- Issued:
- 2013-03-25
- Updated:
- 2013-03-25
RHEA-2013:0676 - Product Enhancement Advisory
Synopsis
Red Hat Network Tools spacewalk-oscap enhancement update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated spacewalk-oscap package that adds one enhancement is now available
for Red Hat Network Tools.
Description
Red Hat Network Tools provide programs and libraries that allow your system to
use provisioning, monitoring, and configuration management capabilities provided
by Red Hat Network and Red Hat Network Satellite. The spacewalk-oscap package
contains a plug-in for rhn_check that allows the user running OpenSCAP scans
from the RHN Satellite server. OpenSCAP is a set of open source libraries that
support the Security Content Automation Protocol (SCAP) standards from the
National Institute of Standards and Technology (NIST).
This update adds the following enhancement:
- The spacewalk-oscap package has been updated to allow several new features for
the oscap command line tool, including the "--cpe" argument. (BZ#872248)
All users of Red Hat Network Tools are advised to upgrade to this updated
package, which adds this enhancement.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 6 x86_64
- Red Hat Enterprise Linux Server 6 i386
- Red Hat Enterprise Linux Workstation 6 x86_64
- Red Hat Enterprise Linux Workstation 6 i386
- Red Hat Enterprise Linux Desktop 6 x86_64
- Red Hat Enterprise Linux Desktop 6 i386
- Red Hat Enterprise Linux for IBM z Systems 6 s390x
- Red Hat Enterprise Linux for Power, big endian 6 ppc64
Fixes
- BZ - 872248 - RFE: spacewalk-oscap shall enable new features of OpenSCAP.
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 6
SRPM | |
---|---|
spacewalk-oscap-0.0.4-5.el6sat.src.rpm | SHA-256: 4bb7cb83d40cc06634b110ef6c0c8ac38ffda37017323bfa8312acfbd7c90dee |
x86_64 | |
spacewalk-oscap-0.0.4-5.el6sat.noarch.rpm | SHA-256: d96e8cac2d38e3508066e4cf257971a3fc7825ae003002ee812c40ee8d2e943e |
i386 | |
spacewalk-oscap-0.0.4-5.el6sat.noarch.rpm | SHA-256: d96e8cac2d38e3508066e4cf257971a3fc7825ae003002ee812c40ee8d2e943e |
Red Hat Enterprise Linux Workstation 6
SRPM | |
---|---|
spacewalk-oscap-0.0.4-5.el6sat.src.rpm | SHA-256: 4bb7cb83d40cc06634b110ef6c0c8ac38ffda37017323bfa8312acfbd7c90dee |
x86_64 | |
spacewalk-oscap-0.0.4-5.el6sat.noarch.rpm | SHA-256: d96e8cac2d38e3508066e4cf257971a3fc7825ae003002ee812c40ee8d2e943e |
i386 | |
spacewalk-oscap-0.0.4-5.el6sat.noarch.rpm | SHA-256: d96e8cac2d38e3508066e4cf257971a3fc7825ae003002ee812c40ee8d2e943e |
Red Hat Enterprise Linux Desktop 6
SRPM | |
---|---|
spacewalk-oscap-0.0.4-5.el6sat.src.rpm | SHA-256: 4bb7cb83d40cc06634b110ef6c0c8ac38ffda37017323bfa8312acfbd7c90dee |
x86_64 | |
spacewalk-oscap-0.0.4-5.el6sat.noarch.rpm | SHA-256: d96e8cac2d38e3508066e4cf257971a3fc7825ae003002ee812c40ee8d2e943e |
i386 | |
spacewalk-oscap-0.0.4-5.el6sat.noarch.rpm | SHA-256: d96e8cac2d38e3508066e4cf257971a3fc7825ae003002ee812c40ee8d2e943e |
Red Hat Enterprise Linux for IBM z Systems 6
SRPM | |
---|---|
spacewalk-oscap-0.0.4-5.el6sat.src.rpm | SHA-256: 4bb7cb83d40cc06634b110ef6c0c8ac38ffda37017323bfa8312acfbd7c90dee |
s390x | |
spacewalk-oscap-0.0.4-5.el6sat.noarch.rpm | SHA-256: d96e8cac2d38e3508066e4cf257971a3fc7825ae003002ee812c40ee8d2e943e |
Red Hat Enterprise Linux for Power, big endian 6
SRPM | |
---|---|
spacewalk-oscap-0.0.4-5.el6sat.src.rpm | SHA-256: 4bb7cb83d40cc06634b110ef6c0c8ac38ffda37017323bfa8312acfbd7c90dee |
ppc64 | |
spacewalk-oscap-0.0.4-5.el6sat.noarch.rpm | SHA-256: d96e8cac2d38e3508066e4cf257971a3fc7825ae003002ee812c40ee8d2e943e |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.