- Issued:
- 2009-12-11
- Updated:
- 2009-12-11
RHEA-2009:1665 - Product Enhancement Advisory
Synopsis
Red Hat Certificate System Bug Fix Update
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated packages for Red Hat Certificate System 8 are now available.
Description
Red Hat Certificate System (RHCS) is a complete implementation of an
enterprise software system designed to manage enterprise public key
infrastructure (PKI) deployments.
This update includes fixes for the Token Processing System (TPS), which
processes smart card operations:
- If signed audit logging was enabled for the TPS, then it was not possible
to start the TPS instance. (BZ#533510)
- TPS HTTP responses were not properly formatted according to RFC 2616.
Chunked data were supposed to end with the sequence 0\r\n, but this was not
included in the TPS responses. (BZ#529280)
These packages also include an enhancement which allows a subsystem to be
configured to prompt for subsystem passwords rather than reading them out
of the plaintext password.conf file. New instances can have the
password.conf file removed and prompt for all necessary passwords
immediately; existing and fully-updated instances can be configured to
prompt for passwords once the password.conf file is removed. A new watchdog
process ensures that the instance can restart cleanly if a process is
interrupted. (BZ#518123)
For procedures on removing the password.conf file and prompting for system
passwords at startup, see the RHCS Administrator's Guide.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Certificate System 8 x86_64
- Red Hat Certificate System 8 i386
Fixes
(none)CVEs
(none)
References
(none)
Red Hat Certificate System 8
SRPM | |
---|---|
nuxwdog-1.0.0-4.el5pki.src.rpm | SHA-256: e92944993b906d6db8e3439bda2e8da6dc93f99757736d947c09100e0f254b41 |
pki-ca-8.0.3-1.el5pki.src.rpm | SHA-256: aa563f82a806e1e9e3dfeee0d27cf6c77d1cca192689ee05ae2f8552a5e303b6 |
pki-common-8.0.3-3.el5pki.src.rpm | SHA-256: ecb4593ad570286d529ba68d8cd6a181b17b66951654702a6d04c51f0d5a9341 |
pki-kra-8.0.3-2.el5pki.src.rpm | SHA-256: 9493514926783d3bf7c0ea6ae2bea885243e4cd4d53148dd922a218c475956f5 |
pki-ocsp-8.0.3-2.el5pki.src.rpm | SHA-256: 83de6b295ba3a71c626282ad6b14ce9191b535772d5f1d58f2069c13bcb48dea |
pki-selinux-8.0.3-1.el5pki.src.rpm | SHA-256: 3899b1efe04169148b6b250de57cfc8d0dbf240658f8e0191bc22ac8e981d58e |
pki-setup-8.0.3-1.el5pki.src.rpm | SHA-256: 8f2018bf30ef45ca9e376ffd4f583c2fbf8220a949886acc43b2b63bcb4bc4d5 |
pki-tks-8.0.3-2.el5pki.src.rpm | SHA-256: 4b4a6ed6c3ed27b5fc0248179ccd8840bf652ceee42ce2f114bce2cc8aefc500 |
pki-tps-8.0.3-1.el5pki.src.rpm | SHA-256: a355c095fa8b393250ff0775d4c96297789492ff27dd283329eeef4a49d97ea1 |
tomcatjss-1.1.2-6.el5idm.src.rpm | SHA-256: 26f9d0cbb51bd9eef22908afa606cc28eef1fcf8ed317f5e733f4d2fa091926c |
x86_64 | |
nuxwdog-1.0.0-4.el5pki.x86_64.rpm | SHA-256: ac8b17ab2afeeffaf1592c9ec2a1969341b22fbe2235046ded49a166d5f900ca |
nuxwdog-client-1.0.0-4.el5pki.x86_64.rpm | SHA-256: 5c89939778be08cd594c6d0bf0ade1853ed8dd1071545d541df12abd6c49f20e |
nuxwdog-client-devel-1.0.0-4.el5pki.x86_64.rpm | SHA-256: 2480e662e7930fdaf5cb5a91a2d69221ac606e1031919881b66a22f0a25649f4 |
