Updated hwcert-client-1.6.5.2 packages that fix one bug are now available forRed Hat Enterprise Linux Hardware Certification.

The hwcert-client packages contain the Red Hat Enterprise Linux HardwareCertification Test Suite which verifies the compatibility of hardware devices.Each hwcert-client test run builds a results database for submission to the RedHat Hardware Catalog as an XML file. hwcert-client replaces v7 and the Red HatHardware Test Suite (HTS) for certifying hardware for use with Red HatEnterprise Linux.This update fixes the following bug:* After upgrading a system with an hwcert server installed from Red HatEnterprise Linux 6.5 to 6.6, including installing all available updates, thehwcert server failed to start and could no longer be used for network tests. This bug has been fixed, and network tests can now be run successfully after asystem upgrade. (BZ#1156204)Users of Hardware Certification Test Suite are advised to upgrade to theseupdated packages, which fix this bug.
Before applying this update, make sure that all previously released erratarelevant to your system have been applied.This update is available via Red Hat Network. Details on how to use the RedHat Network to apply this update are available at https://access.redhat.com/site/articles/11258RHEL Hardware Certification

SRPMS:
hwcert-client-1.6.5.2-20141028.el6.src.rpm
    MD5: 5be62950b795b212db79eab8523f895cSHA-256: c6ae0c8f1f0204dfe9ab9d4e7776ea52efcefade1c081e2a1ac47bd672bbe77b
 
IA-32:
hwcert-client-1.6.5.2-20141028.el6.noarch.rpm
    MD5: acf960c4b920b590655d2d85cd6039edSHA-256: 6db82499864d0bc0ebc9f02d09ef17db20c0a5636e737bff87165c7187dcb75f
hwcert-server-1.6.5.2-20141028.el6.noarch.rpm
    MD5: b277f9b4ca494bf202c31a8064969dd8SHA-256: 63b1c79c8f6e12bf04059fca726a0b815b28e840486ed5ed3d6898df7480299e
 
PPC:
hwcert-client-1.6.5.2-20141028.el6.noarch.rpm
    MD5: acf960c4b920b590655d2d85cd6039edSHA-256: 6db82499864d0bc0ebc9f02d09ef17db20c0a5636e737bff87165c7187dcb75f
hwcert-server-1.6.5.2-20141028.el6.noarch.rpm
    MD5: b277f9b4ca494bf202c31a8064969dd8SHA-256: 63b1c79c8f6e12bf04059fca726a0b815b28e840486ed5ed3d6898df7480299e
 
s390x:
hwcert-client-1.6.5.2-20141028.el6.noarch.rpm
    MD5: acf960c4b920b590655d2d85cd6039edSHA-256: 6db82499864d0bc0ebc9f02d09ef17db20c0a5636e737bff87165c7187dcb75f
hwcert-server-1.6.5.2-20141028.el6.noarch.rpm
    MD5: b277f9b4ca494bf202c31a8064969dd8SHA-256: 63b1c79c8f6e12bf04059fca726a0b815b28e840486ed5ed3d6898df7480299e
 
x86_64:
hwcert-client-1.6.5.2-20141028.el6.noarch.rpm
    MD5: acf960c4b920b590655d2d85cd6039edSHA-256: 6db82499864d0bc0ebc9f02d09ef17db20c0a5636e737bff87165c7187dcb75f
hwcert-server-1.6.5.2-20141028.el6.noarch.rpm
    MD5: b277f9b4ca494bf202c31a8064969dd8SHA-256: 63b1c79c8f6e12bf04059fca726a0b815b28e840486ed5ed3d6898df7480299e
 
(The unlinked packages above are only available from the Red Hat Network)
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from:

Leave a Reply