bbccf214800aa263a57313cb4b86a7d2cbf54e6e00f07 |
pexpect-2.3-1.el4.noarch.rpm | SHA-256: b96aa23af7a51338100bbccf214800aa263a57313cb4b86a7d2cbf54e6e00f07 |
i386 | |
pexpect-2.3-1.el4.noarch.rpm | SHA-256: b96aa23af7a51338100bbccf214800aa263a57313cb4b86a7d2cbf54e6e00f07 |
pexpect-2.3-1.el4.noarch.rpm | SHA-256: b96aa23af7a51338100bbccf214800aa263a57313cb4b86a7d2cbf54e6e00f07 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
pexpect-2.3-1.el4.src.rpm | SHA-256: 64359a534f8e5f44b2481ddf03d5cf4ec230e8d4f90426abce5c14efbb08b140 |
x86_64 | |
pexpect-2.3-1.el4.noarch.rpm | SHA-256: b96aa23af7a51338100bbccf214800aa263a57313cb4b86a7d2cbf54e6e00f07 |
ia64 | |
pexpect-2.3-1.el4.noarch.rpm | SHA-256: b96aa23af7a51338100bbccf214800aa263a57313cb4b86a7d2cbf54e6e00f07 |
i386 | |
pexpect-2.3-1.el4.noarch.rpm | SHA-256: b96aa23af7a51338100bbccf214800aa263a57313cb4b86a7d2cbf54e6e00f07 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
pexpect-2.3-1.el4.src.rpm | SHA-256: 64359a534f8e5f44b2481ddf03d5cf4ec230e8d4f90426abce5c14efbb08b140 |
x86_64 | |
pexpect-2.3-1.el4.noarch.rpm | SHA-256: b96aa23af7a51338100bbccf214800aa263a57313cb4b86a7d2cbf54e6e00f07 |
i386 | |
pexpect-2.3-1.el4.noarch.rpm | SHA-256: b96aa23af7a51338100bbccf214800aa263a57313cb4b86a7d2cbf54e6e00f07 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
pexpect-2.3-1.el4.src.rpm | SHA-256: 64359a534f8e5f44b2481ddf03d5cf4ec230e8d4f90426abce5c14efbb08b140 |
s390x | |
pexpect-2.3-1.el4.noarch.rpm | SHA-256: b96aa23af7a51338100bbccf214800aa263a57313cb4b86a7d2cbf54e6e00f07 |
s390 | |
pexpect-2.3-1.el4.noarch.rpm | SHA-256: b96aa23af7a51338100bbccf214800aa263a57313cb4b86a7d2cbf54e6e00f07 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
pexpect-2.3-1.el4.src.rpm | SHA-256: 64359a534f8e5f44b2481ddf03d5cf4ec230e8d4f90426abce5c14efbb08b140 |
ppc | |
pexpect-2.3-1.el4.noarch.rpm | SHA-256: b96aa23af7a51338100bbccf214800aa263a57313cb4b86a7d2cbf54e6e00f07 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.