- Issued:
- 2018-05-15
- Updated:
- 2018-05-15
RHEA-2018:1539 - Product Enhancement Advisory
Synopsis
python-subprocess32 bug fix and enhancement update for RHV 4.2
Type/Severity
Product Enhancement Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated python-subprocess32 packages that fix several bugs and add various enhancements are now available.
Description
The python-subprocess32 module is a backport of the subprocess standard library module from Python 3.2 and 3.3 for use on Python 2. It includes bugfixes and some new features. On POSIX systems it is guaranteed to be reliable when used in threaded applications.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
For details on how to apply this update, refer to:
Affected Products
- Red Hat Virtualization 4 for RHEL 7 x86_64
- Red Hat Virtualization for IBM Power LE 4 for RHEL 7 ppc64le
Fixes
- BZ - 1485696 - [RFE] Package python-subprocess32 for RHV 4.2
CVEs
(none)
References
(none)
Red Hat Virtualization 4 for RHEL 7
SRPM | |
---|---|
python-subprocess32-3.2.6-7.el7ev.src.rpm | SHA-256: d8a6cd805fabccb78ca3e19edd09fd8da5d131582bec1e83b27456ece0e30764 |
x86_64 | |
python-subprocess32-3.2.6-7.el7ev.x86_64.rpm | SHA-256: abac2245a3391f3b15ef8a519c9606880b8d08bfddd7f086dd4579964ec0789e |
python-subprocess32-debuginfo-3.2.6-7.el7ev.x86_64.rpm | SHA-256: afeb72faae97b81762ce5b01f876bac7f7ceb17e91a30238cf49d25e9726f53b |
Red Hat Virtualization for IBM Power LE 4 for RHEL 7
SRPM | |
---|---|
python-subprocess32-3.2.6-7.el7ev.src.rpm | SHA-256: d8a6cd805fabccb78ca3e19edd09fd8da5d131582bec1e83b27456ece0e30764 |
ppc64le | |
python-subprocess32-3.2.6-7.el7ev.ppc64le.rpm | SHA-256: 30bce301d2f40d6e4579f14b9215e321d0fab5fa364f3f6289865c5f43beecdb |
python-subprocess32-debuginfo-3.2.6-7.el7ev.ppc64le.rpm | SHA-256: 664ebdb7ccacb1919c6415cdc817fd98d37634edb073f80db7a4a43cd636e968 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.