Skip to navigation

Bug Fix Advisory m2crypto bug fix and enhancement update

Advisory: RHBA-2013:0020-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2013-01-07
Last updated on: 2013-01-07
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

Updated m2crypto packages that fix one bug and add one enhancement are now
available for Red Hat Enterprise Linux 5.

The m2crypto library allows Python programs to call OpenSSL functions.

This update fixes the following bug:

* M2Crypto generated an invalid exception object on SSL timeouts, causing an
IndexError in the Python httplib module. This made it impossible to correctly
handle SSL timeouts in applications. This updated package adds the required
attributes to the SSL timeout exception object and lets httplib process this
information correctly. (BZ#520817)

This update also adds the following enhancement:

* The M2Crypto.httpslib.HTTPSConnection class always created an IPv4 socket.
This made it impossible to connect to IPv6 servers using this class. With this
update, the implementation now correctly creates an IPv4 or IPv6 socket, as
necessary, thus adding support for IPv6 servers. (BZ#761596)

All users of m2crypto are advised to upgrade to these updated packages, which
fix this bug and add this enhancement.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
m2crypto-0.16-9.el5.src.rpm     MD5: 2b1d0ab21c0db49be6cb978dc1e5caec
SHA-256: febed8e7b856dadc0b2f3bae8cf5520796c47fc065b32c77534346d9efc5b3ad
 
IA-32:
m2crypto-0.16-9.el5.i386.rpm     MD5: e2effa0c7418c5c3a1606cee2407be25
SHA-256: 48a18a531ed44bc4143e6dc7f27bb0521197825f1db5ad1a9d126e9811f9871d
m2crypto-debuginfo-0.16-9.el5.i386.rpm     MD5: ab64a4280ec68d3999e7a9c7f768501b
SHA-256: ae710d95808797a191b6622c988562c948661f4ddeadc553e87dba9ee68cecd6
 
IA-64:
m2crypto-0.16-9.el5.ia64.rpm     MD5: 17fecae8cb5c4c7d26366b3fd2822eb5
SHA-256: 557033048c7870349eda571e99cbde3de6af81a6d3cf4f0ec936394c4fb8baf5
m2crypto-debuginfo-0.16-9.el5.ia64.rpm     MD5: 384909b67411e810c55cf0a1074a115d
SHA-256: 60f0ffd40f6292679329d40a8594a2e465c7091f3d9757a03716abdbff917c00
 
PPC:
m2crypto-0.16-9.el5.ppc.rpm     MD5: 20e23f0d099b5ccf357bd702e5f0ca2b
SHA-256: c187fff6910abdf86b466c79b51e25bf39b2bf8d7249597a7832436159b80b3f
m2crypto-debuginfo-0.16-9.el5.ppc.rpm     MD5: 44eed14caeacacfe00ed39f9f78027df
SHA-256: 1db364f26fabcfeba8acbd774a144b59a7428f2dc2ba70a56d6a86ac2aed8702
 
s390x:
m2crypto-0.16-9.el5.s390x.rpm     MD5: f3a0ba45700292dbb69a6ecb56ac9a4a
SHA-256: 0ebcaa34e8b34a560e980752ccb40e7fda75db26476cef967009ff742bc5d4c5
m2crypto-debuginfo-0.16-9.el5.s390x.rpm     MD5: c697283073822d88d2eff615ffafe569
SHA-256: 5d61a6259ff7f1da5fefe1b4d4dfa254879c2dbfcefbb56114cc4db61d521243
 
x86_64:
m2crypto-0.16-9.el5.x86_64.rpm     MD5: cf73fda52d071ad7125e38b06d531297
SHA-256: 3a0be0587bb81d82b3b1793bab42d28989136bd7a6ea4e264631a0b1e6f91621
m2crypto-debuginfo-0.16-9.el5.x86_64.rpm     MD5: ee08a134418cd225e389a242cc11c75c
SHA-256: 564b89b4c73285db7bae782049cfb576266a2955e53f8f3ec91acc1a3e164b45
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
m2crypto-0.16-9.el5.src.rpm     MD5: 2b1d0ab21c0db49be6cb978dc1e5caec
SHA-256: febed8e7b856dadc0b2f3bae8cf5520796c47fc065b32c77534346d9efc5b3ad
 
IA-32:
m2crypto-0.16-9.el5.i386.rpm     MD5: e2effa0c7418c5c3a1606cee2407be25
SHA-256: 48a18a531ed44bc4143e6dc7f27bb0521197825f1db5ad1a9d126e9811f9871d
m2crypto-debuginfo-0.16-9.el5.i386.rpm     MD5: ab64a4280ec68d3999e7a9c7f768501b
SHA-256: ae710d95808797a191b6622c988562c948661f4ddeadc553e87dba9ee68cecd6
 
x86_64:
m2crypto-0.16-9.el5.x86_64.rpm     MD5: cf73fda52d071ad7125e38b06d531297
SHA-256: 3a0be0587bb81d82b3b1793bab42d28989136bd7a6ea4e264631a0b1e6f91621
m2crypto-debuginfo-0.16-9.el5.x86_64.rpm     MD5: ee08a134418cd225e389a242cc11c75c
SHA-256: 564b89b4c73285db7bae782049cfb576266a2955e53f8f3ec91acc1a3e164b45
 
(The unlinked packages above are only available from the Red Hat Network)


These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/