- Issued:
- 2012-09-28
- Updated:
- 2012-09-28
RHBA-2012:1316 - Bug Fix Advisory
Synopsis
pki bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated pki packages that fix three bugs and add one enhancement are now
available for Red Hat Certificate System 8.1.
Description
The Red Hat Certificate System (RHCS) is an enterprise software system designed
to manage enterprise public key infrastructure (PKI) deployments.
This update fixes the following bugs:
- Prior to this update, the pki-tps package could not run the self test for
selftests.container.instance.TKSKnownSessionKey and failed to start up. This
update modifies the underlying code to run the self test and start up
pki-tks. (BZ#849027)
- Prior to this update, the internal database in the certificate status thread
allowed Lightweight Directory Access Protocol (LDAP) anonymous access to RHCS
when authenticating SSL clients from the certificate authority (CA) to LDAP in
the internal database. This update removes anonymous binds from the internal
database. (BZ#852855)
- Prior to this update, new CA instances could, under certain circumstances,
fail with the the error message "Could not initialize the class
java.util.logging.LogManager." This update modifies the underlying code to allow
CA instances to start as expected. (BZ#854824)
This update also adds the following enhancement:
- Prior to this update, Red Hat Certificate System always formatted and
reused tokens that were flagged as "Terminated." This update can disallow these
tokens to be formatted and reused. (BZ#844800)
All users of Red Hat Certificate System 8.1 are advised to upgrade to these
updated packages, which fix these bugs. After installing this update, all Red
Hat Certificate System subsystems must be restarted for the update to take
effect.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Certificate System 8 x86_64
- Red Hat Certificate System 8 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Certificate System 8
SRPM | |
---|---|
pki-ca-8.1.1-1.el5pki.src.rpm | SHA-256: 3a116ca09c244d2f8baab70993ae4ba139db1e87d51fdeb2e49d82bf0f2d1ad3 |
pki-common-8.1.3-1.el5pki.src.rpm | SHA-256: d0577b2090cbde50a47df4647504f2a14157fa16df16aa69aaa119796dc31e14 |
pki-kra-8.1.1-1.el5pki.src.rpm | SHA-256: 6a49863aee63f5f5465a6ba947c8b86ab078a1cf6452126a0821d26f66ac18fa |
pki-ocsp-8.1.1-1.el5pki.src.rpm | SHA-256: e57257dc2c7e6c53489cfa13efb14581ced7d42e0f08d60a7a1f09de41bb9197 |
pki-tks-8.1.1-1.el5pki.src.rpm | SHA-256: 3aeee880352f2d413726178047a3c40efe6297bf22a62c8f8e06d3c9fcac93c3 |
pki-tps-8.1.3-1.el5pki.src.rpm | SHA-256: 9edb84cc7f4a85efd52179aaf9af3e4abe970cbbf7c2be892dd4d4e81b09e417 |
symkey-1.2.1-1.el5pki.src.rpm | SHA-256: 77dd738c950da86420fd148014c5c9586de072f9a2f95b3ec044b54b2c9e0bda |
x86_64 | |
pki-ca-8.1.1-1.el5pki.noarch.rpm | SHA-256: 8bd3f80d33449633d91f661c7588046ac9d5e6a4feaeb375d9599be407a318f2 |
pki-common-8.1.3-1.el5pki.noarch.rpm | SHA-256: b492cfd789565998010183d150416cc9af473eaa70d882fb59336daaddd57e70 |
pki-common-javadoc-8.1.3-1.el5pki.noarch.rpm | SHA-256: 8f8915a1916d7c9094c888174e35ba285bbfab2c72c9285464d9d89ad518b155 |
pki-kra-8.1.1-1.el5pki.noarch.rpm | SHA-256: 35b0ddc14ba9c1d47677d62b6efccee1dfa27ec8402458d45f01b346b2151aad |
pki-ocsp-8.1.1-1.el5pki.noarch.rpm | SHA-256: 916efeef13fe9ac0a167156322b9c5d9c9ec08d7445d7d5bf7b009058df75894 |
pki-tks-8.1.1-1.el5pki.noarch.rpm | SHA-256: e6dffcb666e98036757fe8a12b9a3e760a9ef3bdefe5d279faebe42084da31a3 |
pki-tps-8.1.3-1.el5pki.x86_64.rpm | SHA-256: 3e2908c1ea49e9cff3c56bb5d326b1f9c2694851349e8af1d4cc9bc2337ca0f8 |
symkey-1.2.1-1.el5pki.x86_64.rpm | SHA-256: 0deb42df9f0fe93b5ca20478122c395528f60531b7382accf839ddf078a3b08c |
i386 | |
pki-ca-8.1.1-1.el5pki.noarch.rpm | SHA-256: 8bd3f80d33449633d91f661c7588046ac9d5e6a4feaeb375d9599be407a318f2 |
pki-common-8.1.3-1.el5pki.noarch.rpm | SHA-256: b492cfd789565998010183d150416cc9af473eaa70d882fb59336daaddd57e70 |
pki-common-javadoc-8.1.3-1.el5pki.noarch.rpm | SHA-256: 8f8915a1916d7c9094c888174e35ba285bbfab2c72c9285464d9d89ad518b155 |
pki-kra-8.1.1-1.el5pki.noarch.rpm | SHA-256: 35b0ddc14ba9c1d47677d62b6efccee1dfa27ec8402458d45f01b346b2151aad |
pki-ocsp-8.1.1-1.el5pki.noarch.rpm | SHA-256: 916efeef13fe9ac0a167156322b9c5d9c9ec08d7445d7d5bf7b009058df75894 |
pki-tks-8.1.1-1.el5pki.noarch.rpm | SHA-256: e6dffcb666e98036757fe8a12b9a3e760a9ef3bdefe5d279faebe42084da31a3 |
pki-tps-8.1.3-1.el5pki.i386.rpm | SHA-256: dc03f1fbce48432b3bdaa4233b7accce5735c5d9f511c767bf5471da9877db39 |
symkey-1.2.1-1.el5pki.i386.rpm | SHA-256: 7b60dc8ba3c7dd6054f84e6bca15cdd3c353747abfba5dfb5cbf5e0de3bafc86 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.