- Issued:
- 2007-11-15
- Updated:
- 2007-11-15
RHBA-2007:0815 - Bug Fix Advisory
Synopsis
up2date bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated up2date packages that fix various bugs are now available.
Description
The Red Hat Update Agent automatically queries the Red Hat Network servers and determines which
packages need to be updated on your machine.
These updated packages include the following fixes:
- up2date no longer fails when run with the --channel option pointing to a custom subscribed
channel.
- rhnreg_ks no longer raises conflict errors if package installs through an activation key are run with
the config management option turned on.
- up2date no longer throws "TypeErrors" with repomd.
- up2date no longer throws "unboundLocal" errors when fetching the Obsoletes list for a channel.
- up2date now correctly skips already installed packages.
- text in a tooltip presented with the Create Login window of rhn_register has been corrected.
- the up2date man page has been corrected to show the correct syntax for the "--installall" option.
- rhnreg_ks activation key-based package installs no longer report already installed packages
multiple times after package installation.
- when a package is not installed because it has been obsoleted by a different rpm, up2date now
returns a message explaining why the package was not installed
- up2date no longer times out and fails when downloading large rpms.
- up2date now correctly handles requests from unsubscribed channels
- when up2date is configured to check multiple servers for updates (ie when
/etc/sysconfig/rhn/up2date is edited to list multiple serverURLs, noSSLServerURLs or both to provide
backup in the event of server fallover) it now tries the secondary, and further, servers listed.
- up2date no longer presents an "xml.parsers.expat.ExpatError" error when run with the "-u" or "--
update" switch.
- rhn_register now presents an alert when an attempt is made to create a new user with an existing
username.
- running up2date with the "--installall" option now finds packages on multiple custom channels.
- EUS support has been added to both the GUI- and shell-based rhn_register interfaces. EUS support
has also been added to rhnreg_ks.
All up2date users should install these updated packages which resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/FAQ_58_10188
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 204109 - up2date fails with package already installed
- BZ - 205726 - up2date fails with expat error and python stacktrace
- BZ - 208442 - up2date Server Failover Doesn't Work
- BZ - 210625 - 3rd party channels will not update when specified with the --channel option
- BZ - 232704 - rhn_register/up2date --register: MouseOver for "Get email reminders"
- BZ - 235748 - 'up2date gcc' -> UnboundLocalError
- BZ - 238934 - up2date-4.5.5-6.el4: repomd fails with type errors.
- BZ - 243451 - activation key package install reports multiple listings of the same package after pkg install
- BZ - 244298 - rhnreg_ks ends up with a conflict if config mgmt option is enabled in activation key
- BZ - 246566 - Up2date man page specifies wrong syntax for --installall
- BZ - 249877 - rhn_register tui should support extended update model with an new OSRelease screen
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
up2date-4.6.2-7.el4.src.rpm | SHA-256: fabc48fab416e00ed6eea784c611471928cac08434ab8cdd569d7bad7b5d5892 |
x86_64 | |
up2date-4.6.2-7.el4.x86_64.rpm | SHA-256: 04a5818e629268c1e3c6a3a8cfbe97ba267dfef391c010a50077c5a37b80217d |
up2date-4.6.2-7.el4.x86_64.rpm | SHA-256: 04a5818e629268c1e3c6a3a8cfbe97ba267dfef391c010a50077c5a37b80217d |
