Updated finger packages that fix one bug are now available for Red HatEnterprise Linux 6.

The finger utility allows users to display information about users on thesystem, including their login names, full names, and the time they logged in tothe system.The update fixes the following bug:* When the “compat” method is specified in the nsswitch.conf file, specialentries containing the “+” or “-” characters are allowed to be used in the/etc/passwd file. Previously, when the finger utility was run with a “username”argument on a host that had the special entries in /etc/passwd, fingerterminated with a segmentation fault. With this update, the code that handlesthe “username” argument has been fixed to perform the necessary checks and thefinger utility no longer crashes in the described scenario. (BZ#816328)All users of finger are advised to upgrade to these updated packages, which fixthis bug.
Before applying this update, make sure all previously released erratarelevant to your system have been applied.This update is available via the Red Hat Network. Details on how touse the Red Hat Network to apply this update are available athttps://access.redhat.com/site/articles/11258Red Hat Enterprise Linux Desktop FasTrack (v. 6)

SRPMS:
finger-0.17-40.el6.src.rpm
    MD5: 659e70e0b2b6f09aaa9bc6c7773d69adSHA-256: 83c8cfb9ce044032e41d8390b2d5bb18b5ae47292442d51c0c45c463ff2812a3
 
IA-32:
finger-0.17-40.el6.i686.rpm
    MD5: 7af2556ad6e4cab4b5304c1175f5ae16SHA-256: 3ed8ea7179d4d1ac8e8fe07bbea3d99f0682657b0e6a1dba463c426bb2581b05
finger-debuginfo-0.17-40.el6.i686.rpm
    MD5: d40e6b7d88798f0abffc47ad092393b3SHA-256: 1a192a363db556488852ee9a428a104b81537262da18356091ef17c45ebbebc6
finger-server-0.17-40.el6.i686.rpm
    MD5: 7db46f6039e6aff09df00646abfe696aSHA-256: 81a5ee4265209b5511dd28fd30d25c32a212e8172e6cb41888377e0b50c01092
 
x86_64:
finger-0.17-40.el6.x86_64.rpm
    MD5: ed297480ea8c96bba28808ccdbb4f13fSHA-256: 18dc32038497e1aa367a306552cc83574279bf6b8ec38a4e660d8e69a90209e1
finger-debuginfo-0.17-40.el6.x86_64.rpm
    MD5: 33f12a0d343ee782d554627e81a41689SHA-256: 00ca8dd22082f813060628ad4109273a9ee7a5b765bc32d0549f8a2d5d14d527
finger-server-0.17-40.el6.x86_64.rpm
    MD5: 4e1d8fddcd1aca1ee28e9946e98be89dSHA-256: 75dacc9905ba63cfe07834fa95cc6744eeb8dd63a0065e0a25c05a0b083c13b3
 
Red Hat Enterprise Linux HPC Node FasTrack (v. 6)

SRPMS:
finger-0.17-40.el6.src.rpm
    MD5: 659e70e0b2b6f09aaa9bc6c7773d69adSHA-256: 83c8cfb9ce044032e41d8390b2d5bb18b5ae47292442d51c0c45c463ff2812a3
 
x86_64:
finger-0.17-40.el6.x86_64.rpm
    MD5: ed297480ea8c96bba28808ccdbb4f13fSHA-256: 18dc32038497e1aa367a306552cc83574279bf6b8ec38a4e660d8e69a90209e1
finger-debuginfo-0.17-40.el6.x86_64.rpm
    MD5: 33f12a0d343ee782d554627e81a41689SHA-256: 00ca8dd22082f813060628ad4109273a9ee7a5b765bc32d0549f8a2d5d14d527
finger-server-0.17-40.el6.x86_64.rpm
    MD5: 4e1d8fddcd1aca1ee28e9946e98be89dSHA-256: 75dacc9905ba63cfe07834fa95cc6744eeb8dd63a0065e0a25c05a0b083c13b3
 
Red Hat Enterprise Linux Server FasTrack (v. 6)

SRPMS:
finger-0.17-40.el6.src.rpm
    MD5: 659e70e0b2b6f09aaa9bc6c7773d69adSHA-256: 83c8cfb9ce044032e41d8390b2d5bb18b5ae47292442d51c0c45c463ff2812a3
 
IA-32:
finger-0.17-40.el6.i686.rpm
    MD5: 7af2556ad6e4cab4b5304c1175f5ae16SHA-256: 3ed8ea7179d4d1ac8e8fe07bbea3d99f0682657b0e6a1dba463c426bb2581b05
finger-debuginfo-0.17-40.el6.i686.rpm
    MD5: d40e6b7d88798f0abffc47ad092393b3SHA-256: 1a192a363db556488852ee9a428a104b81537262da18356091ef17c45ebbebc6
finger-server-0.17-40.el6.i686.rpm
    MD5: 7db46f6039e6aff09df00646abfe696aSHA-256: 81a5ee4265209b5511dd28fd30d25c32a212e8172e6cb41888377e0b50c01092
 
