- Issued:
- 2007-04-28
- Updated:
- 2007-04-28
RHBA-2007:0250 - Bug Fix Advisory
Synopsis
up2date bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated up2date packages that fix various bugs are now available.
Description
The up2date package installs the Red Hat Update Agent. This utility
automatically queries the Red Hat Network servers to determine which
packages need to be updated on your machine.
These updated packages apply the following fixes:
- included a fix for rhn_register, where it hangs after kickstart build
- included a fix for up2date install to avoid errors during %post
- included a fix to deal correctly with comps
- rhn_register TUI now works on a para-virt guest environment
- rhn_register GUI now works on a virt guest environment
- included a fix for hardcoded release version
- included a rhn_check fix for %pre scriptlet failure with error logging
- fixed policycoreutils dependency
- included a fix to identify fully virt guests
- included a fix to allow rhn_check to check and avoid multiple instances
- included a fix for rhn_check to dep solver
- included a fix for --arch
- included a rhn_check fix for scheduled update installs selected and not
latest package
- the --list-rollbacks option is now deprecated
- tui now detects if the system has entitlements
- if hardware or package profile sending fails, user is only warned;
process continues
- included a probable fix to retrieve BIOS information. Applied a patch
which fixes dmi reading on all machines (verified during testing)
- included a fix for --configure option to run only when asked.
- multilib packages in dir repo can now be detected
- fixed --channel option to take into account custom channels
- fixed --show-available option for i386 on x86_64
- fixed man pages to include rhn_register and rhn_check
- fixed a bug where up2date returns and leaves the job in background
- fixed a bug where rhnsd spawns child processes with SIGPIPE set to SIG_IGN
- fix for up2date's obsolete issue for mozilla-seamonkey
- restored SELinux contexts for the config files after munging them
Users are advised to upgrade to these updated up2date packages, which
resolve these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 149177 - rhn_register - unable to send hardware profile in RHEL4
- BZ - 160195 - manual page of up2date does not mention rhn_register and rhn_check
- BZ - 163483 - rhnsd spawns children with SIGPIPE set to SIG_IGN
- BZ - 168250 - up2date does not "see" multilib packages in "dir" repos
- BZ - 170066 - up2date return before updating is completed, leaving background job
- BZ - 172009 - up2date runs --configure on first run even when not requested
- BZ - 193563 - runTransaction doesn't dependency solve, which can break sync's to profiles on x86_64
- BZ - 201020 - up2date depends on policycoreutils but doesn't enforce it.
- BZ - 201092 - up2date --arch doesn't adequately take into account obsoletes (or something)
- BZ - 223229 - [PATCH] rhn_check reports success if %pre scriptlet fail with exit 1
- BZ - 234542 - up2date '@ GNOME Desktop Environment' defaults to up2date -u and backgrounds itself
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
up2date-4.5.5-5.el4.src.rpm | SHA-256: 460309c5a0869c689d80c1f377cfc1f6376c0fc70e1ae9e566645da0119e957a |
x86_64 | |
up2date-4.5.5-5.el4.x86_64.rpm | SHA-256: 4de7225b9b4538b6230e5a728caa34b9f1f941365f21043a3519bef065ca1d2f |
up2date-4.5.5-5.el4.x86_64.rpm | SHA-256: 4de7225b9b4538b6230e5a728caa34b9f1f941365f21043a3519bef065ca1d2f |
up2date-gnome-4.5.5-5.el4.x86_64.rpm | SHA-256: 342f5e89787e1e574838fe1af8785737e41a718a75656841257687abfea87f6b |
