Skip to navigation

Enhancement Advisory talk enhancement update

Advisory: RHEA-2011:0828-2
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2011-07-21
Last updated on: 2011-07-21
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated talk packages that add one enhancement are now available for Red Hat
Enterprise Linux 5.

The talk utility is a communication program that copies lines from one terminal
to the terminal of another user.

This update adds the following enhancement:

* The talk utility allows a user to specify the target user in the
"username.hostname" form. Consequent to this, previous versions of the utility
did not support usernames that contained a period. With this update, a new
command line option (that is, "-x") has been added to enforce the use of the
"username@hostname" form, so that the username can contain periods. As well, the
corresponding manual page has been extended to provide a complete list of
supported command line arguments. (BZ#574451)

All users of talk are advised to upgrade to these updated packages, which add
this enhancement.


Solution

Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.

This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
talk-0.17-31.el5.src.rpm     MD5: 1593c9281fd46c54e2b3f89ac095f159
SHA-256: a182c2c96bddbaf6b561e05f0155de43663a83561226e61cf8ffe2c9b53610db
 
IA-32:
talk-0.17-31.el5.i386.rpm     MD5: ccee64cd123ec2abca8bb265abf9d601
SHA-256: 83c6939b9a73d83b60b20a4cb56081cec7409a25363d3a0162960759b77db338
talk-server-0.17-31.el5.i386.rpm     MD5: bdd8a78efcf60fbc11c7c2dbb504c09d
SHA-256: b8149ddb0d947c84f8fb4befc17e471afc3ac6f9e7af2ef40921669197843190
 
IA-64:
talk-0.17-31.el5.ia64.rpm     MD5: eb0b3f6d3afefa911ee17fc71aa94f7f
SHA-256: 53f340b3268cf31ba7076aa3d7f505b3cf457a508d2850862ab741f17a89be92
talk-server-0.17-31.el5.ia64.rpm     MD5: 4932e0d6f6c50842818d4cbd9b795147
SHA-256: f36c1a572327e7328baa7bb586d17051de5b37b8766df557fe8d89131adf63f1
 
PPC:
talk-0.17-31.el5.ppc.rpm     MD5: a0cfb8783b4812cbf51a4fab61940545
SHA-256: 084d9c60c3b71de813ff306245b1f36b3c2d72d75f4b43836e83f600b9159d10
talk-server-0.17-31.el5.ppc.rpm     MD5: 6556516f0d7e6dde4d76dcecd27f7fde
SHA-256: 8022170f9f21af1439c76362f387aa862a365edf412fad16c3dff75c85cd166a
 
s390x:
talk-0.17-31.el5.s390x.rpm     MD5: 4dde7b0731cad5b8907a00978829a156
SHA-256: ca787e927c8d41a39453e44bf97c830bdcb30f72ddd3239da726aa27cfc1aa2c
talk-server-0.17-31.el5.s390x.rpm     MD5: 9ff9d8b840fde115b680a7debe97d50d
SHA-256: c39aec118f75548bf62d1998289f3b344af8d02725384ad376e928df19f76c3e
 
x86_64:
talk-0.17-31.el5.x86_64.rpm     MD5: 7564ccdb14294d37e822dc390ce7a261
SHA-256: 74568a9ff41a60ed23658e7cc6d2b50765ab09454bee4324c59acb508223ade6
talk-server-0.17-31.el5.x86_64.rpm     MD5: cc1cf7f006b8b85cec82155d682c37c7
SHA-256: 73d48ae99e3848d256e5e30e6247b52aa2b16b85c9070e836465b8f61a697ddf
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
talk-0.17-31.el5.src.rpm     MD5: 1593c9281fd46c54e2b3f89ac095f159
SHA-256: a182c2c96bddbaf6b561e05f0155de43663a83561226e61cf8ffe2c9b53610db
 
IA-32:
talk-0.17-31.el5.i386.rpm     MD5: ccee64cd123ec2abca8bb265abf9d601
SHA-256: 83c6939b9a73d83b60b20a4cb56081cec7409a25363d3a0162960759b77db338
talk-server-0.17-31.el5.i386.rpm     MD5: bdd8a78efcf60fbc11c7c2dbb504c09d
SHA-256: b8149ddb0d947c84f8fb4befc17e471afc3ac6f9e7af2ef40921669197843190
 
x86_64:
talk-0.17-31.el5.x86_64.rpm     MD5: 7564ccdb14294d37e822dc390ce7a261
SHA-256: 74568a9ff41a60ed23658e7cc6d2b50765ab09454bee4324c59acb508223ade6
talk-server-0.17-31.el5.x86_64.rpm     MD5: cc1cf7f006b8b85cec82155d682c37c7
SHA-256: 73d48ae99e3848d256e5e30e6247b52aa2b16b85c9070e836465b8f61a697ddf
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/