- Issued:
- 2013-10-08
- Updated:
- 2013-10-08
RHBA-2013:1413 - Bug Fix Advisory
Synopsis
hwcert-client-1.5 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated hwcert-client packages that fixes several bugs and one enhancement are
now available for Red Hat Enterprise Linux Hardware Certification.
Description
hwcert-client, the Red Hat Enterprise Linux hardware certification test suite,
verifies the compatibility of hardware devices. Each hwcert-client test run
builds a results database for submission to Red Hat's hardware catalog as an RPM
package. hwcert-client replaces v7, and Red Hat Hardware Test Suite (HTS) for
certifying hardware for use with Red Hat Enterprise Linux.
This update fixes the following bugs:
- Previously, using the "run -t info" command caused hwcert-client to generate
an sos report and then immediately exit with a traceback error. This was due to
some problems in the up2date and yum tools. The traceback error occurred after
hwcert-client called the /usr/share/rhn/up2date_client/hardware.py file to get a
list of devices. This problem has now been fixed and a traceback error no longer
occurs in this scenario. (BZ#1001283)
- Older versions of the sos utility did not support the "--batch" option, which
the hwcert-client utility needs to gather hardware information in the info test.
Package dependencies in hwcert-client have been modified to require newer
versions of the sos utility which provide the "--batch" option. Now,
hwcert-client indicates that a later version of the sos utility must be
installed. (BZ#1001817)
In addition, this update adds the following enhancement:
- An updated kernel info package for Red Hat Enterprise Linux 5.10 has been
added to the hwcert-client utility. (BZ#1001814)
Users of hwcert are advised to upgrade to these updated packages, which fix
these bugs and add this enhancement.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Hardware Certification Test Suite 5 x86_64
- Red Hat Hardware Certification Test Suite 5 s390x
- Red Hat Hardware Certification Test Suite 5 ppc
- Red Hat Hardware Certification Test Suite 5 ia64
- Red Hat Hardware Certification Test Suite 5 i386
Fixes
- BZ - 1001817 - sos version => sos-1.7-9.27.el5 should be added to the spec file.
CVEs
(none)
Red Hat Hardware Certification Test Suite 5
SRPM | |
---|---|
hwcert-client-1.5.10-2.el5.src.rpm | SHA-256: f07693e24a55886269101ba10dafe193cfeead3be261a9a8890b6bd002933f02 |
x86_64 | |
hwcert-client-1.5.10-2.el5.noarch.rpm | SHA-256: 45206f9d715f16c63c7a31a00217f47d3f64ebd0d4b3dcc5b87515091accb066 |
hwcert-client-info-1.5.10-2.el5.noarch.rpm | SHA-256: 07498f2218468b09381934ab4ab99098e615358f4af89d6d6e86ab165a848006 |
s390x | |
hwcert-client-1.5.10-2.el5.noarch.rpm | SHA-256: 45206f9d715f16c63c7a31a00217f47d3f64ebd0d4b3dcc5b87515091accb066 |
hwcert-client-info-1.5.10-2.el5.noarch.rpm | SHA-256: 07498f2218468b09381934ab4ab99098e615358f4af89d6d6e86ab165a848006 |
ppc | |
hwcert-client-1.5.10-2.el5.noarch.rpm | SHA-256: 45206f9d715f16c63c7a31a00217f47d3f64ebd0d4b3dcc5b87515091accb066 |
hwcert-client-info-1.5.10-2.el5.noarch.rpm | SHA-256: 07498f2218468b09381934ab4ab99098e615358f4af89d6d6e86ab165a848006 |
ia64 | |
hwcert-client-1.5.10-2.el5.noarch.rpm | SHA-256: 45206f9d715f16c63c7a31a00217f47d3f64ebd0d4b3dcc5b87515091accb066 |
hwcert-client-info-1.5.10-2.el5.noarch.rpm | SHA-256: 07498f2218468b09381934ab4ab99098e615358f4af89d6d6e86ab165a848006 |
i386 | |
hwcert-client-1.5.10-2.el5.noarch.rpm | SHA-256: 45206f9d715f16c63c7a31a00217f47d3f64ebd0d4b3dcc5b87515091accb066 |
hwcert-client-info-1.5.10-2.el5.noarch.rpm | SHA-256: 07498f2218468b09381934ab4ab99098e615358f4af89d6d6e86ab165a848006 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.