- Issued:
- 2012-02-20
- Updated:
- 2012-02-20
RHBA-2012:0283 - rpm bug fix and enhancement update
Synopsis
rpm bug fix and enhancement update
Type/Severity
Bug Fix Advisory (none)
Topic
Updated rpm packages that fix multiple bugs and add two enhancements are now available for Red Hat Enterprise Linux 5.
Description
The RPM Package Manager (RPM) is a command-line driven package management system capable of installing, uninstalling, verifying, querying, and updating software packages.
This update fixes the following bugs:
-
Previously, an attempt to initialize the rpm database in a non-existent directory could have failed to create a transaction lock. With this update, this problem has been fixed in that RPM now tries to create a non-existent directory before creating the lock. (BZ#510469)
-
Previously, an attempt to close a NULL rpmio file descriptor caused the process to terminate with when calling the "assert()" function. With this update, the problem with the process termination has been fixed and the "Fclose()" function now accepts a NULL pointer and performs no operation. (BZ#573043)
-
Previously, in Python bindings, calling "hdr.dsFromHeader()" caused a SystemError exception on headers with no dependencies, for example gpg-pubkey headers. With this update, RPM now returns an empty dependency set object in this case. (BZ#628883)
-
Previously, RPM library initialization forced the umask of the process to "022", which could have caused unwanted permissions for files created by software that makes use of the RPM API. With this update, the umask is now only changed for the duration of a transaction and restored to its previous value afterwards. (BZ#673821)
-
Previously, disabling package scriptlet execution (the "rpm --noscripts" command) did not prevent "%pretrans" and "%posttrans" scriptlets from running. With this update, the "--noscripts" option now disables execution of all scriptlet types. (BZ#740345)
In addition, this update introduces the following enhancements:
-
The "%setup" and "%patch" spec directives now support transparent decompression of XZ and LZMA compressed source tarballs and patch files. (BZ#620674)
-
Support for the "RPMCALLBACK_SCRIPT_ERROR" callback event has been added in this update. This allows programs that make use of the librpm API (for example yum) to report install or erase failures more accurately. (BZ#533831)
All users of RPM are advised to upgrade to these updated packages, which fix these bugs and add these enhancements.
Solution
Before applying this update, make sure all previously-released errata relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at This content is not included.https://access.redhat.com/kb/docs/DOC-11259
Affected Products
| Product | Version | Arch |
|---|---|---|
| Red Hat Enterprise Linux for Power, big endian | 5 | ppc |
| Red Hat Enterprise Linux for IBM z Systems | 5 | s390x |
| Red Hat Enterprise Linux Workstation | 5 | x86_64 |
| Red Hat Enterprise Linux Workstation | 5 | i386 |
| Red Hat Enterprise Linux Server | 5 | x86_64 |
| Red Hat Enterprise Linux Server | 5 | ia64 |
| Red Hat Enterprise Linux Server | 5 | i386 |
| Red Hat Enterprise Linux Server from RHUI | 5 | x86_64 |
| Red Hat Enterprise Linux Server from RHUI | 5 | i386 |
| Red Hat Enterprise Linux Desktop | 5 | x86_64 |
| Red Hat Enterprise Linux Desktop | 5 | i386 |
Updated Packages
- rpm-python-4.4.2.3-27.el5.ppc.rpm
- rpm-4.4.2.3-27.el5.ppc.rpm
- rpm-devel-4.4.2.3-27.el5.s390x.rpm
- rpm-libs-4.4.2.3-27.el5.ppc64.rpm
- rpm-python-4.4.2.3-27.el5.i386.rpm
- rpm-4.4.2.3-27.el5.x86_64.rpm
- rpm-devel-4.4.2.3-27.el5.i386.rpm
- rpm-libs-4.4.2.3-27.el5.ia64.rpm
- rpm-4.4.2.3-27.el5.ia64.rpm
- popt-1.10.2.3-27.el5.ppc.rpm
- rpm-apidocs-4.4.2.3-27.el5.i386.rpm
- rpm-libs-4.4.2.3-27.el5.i386.rpm
- popt-1.10.2.3-27.el5.ia64.rpm
- popt-1.10.2.3-27.el5.ppc64.rpm
- rpm-devel-4.4.2.3-27.el5.ia64.rpm
- rpm-python-4.4.2.3-27.el5.x86_64.rpm
- popt-1.10.2.3-27.el5.i386.rpm
- rpm-python-4.4.2.3-27.el5.s390x.rpm
- rpm-build-4.4.2.3-27.el5.ppc.rpm
- rpm-build-4.4.2.3-27.el5.s390x.rpm
- rpm-apidocs-4.4.2.3-27.el5.s390x.rpm
- popt-1.10.2.3-27.el5.s390x.rpm
- rpm-apidocs-4.4.2.3-27.el5.ppc.rpm
- rpm-apidocs-4.4.2.3-27.el5.x86_64.rpm
- rpm-4.4.2.3-27.el5.src.rpm
- rpm-python-4.4.2.3-27.el5.ia64.rpm
- rpm-devel-4.4.2.3-27.el5.ppc.rpm
- popt-1.10.2.3-27.el5.s390.rpm
- rpm-libs-4.4.2.3-27.el5.s390x.rpm
- rpm-libs-4.4.2.3-27.el5.x86_64.rpm
- rpm-apidocs-4.4.2.3-27.el5.ia64.rpm
- rpm-libs-4.4.2.3-27.el5.s390.rpm
- rpm-devel-4.4.2.3-27.el5.x86_64.rpm
- rpm-build-4.4.2.3-27.el5.ia64.rpm
- rpm-4.4.2.3-27.el5.i386.rpm
- rpm-build-4.4.2.3-27.el5.x86_64.rpm
- popt-1.10.2.3-27.el5.x86_64.rpm
- rpm-devel-4.4.2.3-27.el5.s390.rpm
- rpm-4.4.2.3-27.el5.s390x.rpm
- rpm-build-4.4.2.3-27.el5.i386.rpm
- rpm-libs-4.4.2.3-27.el5.ppc.rpm
- rpm-devel-4.4.2.3-27.el5.ppc64.rpm
Fixes
- This content is not included.BZ - 510469
- This content is not included.BZ - 533831
- This content is not included.BZ - 620674
- This content is not included.BZ - 628883
CVEs
(none)
References
(none)
Additional information
- The Red Hat security contact is This content is not included.secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.
- Offline Security Data data is available for integration with other systems. See Offline Security Data API to get started.