- Issued:
- 2013-01-07
- Updated:
- 2013-01-07
RHBA-2013:0039 - Bug Fix Advisory
Synopsis
python-rhsm bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated python-rhsm packages that fix multiple bugs are now available for Red
Hat Enterprise Linux 5.
Description
The python-rhsm packages provide a library for communicating with the
representational state transfer (REST) interface of Red Hat's subscription and
content service. The Subscription Management tools use this interface to manage
system entitlements, certificates, and content access.
This update fixes the following bugs:
- Prior to this update, the python-rhsm library used unimplemented methods in
certain error classes. As a consequence, messages contained a traceback
obscuring actual error messages. This update implements the missing methods in
the error classes. Now, the error message is reported as expected. (BZ#806958,
BZ#830767, BZ#842885)
- Prior to this update, malformed requests were sent to the content delivery
network (CDN). As a consequence, clients could not get a list of releases. This
update modifies the underlying code to format the requests to CDN as expected.
Now, clients can get a list of releases. (BZ#833537)
- Prior to this update, the httplib library used the default timeout setting of
several minutes. As a consequence, clients that used the python-rhsm library
appeared to be suspended. This update shortens the default setting for the
timeout to 60 seconds. (BZ#834108)
- Prior to this update, the python-rhsm library did not support arbitrary bit
length certificate serial numbers. As a consequence, certificates could be
created with incorrect file names. This update supports arbitrary length
certificate serial numbers to ensure that certificates are created with the
correct file name. (BZ#848742)
- Prior to this update, the python-rhsm library did not decode logging messages
using the Japanese locale as expected. As a consequence, python-rhsm logged
tracebacks instead of messages. This update configures python-rhsm to handle
messages in the Japanese locale correctly. (BZ#851644)
- Prior to this update, post data was set as "None" due to an invalid "if"
statement. As a consequence, python-rhsm failed to set an empty JSON structure
as the body of the request. This update modifies the "if" statement to
explicitly check that the data is not "None". Now, empty mapping of hypervisors
can pass as expected and is correctly sent to candlepin. (BZ#857426)
All users of python-rhsm are advised to upgrade to these updated packages, which
fix these bugs.
Solution
Before applying this update, make sure all previously-released errata relevant
to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/knowledge/articles/11258
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 806958 - One empty certificate file in /etc/rhsm/ca causes registration failure
- BZ - 830767 - Got Traceback while using ?/? with ?serverurl register
- BZ - 833537 - subscription-manager release does not work with proxies
- BZ - 833539 - Can't list what os release to use
- BZ - 834108 - Subscription Manager Register : Hangs with invalid IP Address
- BZ - 842885 - AttributeError: RemoteServerException instance has no attribute 'args'; thrown when registering with --serverurl containing bad prefix
- BZ - 848742 - Certification file name is incorrect when doing auto-subscribe on RHEL 5.9 client/server i386
- BZ - 851644 - [ja_JP] Traceback when starting subscription-manager-gui
- BZ - 857426 - Traceback when calling hypervisorCheckIn with empty dictionary
- BZ - 859652 - subscribe with service-level is being ignored (certv3 only)
- BZ - 863961 - rct tool displays the version as blank in cert.pem
