- Issued:
- 2013-11-13
- Updated:
- 2013-11-13
RHBA-2013:1515 - Bug Fix Advisory
Synopsis
hwcert-client-1.6 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated hwcert-client packages that fixes several bugs and adds multiple
enhancements are now available for Red Hat Enterprise Linux Hardware
Certification.
Description
hwcert-client, the Red Hat Enterprise Linux hardware certification test suite,
verifies the compatibility of hardware devices. Each hwcert-client test run
builds a results database for submission to Red Hat's hardware catalog as an RPM
package. hwcert-client replaces v7, and Red Hat Hardware Test Suite (HTS) for
certifying hardware for use with Red Hat Enterprise Linux.
This updated hwcert-client package includes numerous enhancements. Space
precludes documenting all of these changes in this advisory. Users are directed
to the Red Hat Enterprise Linux Hardware Certification Test Suite Technical
Notes for information on the most significant of these changes:
Users of hwcert-client are advised to upgrade to these updated packages, which
add these enhancements.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Hardware Certification Test Suite 6 x86_64
- Red Hat Hardware Certification Test Suite 6 s390x
- Red Hat Hardware Certification Test Suite 6 ppc64
- Red Hat Hardware Certification Test Suite 6 i386
Fixes
- BZ - 960470 - [FEAT] USB test need to list usb version related info for tested port
- BZ - 1001308 - FEAT: expresscard test should use dmidecode data to plan expresscard test
- BZ - 1001807 - FEAT: hwcert-client should indicate why it hasn't defaulted a plan item that is present
- BZ - 1010414 - Hwcert Traceback when selecting n to submitting to test server
- BZ - 1012941 - hwcert server start/status has lmbench and httpd errors
- BZ - 1012966 - hwcert-backend save error saving from files stored on local hwcert-server
- BZ - 1013046 - hwcert command does not offer the option to save results to the local test server
- BZ - 1013159 - hwcert-backend submit tracebacks when listing files
- BZ - 1013769 - USB3 doesn't retry
- BZ - 1013787 - hwcert-backend submit traceback on submit
- BZ - 1014419 - traceback after successful hwcert-backend submit
- BZ - 1014441 - submit traceback on printing catalog error code
- BZ - 1014792 - default catalog URL should be the partners' server for 1.6.5 beta
- BZ - 1015196 - hwcert command should ask for login/password on login failure from catalog.
- BZ - 1021734 - hwcert-client 1.6.5 GA should point to the hardware.redhat.com catalog
- BZ - 1028244 - hwcert-client tries to install kabi-whitelists for the info tests, but RHEL 6.5 renamed the package
CVEs
(none)
Red Hat Hardware Certification Test Suite 6
SRPM | |
---|---|
hwcert-client-1.6.5-25.1.el6.src.rpm | SHA-256: 2e7a2c6bf09927a7803432f5d87b320a69e48aa9796601e457914243003c5631 |
x86_64 | |
hwcert-client-1.6.5-25.1.el6.noarch.rpm | SHA-256: 7a57f58eb9257ef20017f591f44cb71a2969d99ab5ffeef033e82a62b46b0860 |
hwcert-client-info-1.6.5-25.1.el6.noarch.rpm | SHA-256: 2a89efc3469eed4bb73f68401649942bcfbe7789eb32460054b62e3483c81e7f |
hwcert-server-1.6.5-25.1.el6.noarch.rpm | SHA-256: 0ee71e58f58caa7bb18b4913700bac8329c20dcca6aef2c7be1c7f08c7001adc |
s390x | |
hwcert-client-1.6.5-25.1.el6.noarch.rpm | SHA-256: 7a57f58eb9257ef20017f591f44cb71a2969d99ab5ffeef033e82a62b46b0860 |
hwcert-client-info-1.6.5-25.1.el6.noarch.rpm | SHA-256: 2a89efc3469eed4bb73f68401649942bcfbe7789eb32460054b62e3483c81e7f |
hwcert-server-1.6.5-25.1.el6.noarch.rpm | SHA-256: 0ee71e58f58caa7bb18b4913700bac8329c20dcca6aef2c7be1c7f08c7001adc |
ppc64 | |
hwcert-client-1.6.5-25.1.el6.noarch.rpm | SHA-256: 7a57f58eb9257ef20017f591f44cb71a2969d99ab5ffeef033e82a62b46b0860 |
hwcert-client-info-1.6.5-25.1.el6.noarch.rpm | SHA-256: 2a89efc3469eed4bb73f68401649942bcfbe7789eb32460054b62e3483c81e7f |
hwcert-server-1.6.5-25.1.el6.noarch.rpm | SHA-256: 0ee71e58f58caa7bb18b4913700bac8329c20dcca6aef2c7be1c7f08c7001adc |
i386 | |
hwcert-client-1.6.5-25.1.el6.noarch.rpm | SHA-256: 7a57f58eb9257ef20017f591f44cb71a2969d99ab5ffeef033e82a62b46b0860 |
hwcert-client-info-1.6.5-25.1.el6.noarch.rpm | SHA-256: 2a89efc3469eed4bb73f68401649942bcfbe7789eb32460054b62e3483c81e7f |
hwcert-server-1.6.5-25.1.el6.noarch.rpm | SHA-256: 0ee71e58f58caa7bb18b4913700bac8329c20dcca6aef2c7be1c7f08c7001adc |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.