- Issued:
- 2009-01-20
- Updated:
- 2009-01-20
RHBA-2009:0250 - Bug Fix Advisory
Synopsis
tog-pegasus bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated tog-pegasus package that fix various bugs and add enhancements
is now available.
Description
OpenPegasus WBEM Services for Linux enables management solutions that
deliver increased control of enterprise resources. WBEM is a platform and
resource independent DMTF standard that defines a common information model
and communication protocol for monitoring and controlling resources from
diverse sources.
These updated packages upgrade tog-pegasus to the more recent upstream
version 2.7.1, which provides a number of bug fixes and enhancements over
the previous packaged version.
In addition, these updated packages provide fixes for the following bugs:
- installing the tog-pegasus packages did not set up the InterOp namespace
correctly. When installing these updated packages, a post-install script
sets up the InterOp namespace correctly, thus resolving this issue.
- the tog-pegasus init script returned an incorrect exit status when the
service was stopped and either a pid or a lock file existed. In these
updated packages, the tog-pegasus init script has been made compliant with
Linux Standard Base (LSB) guidelines, thus resolving the issue.
- a bug in the setElementAt() function when used with a CMPIValue of type
CMPI_chars led to a dangling pointer if the character data had a shorter
lifetime than that of the array, which could have caused CMPI providers--or
even the CIM Server--to crash. This pointer error has been fixed in these
updated packages so that the setElementAt() function works correctly, thus
resolving the issue.
- the CMPI spec states that MI factories "may return a NULL pointer
indicating that a particular MI type is not supported, despite the fact
that the factory is found". Previous tog-pegasus package did not adhere to
the CMPI spec, which meant that CMPI providers returning such errors were
unloadable by tog-pegasus. This updated tog-pegasus package resolves this
issue, and CMPI providers that return errors as per the CMPI standard are
now able to be unloaded under tog-pegasus.
- tog-pegasus did not include a "Content-Length" header when sending an
HTTP 401 (Unauthorized) response, which led to a situation in which clients
became unresponsive and possibly causing local authentication to fail. In
these updated packages, tog-pegasus includes a "Content-Length: 0" header
when sending HTTP 401 (Unauthorized) responses, thus resolving this issue.
- although the environment variable PEGASUS_USE_NET_SNMP was set to true in
the previous packages, the library for the SNMP Indication Handler was not
included in the package. The correct SNMP Indication Handler shared object
file (and a "versioned" symbolic link to it) has been added to these
updated packages, thus enabling tog-pegasus to use Net-SNMP as was intended.
Users are advised to upgrade to these updated tog-pegasus packages, which
resolve these issues and add these enhancements.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 326281 - Wrong return code from init script
- BZ - 447823 - No cimsub binary in tog-pegasus RPM
- BZ - 452930 - SNMP Indication Handler not included in 2.7 package
- BZ - 454589 - setElementAt() doesn't copy value of CMPI_char parameter
- BZ - 454590 - CMPI MI factories that return errors are unsupported
- BZ - 454591 - HTTP 401 responses lack Content-Length headers
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
tog-pegasus-2.7.1-2.el5.src.rpm | SHA-256: f276769519d78f8fb1aa83b47c7680509533bfc7e685b4682ac65b48a2bb15fa |
x86_64 | |
tog-pegasus-2.7.1-2.el5.i386.rpm | SHA-256: 3cea3d9c5bb2794306cd3fb15fda4e99c776b05e4cec2461cf643ed51acfbbf5 |
tog-pegasus-2.7.1-2.el5.x86_64.rpm | SHA-256: e71c6701d4b8519daee35c44c5217db21d54cab8ead0e186c0d3814d2debf237 |
tog-pegasus-devel-2.7.1-2.el5.i386.rpm | SHA-256: f1b18a85671ebd4ed215e3bdc3dd1036b7b9243126f529edf39dfa7c4e63edca |
tog-pegasus-devel-2.7.1-2.el5.x86_64.rpm | SHA-256: 90f5664b8d3510a9c3645bdfe228cbaeaff5c48c62fec72e75dce0e3af70a381 |