nuxwdog-client-java-1.0.0-4.el5pki.x86_64.rpm | SHA-256: 80a3e136acf5faa4408337c4c649a7e81bffb3058aab5e4965e15908a2ebd6f9 |
nuxwdog-client-perl-1.0.0-4.el5pki.x86_64.rpm | SHA-256: 2958c0738084e359227b45a8472a67486520cf53712b1768a640a9fda86e0d70 |
pki-ca-8.0.3-1.el5pki.noarch.rpm | SHA-256: 65f091896fb59a029752003640c55d46784b151e68be9778a40414a28ae50305 |
pki-common-8.0.3-3.el5pki.noarch.rpm | SHA-256: 397849096091a700e3c0fd04ada6a256c5592c0ae8ce162581de316d10435966 |
pki-common-javadoc-8.0.3-3.el5pki.noarch.rpm | SHA-256: ffc876695e320b7a8eaffd62c5a5cda9aad925bcb9fc62d29a722821f38c6ebc |
pki-kra-8.0.3-2.el5pki.noarch.rpm | SHA-256: d7d98dbf9af2638eb0fb9409b34ea0fbb417232bf255f15dedfafbc4e08d42c7 |
pki-ocsp-8.0.3-2.el5pki.noarch.rpm | SHA-256: 502097f6177ffa5170d573e1b579d03abc62c88eac9e060d386dec8db912703d |
pki-selinux-8.0.3-1.el5pki.noarch.rpm | SHA-256: dfa2ba96914fd0114e66cc9fe7a07cc6e712ff0d563bab2dd0db0476ab77c0c4 |
pki-setup-8.0.3-1.el5pki.noarch.rpm | SHA-256: 6d164e75a8497ad9ae02c98ab64e3939f6f625ab0bb637b9443739149fae56b5 |
pki-tks-8.0.3-2.el5pki.noarch.rpm | SHA-256: d152f3715685df75364f45db2c0dbd62bfe6cb9601b4b2222196620184b5d4b5 |
pki-tps-8.0.3-1.el5pki.x86_64.rpm | SHA-256: 16f93ad532608e69329fa97ce48bbbcf855497a2912c42f66d1838dec5cb0b14 |
tomcatjss-1.1.2-6.el5idm.noarch.rpm | SHA-256: 39d9cdbe63920fb16edb12a8bcfaeefc375b2d92575b78d5d5d62776450c4e7b |
i386 | |
nuxwdog-1.0.0-4.el5pki.i386.rpm | SHA-256: 1f2a620e6cef132516d108601314da44ac425aeaf8d054d2b572bb419bfbef9f |
nuxwdog-client-1.0.0-4.el5pki.i386.rpm | SHA-256: 8d5cf1d1a1e42dc52e2a9f2ed6da0a9c59de9842b026bc027fd6246ea8786fde |
nuxwdog-client-devel-1.0.0-4.el5pki.i386.rpm | SHA-256: dd9d503a46ac40a551d546ea23fd1a5c9d24cf2ac11ec61d55cfacc6f0c509a7 |
nuxwdog-client-java-1.0.0-4.el5pki.i386.rpm | SHA-256: 0e3f237bf1ffc865952c287a6176e8455afc693edd96a53c90ae80d911ab9f33 |
nuxwdog-client-perl-1.0.0-4.el5pki.i386.rpm | SHA-256: b2c284876a7f35ec64318c1dad4c903cf8ef484973845e9b0e150f85f1f74ebb |
pki-ca-8.0.3-1.el5pki.noarch.rpm | SHA-256: 65f091896fb59a029752003640c55d46784b151e68be9778a40414a28ae50305 |
pki-common-8.0.3-3.el5pki.noarch.rpm | SHA-256: 397849096091a700e3c0fd04ada6a256c5592c0ae8ce162581de316d10435966 |
pki-common-javadoc-8.0.3-3.el5pki.noarch.rpm | SHA-256: ffc876695e320b7a8eaffd62c5a5cda9aad925bcb9fc62d29a722821f38c6ebc |
pki-kra-8.0.3-2.el5pki.noarch.rpm | SHA-256: d7d98dbf9af2638eb0fb9409b34ea0fbb417232bf255f15dedfafbc4e08d42c7 |
pki-ocsp-8.0.3-2.el5pki.noarch.rpm | SHA-256: 502097f6177ffa5170d573e1b579d03abc62c88eac9e060d386dec8db912703d |
pki-selinux-8.0.3-1.el5pki.noarch.rpm | SHA-256: dfa2ba96914fd0114e66cc9fe7a07cc6e712ff0d563bab2dd0db0476ab77c0c4 |
pki-setup-8.0.3-1.el5pki.noarch.rpm | SHA-256: 6d164e75a8497ad9ae02c98ab64e3939f6f625ab0bb637b9443739149fae56b5 |
pki-tks-8.0.3-2.el5pki.noarch.rpm | SHA-256: d152f3715685df75364f45db2c0dbd62bfe6cb9601b4b2222196620184b5d4b5 |
pki-tps-8.0.3-1.el5pki.i386.rpm | SHA-256: c02a209e7325c65530fc1bb39ecd8b72d431bc200b94d50a19000e953dcce757 |
tomcatjss-1.1.2-6.el5idm.noarch.rpm | SHA-256: 39d9cdbe63920fb16edb12a8bcfaeefc375b2d92575b78d5d5d62776450c4e7b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.