Skip to navigation

Bug Fix Advisory certmonger bug fix and enhancement update

Advisory: RHBA-2011:0570-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2011-05-19
Last updated on: 2011-05-19
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An updated certmonger package that fixes several bugs and adds various
enhancements is now available for Red Hat Enterprise Linux 6.

The certmonger utility monitors certificate expiration and can refresh
certificates with the CAs (certifying authorities) in networks that use
public-key infrastructure (PKI).

This updated certmonger package includes numerous bug fixes and enhancements.
Space precludes documenting all of these changes in this advisory. Users are
directed to the Red Hat Enterprise Linux 6.1 Technical Notes for information on
the most significant of these changes:

https://docs.redhat.com/docs/en-US/Red_Hat_Enterprise_Linux/6/html/6.1_Technical_Notes/index.html

All certmonger users are advised to upgrade to these updated packages, which
provide numerous bug fixes and enhancements.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
certmonger-0.42-1.el6.src.rpm
File outdated by:  RHBA-2013:0320
    MD5: 0be0f9363f701a8b92a5015ca9334d42
SHA-256: 1517e7e9703c233754916bd7ae9346954d0ee9024e85f1c9d239616c0170aa41
 
IA-32:
certmonger-0.42-1.el6.i686.rpm
File outdated by:  RHBA-2013:0320
    MD5: abaef19857ba8f48cb2b2a7efb693152
SHA-256: aae1ece7f6f45cc313c871330b35df2465d645279f775867c9c92e858f57c13b
certmonger-debuginfo-0.42-1.el6.i686.rpm
File outdated by:  RHBA-2013:0320
    MD5: 6c837399481da9eb3814b856560fb2e2
SHA-256: 6c49705b4e1c6a5a643e0ac238a7c185f96c840dfbc337cedc5c09d13c3e2fd7
 
x86_64:
certmonger-0.42-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:0320
    MD5: c68cc45239ae1711231aef27adda0723
SHA-256: 4fe07c94b5c693fe16b8d172d343a69de8f647c51479c5509b59c38b775a19de
certmonger-debuginfo-0.42-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:0320
    MD5: e9f3a06bd0e2e1e39e1b109ff8a010ca
SHA-256: 5b7994977c9468ece5534b8609dc94290abce42b0285886a4414af6d0fdd44d7
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
certmonger-0.42-1.el6.src.rpm
File outdated by:  RHBA-2013:0320
    MD5: 0be0f9363f701a8b92a5015ca9334d42
SHA-256: 1517e7e9703c233754916bd7ae9346954d0ee9024e85f1c9d239616c0170aa41
 
IA-32:
certmonger-0.42-1.el6.i686.rpm
File outdated by:  RHBA-2013:0320
    MD5: abaef19857ba8f48cb2b2a7efb693152
SHA-256: aae1ece7f6f45cc313c871330b35df2465d645279f775867c9c92e858f57c13b
certmonger-debuginfo-0.42-1.el6.i686.rpm
File outdated by:  RHBA-2013:0320
    MD5: 6c837399481da9eb3814b856560fb2e2
SHA-256: 6c49705b4e1c6a5a643e0ac238a7c185f96c840dfbc337cedc5c09d13c3e2fd7
 
PPC:
certmonger-0.42-1.el6.ppc64.rpm
File outdated by:  RHBA-2013:0320
    MD5: 2ce167a841626e2d4d24e039fc016a09
SHA-256: 3e54dd576746090726e9fcc05f0c5cae4ce6df8174bf3f5c813e1bebd207208b
certmonger-debuginfo-0.42-1.el6.ppc64.rpm
File outdated by:  RHBA-2013:0320
    MD5: a5cc66b681b17a3e8135743ee882cbbb
SHA-256: 3b8e2ba2dfe53e24a72f982525bbac497176fc79c6c75c401c731d8d12e94759
 
s390x:
certmonger-0.42-1.el6.s390x.rpm
File outdated by:  RHBA-2013:0320
    MD5: 78c03204a47abfef3a031c9652325fb3
SHA-256: cac1126c5459040e566761b894c84e471a97d81f9882b62a96b514d1a76e21bb
certmonger-debuginfo-0.42-1.el6.s390x.rpm
File outdated by:  RHBA-2013:0320
    MD5: fd0661eab760069faa6bb1a872a5fd88
SHA-256: 428a5763dd2b0514b54b463c60c4513872ebc3ad090b7485eb8db10928ce2675
 
x86_64:
certmonger-0.42-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:0320
    MD5: c68cc45239ae1711231aef27adda0723
SHA-256: 4fe07c94b5c693fe16b8d172d343a69de8f647c51479c5509b59c38b775a19de
certmonger-debuginfo-0.42-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:0320
    MD5: e9f3a06bd0e2e1e39e1b109ff8a010ca
SHA-256: 5b7994977c9468ece5534b8609dc94290abce42b0285886a4414af6d0fdd44d7
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
certmonger-0.42-1.el6.src.rpm
File outdated by:  RHBA-2013:0320
    MD5: 0be0f9363f701a8b92a5015ca9334d42
SHA-256: 1517e7e9703c233754916bd7ae9346954d0ee9024e85f1c9d239616c0170aa41
 
IA-32:
certmonger-0.42-1.el6.i686.rpm
File outdated by:  RHBA-2013:0320
    MD5: abaef19857ba8f48cb2b2a7efb693152
SHA-256: aae1ece7f6f45cc313c871330b35df2465d645279f775867c9c92e858f57c13b
certmonger-debuginfo-0.42-1.el6.i686.rpm
File outdated by:  RHBA-2013:0320
    MD5: 6c837399481da9eb3814b856560fb2e2
SHA-256: 6c49705b4e1c6a5a643e0ac238a7c185f96c840dfbc337cedc5c09d13c3e2fd7
 
x86_64:
certmonger-0.42-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:0320
    MD5: c68cc45239ae1711231aef27adda0723
SHA-256: 4fe07c94b5c693fe16b8d172d343a69de8f647c51479c5509b59c38b775a19de
certmonger-debuginfo-0.42-1.el6.x86_64.rpm
File outdated by:  RHBA-2013:0320
    MD5: e9f3a06bd0e2e1e39e1b109ff8a010ca
SHA-256: 5b7994977c9468ece5534b8609dc94290abce42b0285886a4414af6d0fdd44d7
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

624142 - certmonger defunct process ipa-submit
624143 - RFE: there is no way to pass in a key or database password on start-tracking
636894 - certmonger fails to start on new install
643561 - Rebase certmonger to at least 0.32
652047 - Unhelpful message from ipa-getcert
652049 - No output from ipa-getcert list
688229 - certmonger accepts a non-existent pin file for NSS db(with empty passwd) when '-p' option is supplied to 'ipa-getcert request'
689776 - Certmonger segfaults when certificate request contains non-existent NSS database directory.
690886 - ipa-submit crashed
691351 - Segmentation fault when invalid Extended Key Usage is provided in Certificate Request
695672 - Subject and Principal name switches are not working in case of 'getcert resubmit'
695675 - certificate is not generated after changing the SELinux context of directory
696185 - Segmentation fault on providing all four parameters (EKU, DNS, Email, Principal name) with start-tracking



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/