PPC:
finger-0.17-40.el6.ppc64.rpm
    MD5: 62fac2f25de02c47a79655039a90b509SHA-256: 28457debcc31ce3302a1a400f8010a9a272c86cd910722a7393c7b451a167132
finger-debuginfo-0.17-40.el6.ppc64.rpm
    MD5: ba3634971c60754e4616b1f990e869e6SHA-256: e4ac73844972113e90b6ec1b16a5e60881deaaf50d4a60b15eebae30bd864293
finger-server-0.17-40.el6.ppc64.rpm
    MD5: 8849e2931f85bfe754fa8c0ec5b1c354SHA-256: a3f93c56e9825a855e1fdfd1954f4b933a34d2d5094e29e5080b0ecfdeb247dc
 
s390x:
finger-0.17-40.el6.s390x.rpm
    MD5: 4b88512038094305e5323fbbdccf7cadSHA-256: ee6825eed0abf1674ece3ce13dfbee36927bcf7e6e5fb92235ebcdc3ed9300d3
finger-debuginfo-0.17-40.el6.s390x.rpm
    MD5: 7cc1583579d5a6a8d43b71697dfa7ae8SHA-256: d6e48287f20b71d25ac095a863929a520a61bdb7b7fe319d9326a391ec64bb30
finger-server-0.17-40.el6.s390x.rpm
    MD5: 14560721977fd74a7ebf3c05426ebdddSHA-256: 2a02ecad5d6e34450880624b4953136b3e9279d84fd56e44b3e07cff367c0add
 
x86_64:
finger-0.17-40.el6.x86_64.rpm
    MD5: ed297480ea8c96bba28808ccdbb4f13fSHA-256: 18dc32038497e1aa367a306552cc83574279bf6b8ec38a4e660d8e69a90209e1
finger-debuginfo-0.17-40.el6.x86_64.rpm
    MD5: 33f12a0d343ee782d554627e81a41689SHA-256: 00ca8dd22082f813060628ad4109273a9ee7a5b765bc32d0549f8a2d5d14d527
finger-server-0.17-40.el6.x86_64.rpm
    MD5: 4e1d8fddcd1aca1ee28e9946e98be89dSHA-256: 75dacc9905ba63cfe07834fa95cc6744eeb8dd63a0065e0a25c05a0b083c13b3
 
Red Hat Enterprise Linux Workstation FasTrack (v. 6)

SRPMS:
finger-0.17-40.el6.src.rpm
    MD5: 659e70e0b2b6f09aaa9bc6c7773d69adSHA-256: 83c8cfb9ce044032e41d8390b2d5bb18b5ae47292442d51c0c45c463ff2812a3
 
IA-32:
finger-0.17-40.el6.i686.rpm
    MD5: 7af2556ad6e4cab4b5304c1175f5ae16SHA-256: 3ed8ea7179d4d1ac8e8fe07bbea3d99f0682657b0e6a1dba463c426bb2581b05
finger-debuginfo-0.17-40.el6.i686.rpm
    MD5: d40e6b7d88798f0abffc47ad092393b3SHA-256: 1a192a363db556488852ee9a428a104b81537262da18356091ef17c45ebbebc6
finger-server-0.17-40.el6.i686.rpm
    MD5: 7db46f6039e6aff09df00646abfe696aSHA-256: 81a5ee4265209b5511dd28fd30d25c32a212e8172e6cb41888377e0b50c01092
 
x86_64:
finger-0.17-40.el6.x86_64.rpm
    MD5: ed297480ea8c96bba28808ccdbb4f13fSHA-256: 18dc32038497e1aa367a306552cc83574279bf6b8ec38a4e660d8e69a90209e1
finger-debuginfo-0.17-40.el6.x86_64.rpm
    MD5: 33f12a0d343ee782d554627e81a41689SHA-256: 00ca8dd22082f813060628ad4109273a9ee7a5b765bc32d0549f8a2d5d14d527
finger-server-0.17-40.el6.x86_64.rpm
    MD5: 4e1d8fddcd1aca1ee28e9946e98be89dSHA-256: 75dacc9905ba63cfe07834fa95cc6744eeb8dd63a0065e0a25c05a0b083c13b3
 
(The unlinked packages above are only available from the Red Hat Network)
816328 – finger segfaults if pw->pw_gecos is NULL.

These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply