- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2012:0257 - tog-pegasus bug fix update
Synopsis
tog-pegasus bug fix update
Type/Severity
Bug Fix Advisory (none)
Topic
Updated tog-pegasus packages that fix multiple bugs and add various enhancements are now available for Red Hat Enterprise Linux 5.
Description
The tog-pegasus packages provide OpenPegasus Web-Based Enterprise Management (WBEM) services for Linux. WBEM enables management solutions that deliver increased control of enterprise resources. WBEM is a platform and resource independent Distributed Management Task Force (DMTF) standard that defines a common information model (CIM) and communication protocol for monitoring and controlling resources from diverse sources.
The tog-pegasus packages have been upgraded to upstream version 2.11.0, which provides a number of bug fixes and enhancements over the previous version. (BZ#713972)
This update fixes the following bugs:
-
Previously, when the CMPIArray variable type was cloned, each array element was cloned by calling the respective clone function of the CMPIType variable type. When attempting to release the cloned CMPIArray, none of the array elements was released by calling their respective release functions. This resulted in a memory leak. This update introduces a new boolean flag which handles releasing of the cloned CMPIArray variable type. (BZ#544053)
-
The OpenPegasus init script contains the "condrestart" action. However, the "condrestart" option was missing in the help strings, and this option was not displayed. With this update, help strings are complete and the "condrestart" option is correctly displayed. (BZ#553123)
In addition, this update adds the following enhancement:
- This update adds the Privilege Separation option to provide support for the IBM Systems Director suite. (BZ#713987)
All users of tog-pegasus are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.
Solution
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at This content is not included.https://access.redhat.com/kb/docs/DOC-11259
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for Power, big endian | 5 | ppc |
| Red Hat Enterprise Linux for IBM z Systems | 5 | s390x |
| Red Hat Enterprise Linux Workstation | 5 | x86_64 |
| Red Hat Enterprise Linux Workstation | 5 | i386 |
| Red Hat Enterprise Linux Server | 5 | x86_64 |
| Red Hat Enterprise Linux Server | 5 | ia64 |
| Red Hat Enterprise Linux Server | 5 | i386 |
| Red Hat Enterprise Linux Server from RHUI | 5 | x86_64 |
| Red Hat Enterprise Linux Server from RHUI | 5 | i386 |
| Red Hat Enterprise Linux Desktop | 5 | x86_64 |
| Red Hat Enterprise Linux Desktop | 5 | i386 |
Updated Packages
- tog-pegasus-2.11.0-3.el5.s390x.rpm
- tog-pegasus-libs-2.11.0-3.el5.i386.rpm
- tog-pegasus-libs-2.11.0-3.el5.ppc64.rpm
- tog-pegasus-2.11.0-3.el5.s390.rpm
- tog-pegasus-devel-2.11.0-3.el5.x86_64.rpm
- tog-pegasus-devel-2.11.0-3.el5.i386.rpm
- tog-pegasus-devel-2.11.0-3.el5.s390x.rpm
- tog-pegasus-2.11.0-3.el5.ppc.rpm
- tog-pegasus-devel-2.11.0-3.el5.ppc.rpm
- tog-pegasus-libs-2.11.0-3.el5.x86_64.rpm
- tog-pegasus-2.11.0-3.el5.i386.rpm
- tog-pegasus-devel-2.11.0-3.el5.s390.rpm
- tog-pegasus-devel-2.11.0-3.el5.ia64.rpm
- tog-pegasus-2.11.0-3.el5.ppc64.rpm
- tog-pegasus-2.11.0-3.el5.x86_64.rpm
- tog-pegasus-libs-2.11.0-3.el5.ppc.rpm
- tog-pegasus-libs-2.11.0-3.el5.s390.rpm
- tog-pegasus-2.11.0-3.el5.ia64.rpm
- tog-pegasus-devel-2.11.0-3.el5.ppc64.rpm
- tog-pegasus-2.11.0-3.el5.src.rpm
- tog-pegasus-libs-2.11.0-3.el5.s390x.rpm
- tog-pegasus-libs-2.11.0-3.el5.ia64.rpm
Fixes
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.