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
python-rhsm-1.0.10-1.el5.src.rpm | SHA-256: c866e9327b7a3b3abc3bb919c8ce699ff180d8d4159532ec5c28c51b2a86ec61 |
x86_64 | |
python-rhsm-1.0.10-1.el5.x86_64.rpm | SHA-256: 4d30d5f8e4966f0129a0efb8424a4bf466829674941b991ebd839a186a1a77fd |
python-rhsm-debuginfo-1.0.10-1.el5.x86_64.rpm | SHA-256: 80eba9ae5481999343bb184f1230f10eb7d70aac832d22f61e9bcf16d8716a16 |
ia64 | |
python-rhsm-1.0.10-1.el5.ia64.rpm | SHA-256: 94e5ef5d2acdbdcaca0fb66fea2b20ce8d4e5ee0104c67b35fbbf67b728abe14 |
python-rhsm-debuginfo-1.0.10-1.el5.ia64.rpm | SHA-256: 9cb4a075d0c1d8b0ef5e8f0335518bb452f34d50cbb1a2e04b11f3823021aa80 |
i386 | |
python-rhsm-1.0.10-1.el5.i386.rpm | SHA-256: c6ae783d47a27015049436fa898b37111f524e5bdc985a161e4004944e92a4b5 |
python-rhsm-debuginfo-1.0.10-1.el5.i386.rpm | SHA-256: 301fc5b65301aa0c804a6df831609ea71f3496ea57a759bcebfe1d9f020f598a |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
python-rhsm-1.0.10-1.el5.src.rpm | SHA-256: c866e9327b7a3b3abc3bb919c8ce699ff180d8d4159532ec5c28c51b2a86ec61 |
x86_64 | |
python-rhsm-1.0.10-1.el5.x86_64.rpm | SHA-256: 4d30d5f8e4966f0129a0efb8424a4bf466829674941b991ebd839a186a1a77fd |
python-rhsm-debuginfo-1.0.10-1.el5.x86_64.rpm | SHA-256: 80eba9ae5481999343bb184f1230f10eb7d70aac832d22f61e9bcf16d8716a16 |
i386 | |
python-rhsm-1.0.10-1.el5.i386.rpm | SHA-256: c6ae783d47a27015049436fa898b37111f524e5bdc985a161e4004944e92a4b5 |
python-rhsm-debuginfo-1.0.10-1.el5.i386.rpm | SHA-256: 301fc5b65301aa0c804a6df831609ea71f3496ea57a759bcebfe1d9f020f598a |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
python-rhsm-1.0.10-1.el5.src.rpm | SHA-256: c866e9327b7a3b3abc3bb919c8ce699ff180d8d4159532ec5c28c51b2a86ec61 |
x86_64 | |
python-rhsm-1.0.10-1.el5.x86_64.rpm | SHA-256: 4d30d5f8e4966f0129a0efb8424a4bf466829674941b991ebd839a186a1a77fd |
python-rhsm-debuginfo-1.0.10-1.el5.x86_64.rpm | SHA-256: 80eba9ae5481999343bb184f1230f10eb7d70aac832d22f61e9bcf16d8716a16 |
i386 | |
python-rhsm-1.0.10-1.el5.i386.rpm | SHA-256: c6ae783d47a27015049436fa898b37111f524e5bdc985a161e4004944e92a4b5 |
python-rhsm-debuginfo-1.0.10-1.el5.i386.rpm | SHA-256: 301fc5b65301aa0c804a6df831609ea71f3496ea57a759bcebfe1d9f020f598a |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
python-rhsm-1.0.10-1.el5.src.rpm | SHA-256: c866e9327b7a3b3abc3bb919c8ce699ff180d8d4159532ec5c28c51b2a86ec61 |
s390x | |
python-rhsm-1.0.10-1.el5.s390x.rpm | SHA-256: 774abd83f1a1ad5a81a0e9582000db87586038261d39e526f2367b4d50db5bc1 |
python-rhsm-debuginfo-1.0.10-1.el5.s390x.rpm | SHA-256: 300e5aa02a17bbb413a0523835c9d1c6fb40f1f71815c38139cab54ac096f5c8 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
python-rhsm-1.0.10-1.el5.src.rpm | SHA-256: c866e9327b7a3b3abc3bb919c8ce699ff180d8d4159532ec5c28c51b2a86ec61 |
ppc | |
python-rhsm-1.0.10-1.el5.ppc.rpm | SHA-256: c64e1252c348917ba67be9d7e688698ca250a48f81ef0f6577cdb50385b77be3 |
python-rhsm-debuginfo-1.0.10-1.el5.ppc.rpm | SHA-256: 13c296f183219f74a290e4395312601c86381acbbd2106245472e9d4fb04c961 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
python-rhsm-1.0.10-1.el5.src.rpm | SHA-256: c866e9327b7a3b3abc3bb919c8ce699ff180d8d4159532ec5c28c51b2a86ec61 |
x86_64 | |
python-rhsm-1.0.10-1.el5.x86_64.rpm | SHA-256: 4d30d5f8e4966f0129a0efb8424a4bf466829674941b991ebd839a186a1a77fd |
python-rhsm-debuginfo-1.0.10-1.el5.x86_64.rpm | SHA-256: 80eba9ae5481999343bb184f1230f10eb7d70aac832d22f61e9bcf16d8716a16 |
i386 | |
python-rhsm-1.0.10-1.el5.i386.rpm | SHA-256: c6ae783d47a27015049436fa898b37111f524e5bdc985a161e4004944e92a4b5 |
python-rhsm-debuginfo-1.0.10-1.el5.i386.rpm | SHA-256: 301fc5b65301aa0c804a6df831609ea71f3496ea57a759bcebfe1d9f020f598a |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.