up2date-gnome-4.6.2-7.el4.x86_64.rpm | SHA-256: eddff68941387111b90a2054663ef0b7f28180db45023bd17439ece3806a187b |
up2date-gnome-4.6.2-7.el4.x86_64.rpm | SHA-256: eddff68941387111b90a2054663ef0b7f28180db45023bd17439ece3806a187b |
ia64 | |
up2date-4.6.2-7.el4.ia64.rpm | SHA-256: de13a4980e10b473f4f2fdfde26a60390b3bad51f9f31ac4cbd54a9d51c8e907 |
up2date-4.6.2-7.el4.ia64.rpm | SHA-256: de13a4980e10b473f4f2fdfde26a60390b3bad51f9f31ac4cbd54a9d51c8e907 |
up2date-gnome-4.6.2-7.el4.ia64.rpm | SHA-256: 59d8fc969ff5b44ef47b84922ec3ccb24fa2f4cfe5e7e8cccb1fb3904016efbd |
up2date-gnome-4.6.2-7.el4.ia64.rpm | SHA-256: 59d8fc969ff5b44ef47b84922ec3ccb24fa2f4cfe5e7e8cccb1fb3904016efbd |
i386 | |
up2date-4.6.2-7.el4.i386.rpm | SHA-256: 8ce51b413422ac4d8e94d0fdbf435d6136c0e4406d05f618afeaac00c404ab72 |
up2date-4.6.2-7.el4.i386.rpm | SHA-256: 8ce51b413422ac4d8e94d0fdbf435d6136c0e4406d05f618afeaac00c404ab72 |
up2date-gnome-4.6.2-7.el4.i386.rpm | SHA-256: 067fd7160484d988b7cd7f646b705ed0370588dfd81056c2fa2e465d047a990c |
up2date-gnome-4.6.2-7.el4.i386.rpm | SHA-256: 067fd7160484d988b7cd7f646b705ed0370588dfd81056c2fa2e465d047a990c |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
up2date-4.6.2-7.el4.src.rpm | SHA-256: fabc48fab416e00ed6eea784c611471928cac08434ab8cdd569d7bad7b5d5892 |
x86_64 | |
up2date-4.6.2-7.el4.x86_64.rpm | SHA-256: 04a5818e629268c1e3c6a3a8cfbe97ba267dfef391c010a50077c5a37b80217d |
up2date-gnome-4.6.2-7.el4.x86_64.rpm | SHA-256: eddff68941387111b90a2054663ef0b7f28180db45023bd17439ece3806a187b |
ia64 | |
up2date-4.6.2-7.el4.ia64.rpm | SHA-256: de13a4980e10b473f4f2fdfde26a60390b3bad51f9f31ac4cbd54a9d51c8e907 |
up2date-gnome-4.6.2-7.el4.ia64.rpm | SHA-256: 59d8fc969ff5b44ef47b84922ec3ccb24fa2f4cfe5e7e8cccb1fb3904016efbd |
i386 | |
up2date-4.6.2-7.el4.i386.rpm | SHA-256: 8ce51b413422ac4d8e94d0fdbf435d6136c0e4406d05f618afeaac00c404ab72 |
up2date-gnome-4.6.2-7.el4.i386.rpm | SHA-256: 067fd7160484d988b7cd7f646b705ed0370588dfd81056c2fa2e465d047a990c |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
up2date-4.6.2-7.el4.src.rpm | SHA-256: fabc48fab416e00ed6eea784c611471928cac08434ab8cdd569d7bad7b5d5892 |
x86_64 | |
up2date-4.6.2-7.el4.x86_64.rpm | SHA-256: 04a5818e629268c1e3c6a3a8cfbe97ba267dfef391c010a50077c5a37b80217d |
up2date-gnome-4.6.2-7.el4.x86_64.rpm | SHA-256: eddff68941387111b90a2054663ef0b7f28180db45023bd17439ece3806a187b |
i386 | |
up2date-4.6.2-7.el4.i386.rpm | SHA-256: 8ce51b413422ac4d8e94d0fdbf435d6136c0e4406d05f618afeaac00c404ab72 |
up2date-gnome-4.6.2-7.el4.i386.rpm | SHA-256: 067fd7160484d988b7cd7f646b705ed0370588dfd81056c2fa2e465d047a990c |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
up2date-4.6.2-7.el4.src.rpm | SHA-256: fabc48fab416e00ed6eea784c611471928cac08434ab8cdd569d7bad7b5d5892 |
s390x | |
up2date-4.6.2-7.el4.s390x.rpm | SHA-256: 6f9a3d7660c6ff3c1b4990e0f463d145a40294f78e9c0c0ea0c037246ce175e9 |
up2date-gnome-4.6.2-7.el4.s390x.rpm | SHA-256: 988127554e4e9fe87e5b85c21d2dbd0a193ff924218001f76e809ccb0e323087 |
s390 | |
up2date-4.6.2-7.el4.s390.rpm | SHA-256: e362d2358a4388265e92a4283e58a0ec392a2896e2e02b69ecb40ae3282bb230 |
up2date-gnome-4.6.2-7.el4.s390.rpm | SHA-256: 1488b8eaccc1fe00c4a780dc53bb8ab73bc54d4c3048ddea2564a1f806cea7f0 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
up2date-4.6.2-7.el4.src.rpm | SHA-256: fabc48fab416e00ed6eea784c611471928cac08434ab8cdd569d7bad7b5d5892 |
ppc | |
up2date-4.6.2-7.el4.ppc.rpm | SHA-256: 1da2715b94c8938f2dfd17f1166ee1ebbb9c5d25796ead607d3c6d7bbcf1c446 |
up2date-gnome-4.6.2-7.el4.ppc.rpm | SHA-256: e01fd25502fe878429fb59d3549dcffbcad6f8a859dee7947b439e6d59e54b66 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.