Skip to navigation

Bug Fix Advisory python-dmidecode bug fix update

Advisory: RHBA-2010:0695-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-09-13
Last updated on: 2010-09-13
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated python-dmidecode package that fixes a bug is now available.

The python-dmidecode module is a Python extension that uses the code-base of the
dmidecode utility, and presents the DMI data as Python dictionaries or XML
utilizing libxml2.

This update provides fixes for the following bugs:

* previously, the Python script would be stopped because of a assertion failure.
This was due to the DMI tables on certain hardware with which unexpectedly
returned NULL values instead of a string. With this update, the script does not
anymore encounter assertion faults and processes NULL values correctly as empty
strings. (RHBZ#596133)

* previously a segmentation fault occured when trying to identify the processor
type via string comparison. This was due to the DMI tables on certain hardware
which did not report the CPU processor information as a string and returned NULL
instead. This update adds additional checks for NULL values before doing this
string comparison. (RHBZ#621837)

* previously, a large amount of duplicated warnings could appear in the output.
This was due to the DMI tables on certain hardware where the length description
did not match the length of the tables found on the system. With this update,
the logging function has been improved to avoid unnecessary duplication of
warnings. (RHBZ#621895)

All users of the python-dmidecode module are advised to upgrade to this updated
package, that addresses these issues.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
python-dmidecode-3.10.13-1.el5_5.1.src.rpm     MD5: 906e3e2cd3da9fe877942d2c0fd0b4d0
SHA-256: 9c2a04f5ff346f0cde08aad560046dc5add8767066db56383efc2d9f4fe9689e
 
IA-32:
python-dmidecode-3.10.13-1.el5_5.1.i386.rpm     MD5: b5bc88ea65e64cdff9bd405cf425c3f9
SHA-256: 4a4e20f6647ebcc1897dcf59af1c3c364b3786dae8c8a5ee3b8b138b58c532ca
 
IA-64:
python-dmidecode-3.10.13-1.el5_5.1.ia64.rpm     MD5: dcaed834e131cc5e6b6be6f5c3e20046
SHA-256: affa3b7d678c35e64bfcb87fdc9cf1ef1cc118cc4ecd093f1ddba6d8a1631fbc
 
PPC:
python-dmidecode-3.10.13-1.el5_5.1.ppc.rpm     MD5: 14d56a53bb37f623e2063f065cd84049
SHA-256: 8d8a30b7b893df06c27e92c1b98eb61c0efb1f1f84c8d4707c7f9a6dc18cd5a3
 
s390x:
python-dmidecode-3.10.13-1.el5_5.1.s390x.rpm     MD5: d9f452bb8b84e3f2e2c8a5571b4c0efd
SHA-256: 68796afebae1c32bfdcfd77813da3574a4cf73f80060764798bf125a1292d7e5
 
x86_64:
python-dmidecode-3.10.13-1.el5_5.1.x86_64.rpm     MD5: e3229333485859ab292e1d8bd00505a1
SHA-256: d3899279bde9b0a4115e2a2226e15fe8c5bc77008e7e17597cba8b09c8e09c5b
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
python-dmidecode-3.10.13-1.el5_5.1.src.rpm     MD5: 906e3e2cd3da9fe877942d2c0fd0b4d0
SHA-256: 9c2a04f5ff346f0cde08aad560046dc5add8767066db56383efc2d9f4fe9689e
 
IA-32:
python-dmidecode-3.10.13-1.el5_5.1.i386.rpm     MD5: b5bc88ea65e64cdff9bd405cf425c3f9
SHA-256: 4a4e20f6647ebcc1897dcf59af1c3c364b3786dae8c8a5ee3b8b138b58c532ca
 
x86_64:
python-dmidecode-3.10.13-1.el5_5.1.x86_64.rpm     MD5: e3229333485859ab292e1d8bd00505a1
SHA-256: d3899279bde9b0a4115e2a2226e15fe8c5bc77008e7e17597cba8b09c8e09c5b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

596133 - Assertion when decoding DMI type 0x08 on pogolinux-1.rhts.eng.rdu.redhat.com
621837 - Segfault when decoding DMI data in dmi_processor_id()
621895 - Wrong DMI structures length: 4760 bytes announced, ia64 only



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/