- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHEA-2009:0151 - Product Enhancement Advisory
Synopsis
ccid enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An enhanced ccid package that adds support for additional CCID readers is
now available.
Description
Chip/Smart Card Interface Devices (CCID) is a USB smart card reader
standard followed by most modern smart card readers. The ccid package is a
Generic, USB-based CCID driver which provides support for readers which
follow this standard.
This package has been updated to add support for several new CCID readers,
including the Hewlett-Packard USB Smart Card Keyboard and the integrated
smart card reader in the Dell(r) Precision M6300 Workstation.
This update also corrects a typo in the ccid.spec file. The "Release:" line
has been corrected from "%{dist}" to "%{?dist}". If you build the ccid
package from source rather than use a pre-built binary rpm, this correction
ensures the resultant binary rpm file-name properly reflects the targeted
distribution and distribution version.
All smart card users should install this updated package.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 440609 - there should be %{?dist} instead of %{dist} in the *.spec on the Release: line
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
ccid-1.3.8-1.el5.src.rpm | SHA-256: 9f4a80156192d4e3940e6fa191faeb95c82b1e94003318377053cd05c6629841 |
x86_64 | |
ccid-1.3.8-1.el5.x86_64.rpm | SHA-256: 4fb64db3c585d633f7e4da7e5b72048d8d3c1eba8503542862eeb1d0a4b99d98 |
ia64 | |
ccid-1.3.8-1.el5.ia64.rpm | SHA-256: 51d40cd5e5de81777528cf2308ab8a33ac21eebb987518e5129da1a0a01f5fbb |
i386 | |
ccid-1.3.8-1.el5.i386.rpm | SHA-256: 98c692bbd1f4209a92e52de091e518a331661a0387f4aa450326831f9ca63f07 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
ccid-1.3.8-1.el5.src.rpm | SHA-256: 9f4a80156192d4e3940e6fa191faeb95c82b1e94003318377053cd05c6629841 |
x86_64 | |
ccid-1.3.8-1.el5.x86_64.rpm | SHA-256: 4fb64db3c585d633f7e4da7e5b72048d8d3c1eba8503542862eeb1d0a4b99d98 |
i386 | |
ccid-1.3.8-1.el5.i386.rpm | SHA-256: 98c692bbd1f4209a92e52de091e518a331661a0387f4aa450326831f9ca63f07 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
ccid-1.3.8-1.el5.src.rpm | SHA-256: 9f4a80156192d4e3940e6fa191faeb95c82b1e94003318377053cd05c6629841 |
x86_64 | |
ccid-1.3.8-1.el5.x86_64.rpm | SHA-256: 4fb64db3c585d633f7e4da7e5b72048d8d3c1eba8503542862eeb1d0a4b99d98 |
i386 | |
ccid-1.3.8-1.el5.i386.rpm | SHA-256: 98c692bbd1f4209a92e52de091e518a331661a0387f4aa450326831f9ca63f07 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
ccid-1.3.8-1.el5.src.rpm | SHA-256: 9f4a80156192d4e3940e6fa191faeb95c82b1e94003318377053cd05c6629841 |
ppc | |
ccid-1.3.8-1.el5.ppc.rpm | SHA-256: d837bba195e40301922844bfd1dcac92c56eca1442dd3ab0aaadcbba3c54b53b |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
ccid-1.3.8-1.el5.src.rpm | SHA-256: 9f4a80156192d4e3940e6fa191faeb95c82b1e94003318377053cd05c6629841 |
x86_64 | |
ccid-1.3.8-1.el5.x86_64.rpm | SHA-256: 4fb64db3c585d633f7e4da7e5b72048d8d3c1eba8503542862eeb1d0a4b99d98 |
i386 | |
ccid-1.3.8-1.el5.i386.rpm | SHA-256: 98c692bbd1f4209a92e52de091e518a331661a0387f4aa450326831f9ca63f07 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.