ia64 | |
tog-pegasus-2.7.1-2.el5.ia64.rpm | SHA-256: 143441c18e7083712b2f5d93b2e9d3441d551615e029ba36e4538dcc242a8638 |
tog-pegasus-devel-2.7.1-2.el5.ia64.rpm | SHA-256: 12997075e56f246f95aef9ef98e56d3590b0e7b2034450f6452e70ba22dd1b58 |
i386 | |
tog-pegasus-2.7.1-2.el5.i386.rpm | SHA-256: 3cea3d9c5bb2794306cd3fb15fda4e99c776b05e4cec2461cf643ed51acfbbf5 |
tog-pegasus-devel-2.7.1-2.el5.i386.rpm | SHA-256: f1b18a85671ebd4ed215e3bdc3dd1036b7b9243126f529edf39dfa7c4e63edca |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
tog-pegasus-2.7.1-2.el5.src.rpm | SHA-256: f276769519d78f8fb1aa83b47c7680509533bfc7e685b4682ac65b48a2bb15fa |
x86_64 | |
tog-pegasus-2.7.1-2.el5.i386.rpm | SHA-256: 3cea3d9c5bb2794306cd3fb15fda4e99c776b05e4cec2461cf643ed51acfbbf5 |
tog-pegasus-2.7.1-2.el5.x86_64.rpm | SHA-256: e71c6701d4b8519daee35c44c5217db21d54cab8ead0e186c0d3814d2debf237 |
tog-pegasus-devel-2.7.1-2.el5.i386.rpm | SHA-256: f1b18a85671ebd4ed215e3bdc3dd1036b7b9243126f529edf39dfa7c4e63edca |
tog-pegasus-devel-2.7.1-2.el5.x86_64.rpm | SHA-256: 90f5664b8d3510a9c3645bdfe228cbaeaff5c48c62fec72e75dce0e3af70a381 |
i386 | |
tog-pegasus-2.7.1-2.el5.i386.rpm | SHA-256: 3cea3d9c5bb2794306cd3fb15fda4e99c776b05e4cec2461cf643ed51acfbbf5 |
tog-pegasus-devel-2.7.1-2.el5.i386.rpm | SHA-256: f1b18a85671ebd4ed215e3bdc3dd1036b7b9243126f529edf39dfa7c4e63edca |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
tog-pegasus-2.7.1-2.el5.src.rpm | SHA-256: f276769519d78f8fb1aa83b47c7680509533bfc7e685b4682ac65b48a2bb15fa |
x86_64 | |
tog-pegasus-2.7.1-2.el5.i386.rpm | SHA-256: 3cea3d9c5bb2794306cd3fb15fda4e99c776b05e4cec2461cf643ed51acfbbf5 |
tog-pegasus-2.7.1-2.el5.x86_64.rpm | SHA-256: e71c6701d4b8519daee35c44c5217db21d54cab8ead0e186c0d3814d2debf237 |
i386 | |
tog-pegasus-2.7.1-2.el5.i386.rpm | SHA-256: 3cea3d9c5bb2794306cd3fb15fda4e99c776b05e4cec2461cf643ed51acfbbf5 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
tog-pegasus-2.7.1-2.el5.src.rpm | SHA-256: f276769519d78f8fb1aa83b47c7680509533bfc7e685b4682ac65b48a2bb15fa |
s390x | |
tog-pegasus-2.7.1-2.el5.s390.rpm | SHA-256: 0470a38ee97db60f369d627c1c7ea099a6b46758779539b330608714656c88e3 |
tog-pegasus-2.7.1-2.el5.s390x.rpm | SHA-256: 93088f0ae0fdb85a891d5015e465e378efbe81c7f8d5ac0a3d3b6c25a4efd528 |
tog-pegasus-devel-2.7.1-2.el5.s390.rpm | SHA-256: cafb86c8d5537d87d5d69a8ddaa4af0dcb83f7e0a4e710d677d9324feb4ae3d6 |
tog-pegasus-devel-2.7.1-2.el5.s390x.rpm | SHA-256: ac61df17f84c58412c0edf1e1a0c0584e1ffb453192c3141922b402df58ce1a3 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
tog-pegasus-2.7.1-2.el5.src.rpm | SHA-256: f276769519d78f8fb1aa83b47c7680509533bfc7e685b4682ac65b48a2bb15fa |
ppc | |
tog-pegasus-2.7.1-2.el5.ppc.rpm | SHA-256: 011ab220edba9d76ea67fb1c2adf026886a0e27f863e44c26c2dafe56b62bc47 |
tog-pegasus-2.7.1-2.el5.ppc64.rpm | SHA-256: ef0c91cdfa1df4176be991c05d5e0a344071304b0b9aa055a619016d9a954dc5 |
tog-pegasus-devel-2.7.1-2.el5.ppc.rpm | SHA-256: 63d098e0878edf5b61c237e7bb709ff7b1d97478ba6799848334bb750589574c |
tog-pegasus-devel-2.7.1-2.el5.ppc64.rpm | SHA-256: 92d3d8f71d3092d4606f773100a9cdbb3b14aeeb505637c41fe238f966034b6d |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
tog-pegasus-2.7.1-2.el5.src.rpm | SHA-256: f276769519d78f8fb1aa83b47c7680509533bfc7e685b4682ac65b48a2bb15fa |
x86_64 | |
tog-pegasus-2.7.1-2.el5.i386.rpm | SHA-256: 3cea3d9c5bb2794306cd3fb15fda4e99c776b05e4cec2461cf643ed51acfbbf5 |
tog-pegasus-2.7.1-2.el5.x86_64.rpm | SHA-256: e71c6701d4b8519daee35c44c5217db21d54cab8ead0e186c0d3814d2debf237 |
tog-pegasus-devel-2.7.1-2.el5.i386.rpm | SHA-256: f1b18a85671ebd4ed215e3bdc3dd1036b7b9243126f529edf39dfa7c4e63edca |
tog-pegasus-devel-2.7.1-2.el5.x86_64.rpm | SHA-256: 90f5664b8d3510a9c3645bdfe228cbaeaff5c48c62fec72e75dce0e3af70a381 |
i386 | |
tog-pegasus-2.7.1-2.el5.i386.rpm | SHA-256: 3cea3d9c5bb2794306cd3fb15fda4e99c776b05e4cec2461cf643ed51acfbbf5 |
tog-pegasus-devel-2.7.1-2.el5.i386.rpm | SHA-256: f1b18a85671ebd4ed215e3bdc3dd1036b7b9243126f529edf39dfa7c4e63edca |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.