- Issued:
- 2013-07-31
- Updated:
- 2013-07-31
RHBA-2013:1125 - Bug Fix Advisory
Synopsis
hwcert-client-1.5 bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
An updated hwcert-client package that fixes several bugs and adds multiple
enhancements is now available for Red Hat Enterprise Linux Hardware
Certification.
Description
hwcert-client, the Red Hat Enterprise Linux hardware certification test suite,
verifies the compatibility of hardware devices. Each hwcert-client test run
builds a results database for submission to Red Hat's hardware catalog as an RPM
package. hwcert-client replaces v7, and Red Hat Hardware Test Suite (HTS) for
certifying hardware for use with Red Hat Enterprise Linux.
This updated hwcert-client package includes numerous bug fixes and enhancements.
Space precludes documenting all of these changes in this advisory. Documentation
for these changes will be available shortly from the Test Suite Release Notes:
All users of hwcert-client are advised to upgrade to this updated package, which
provides numerous bug fixes and enhancements.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Affected Products
- Red Hat Hardware Certification Test Suite 5 x86_64
- Red Hat Hardware Certification Test Suite 5 s390x
- Red Hat Hardware Certification Test Suite 5 ppc
- Red Hat Hardware Certification Test Suite 5 ia64
- Red Hat Hardware Certification Test Suite 5 i386
Fixes
- BZ - 872434 - pccard: Traceback if no PC Card plugged into the slot [v7-1.5]
- BZ - 916358 - The xml should be updated to include RHEL5.9 GA kernel
- BZ - 918737 - [1.5] v7 tracebacks when <partner-server> is empty or missing from /etc/v7.xml
- BZ - 918741 - [1.5] FEAT: ship kernelinfo.xml in it's own package
- BZ - 919498 - FEAT: change the test suite command set to attempt to certify the system by default.
- BZ - 919499 - FEAT: deprecate results rpm building code
- BZ - 920737 - hwcert-client 1.5.9 fv_tests fail - naming inconsistencies
- BZ - 921224 - hwcert-client 1.5.9 R6 syntax error in kdump test
- BZ - 921227 - FEAT: Rename v7 to hwcert-backend
- BZ - 921236 - FEAT: address prompting quirks from 'hwcert' command refactoring
- BZ - 921585 - hwcert-client 1.5.9 should not include a server package
- BZ - 923199 - [1.5] kdump reboot fills console output asking for deleting results confirmation
- BZ - 947961 - [1.5] INFO: traceback when check rpm package
- BZ - 951676 - need %obsoletes v7
- BZ - 952829 - adding reboot test causes traceback
- BZ - 956275 - hwcert-client 1.5 should require RHEL5
- BZ - 956323 - 1.5 fv_* test traceback
- BZ - 963480 - fv_ tests INCOMPLETE after the first run on a data image
- BZ - 966723 - Hwcert-1.5.9 profiler: passing with forced timer config still fails test
- BZ - 976694 - [hwcert-client version 1.5.9 release 28] info tests failed in RHEL5.0 x86 and x64
CVEs
(none)
Red Hat Hardware Certification Test Suite 5
SRPM | |
---|---|
hwcert-client-1.5.9-37.el5.src.rpm | SHA-256: 915a92f80cad31a49607e780f5f955b8791cc5f1dfc6a94cd58fcb73f265cae1 |
x86_64 | |
hwcert-client-1.5.9-37.el5.noarch.rpm | SHA-256: 0837a25c2c1f3a28b9b1203da988e6af01a8f352de2c94de9b2c11bbca12e078 |
hwcert-client-info-1.5.9-37.el5.noarch.rpm | SHA-256: d8d65fab02f0a0349d336bcde4bbfd1b7a999bce35388c3db56adc8319ce2b1b |
s390x | |
hwcert-client-1.5.9-37.el5.noarch.rpm | SHA-256: 0837a25c2c1f3a28b9b1203da988e6af01a8f352de2c94de9b2c11bbca12e078 |
hwcert-client-info-1.5.9-37.el5.noarch.rpm | SHA-256: d8d65fab02f0a0349d336bcde4bbfd1b7a999bce35388c3db56adc8319ce2b1b |
ppc | |
hwcert-client-1.5.9-37.el5.noarch.rpm | SHA-256: 0837a25c2c1f3a28b9b1203da988e6af01a8f352de2c94de9b2c11bbca12e078 |
hwcert-client-info-1.5.9-37.el5.noarch.rpm | SHA-256: d8d65fab02f0a0349d336bcde4bbfd1b7a999bce35388c3db56adc8319ce2b1b |
ia64 | |
hwcert-client-1.5.9-37.el5.noarch.rpm | SHA-256: 0837a25c2c1f3a28b9b1203da988e6af01a8f352de2c94de9b2c11bbca12e078 |
hwcert-client-info-1.5.9-37.el5.noarch.rpm | SHA-256: d8d65fab02f0a0349d336bcde4bbfd1b7a999bce35388c3db56adc8319ce2b1b |
i386 | |
hwcert-client-1.5.9-37.el5.noarch.rpm | SHA-256: 0837a25c2c1f3a28b9b1203da988e6af01a8f352de2c94de9b2c11bbca12e078 |
hwcert-client-info-1.5.9-37.el5.noarch.rpm | SHA-256: d8d65fab02f0a0349d336bcde4bbfd1b7a999bce35388c3db56adc8319ce2b1b |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.