up2date-gnome-4.5.5-5.el4.x86_64.rpm | SHA-256: 342f5e89787e1e574838fe1af8785737e41a718a75656841257687abfea87f6b |
ia64 | |
up2date-4.5.5-5.el4.ia64.rpm | SHA-256: 5e26499432f8e607d2d0c1e402ac0f04b236404b08c44fafcd475541f85a4e3b |
up2date-4.5.5-5.el4.ia64.rpm | SHA-256: 5e26499432f8e607d2d0c1e402ac0f04b236404b08c44fafcd475541f85a4e3b |
up2date-gnome-4.5.5-5.el4.ia64.rpm | SHA-256: 3e4457e80e3b5a11c3a5e90807ee3ee457ae741e14bdc7c5f9cb9a8c07393851 |
up2date-gnome-4.5.5-5.el4.ia64.rpm | SHA-256: 3e4457e80e3b5a11c3a5e90807ee3ee457ae741e14bdc7c5f9cb9a8c07393851 |
i386 | |
up2date-4.5.5-5.el4.i386.rpm | SHA-256: 25fd3b1a653195053cc2772e8113b0f52a1824638fcd5a71af032ca70e49f3ac |
up2date-4.5.5-5.el4.i386.rpm | SHA-256: 25fd3b1a653195053cc2772e8113b0f52a1824638fcd5a71af032ca70e49f3ac |
up2date-gnome-4.5.5-5.el4.i386.rpm | SHA-256: 6616a4d21374c3a5a03866537688fd373fb25af1937182ca578402092919e3a6 |
up2date-gnome-4.5.5-5.el4.i386.rpm | SHA-256: 6616a4d21374c3a5a03866537688fd373fb25af1937182ca578402092919e3a6 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
up2date-4.5.5-5.el4.src.rpm | SHA-256: 460309c5a0869c689d80c1f377cfc1f6376c0fc70e1ae9e566645da0119e957a |
x86_64 | |
up2date-4.5.5-5.el4.x86_64.rpm | SHA-256: 4de7225b9b4538b6230e5a728caa34b9f1f941365f21043a3519bef065ca1d2f |
up2date-gnome-4.5.5-5.el4.x86_64.rpm | SHA-256: 342f5e89787e1e574838fe1af8785737e41a718a75656841257687abfea87f6b |
ia64 | |
up2date-4.5.5-5.el4.ia64.rpm | SHA-256: 5e26499432f8e607d2d0c1e402ac0f04b236404b08c44fafcd475541f85a4e3b |
up2date-gnome-4.5.5-5.el4.ia64.rpm | SHA-256: 3e4457e80e3b5a11c3a5e90807ee3ee457ae741e14bdc7c5f9cb9a8c07393851 |
i386 | |
up2date-4.5.5-5.el4.i386.rpm | SHA-256: 25fd3b1a653195053cc2772e8113b0f52a1824638fcd5a71af032ca70e49f3ac |
up2date-gnome-4.5.5-5.el4.i386.rpm | SHA-256: 6616a4d21374c3a5a03866537688fd373fb25af1937182ca578402092919e3a6 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
up2date-4.5.5-5.el4.src.rpm | SHA-256: 460309c5a0869c689d80c1f377cfc1f6376c0fc70e1ae9e566645da0119e957a |
x86_64 | |
up2date-4.5.5-5.el4.x86_64.rpm | SHA-256: 4de7225b9b4538b6230e5a728caa34b9f1f941365f21043a3519bef065ca1d2f |
up2date-gnome-4.5.5-5.el4.x86_64.rpm | SHA-256: 342f5e89787e1e574838fe1af8785737e41a718a75656841257687abfea87f6b |
i386 | |
up2date-4.5.5-5.el4.i386.rpm | SHA-256: 25fd3b1a653195053cc2772e8113b0f52a1824638fcd5a71af032ca70e49f3ac |
up2date-gnome-4.5.5-5.el4.i386.rpm | SHA-256: 6616a4d21374c3a5a03866537688fd373fb25af1937182ca578402092919e3a6 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
up2date-4.5.5-5.el4.src.rpm | SHA-256: 460309c5a0869c689d80c1f377cfc1f6376c0fc70e1ae9e566645da0119e957a |
s390x | |
up2date-4.5.5-5.el4.s390x.rpm | SHA-256: e0c5312d2072a17adc8d866043cd49bd9a90f76abaa16558e2f2a2715ed3aba6 |
up2date-gnome-4.5.5-5.el4.s390x.rpm | SHA-256: ec31818aaa30c355aacba77d60a954660a721bc9a7ae91bdba495a5e54ea894e |
s390 | |
up2date-4.5.5-5.el4.s390.rpm | SHA-256: 5c5f3ded80ba8d20eb488184fc3f9a217c8523a54e74fa77db487cc1fdd22233 |
up2date-gnome-4.5.5-5.el4.s390.rpm | SHA-256: 9847a6dcd52781ce356e87062efbdc7cb4ed4d38830025b1f7f5502d4b913370 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
up2date-4.5.5-5.el4.src.rpm | SHA-256: 460309c5a0869c689d80c1f377cfc1f6376c0fc70e1ae9e566645da0119e957a |
ppc | |
up2date-4.5.5-5.el4.ppc.rpm | SHA-256: 244fab05d5b94a3950e9bd0479dfec60cfe40b1ac08213e7ae04ba2ac1c76c23 |
up2date-gnome-4.5.5-5.el4.ppc.rpm | SHA-256: 659a4d8d4d0f3cb2e09f1ea3023c55e15d9ae6964e654b08c2fadcd12e2456f6 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.