- Issued:
- 2009-05-18
- Updated:
- 2009-05-18
RHBA-2009:0972 - Bug Fix Advisory
Synopsis
up2date bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated up2date packages that fix various bugs are now available.
Description
Up2date is the Red Hat Update Agent that automatically queries the Red Hat
Network servers and determines which packages need to be updated on
your machine.
These updated packages fix the following bugs:
- bootloaders in grub.conf were not being recognised as grubs without their
comment tags. This has been corrected and bootloaders are now recognised
regardless. (BZ#431717)
- rhn_register now checks and sends the correct hostname during kickstart,
which solves macro provisioning issues that arose from hostname mismatch.
(BZ#134078)
- a mutual dependency error caused php installation from the Application
Stack channel to fail in Red Hat Enterprise Linux 4.4. The error no longer
presents. (BZ#214203)
- long rpm field names were causing parse errors when field names were
printed side by side. Print columns have been padded to allow a greater
number of characters. (BZ#435013)
- skip-list now carries latest package information so that rhn_check skips
the correct package. (BZ#299971)
- rpm now checks version requirements when resolving dependencies.
(BZ#445382)
- rhn_check should now relate obsolete packages to their replacements, so
updates from the WebUI will work as expected. (BZ#447874)
- up2date was ignoring --arch while updating packages. It should now honour
- -arch as expected. (BZ#452855)
- rhn_check will now give a clean error message instead of tracebacks if
disk space is insufficient. (BZ#452877)
- up2date should now handle spaces in path names properly. (BZ#456064)
- server side miscommunication meant that errata push from server was
including packages for unused architectures in updates. Arch info is now
sent during errata push, so only necessary arch packages are pulled down.
(BZ#457629)
- rhn_check package conflicts between arches caused errata pushes to fail
on 64 bit systems. This has been corrected and package conflicts should no
longer occur. (BZ#457631)
- up2date was hard-coded to report /var/spool/up2date inaccessible when a
temporary directory could not be found when using --tmpdir. The error
message has been altered to reflect the name of the missing directory and
- -tmpdir should now report errors as expected. (BZ#458208)
- rhn_check ordered errata incorrectly, so older packages were pulled down
in errata pushes. rhn_check now orders the errata correctly, and pulls
down the requested package. (BZ#460684)
- rhn_check would fail during snapshot rollback depending on progress
CallBack value. The callback has been modified and now works as expected.
(BZ#464772)
- up2date failed to add obsoleting packages to package set, which caused an
rpm error. It should now detect obsolete packages and pull down the
new package as expected. (BZ#468006)
- up2date would fail to install packages that were listed under the default
activation key when rhn_register was run in the GUI. It should now install
packages if available. (BZ#468742)
- when updating/installing, up2date would ignore server-specified arch
information. This has been altered so that server-specified arches take
precedence over the NVRE. (BZ#469034)
- there were a number of issues with up2date failing to retrieve packages
for multiple architectures. Support for multiple architectures has
been added, and up2date should handle these more gracefully. (BZ#484083)
- rhn_check would update all errata packages instead of scheduled packages.
It should now pull down only requested packages. (BZ#484390)
- rhn_check would request an older package when a newer one was required.
This has been fixed, and it should now request the correct package version.
(BZ#487753)
- version copyright notes have been corrected. (BZ#452827)
- channel installation error messages are now more informative for users
and retain traceback for debugging. (BZ#452833)
- various usability issues with the rhn_register interface have been fixed.
(BZ#452836)
Users are advised to upgrade to these updated packages, which
resolve these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 214203 - up2date to Application Stack channel fails from vanilla U4
- BZ - 431717 - checkbootloader.py is relying upon comment tags within grub.conf.
- BZ - 435013 - up2date --list fields run together
- BZ - 452827 - Update copyright notes
- BZ - 452833 - Omit backtrace as a "verbose output", it looks scary
- BZ - 452836 - various usability problems of GUI rhn_register
- BZ - 452855 - up2date updates package.noarch on i386 system even when --arch=x86_64
- BZ - 452877 - rhn_check has traceback when disk is full
- BZ - 456064 - dir type sources cannot contain spaces
- BZ - 468742 - rhn_register gui and tui fails to install packages listed in default activation key
- BZ - 469034 - client should handle the arch information if sent down from server instead of jus comparing NVRE
- BZ - 484390 - rhn_check Grabbing All Available Errata
- BZ - 487753 - Bump Requires: rhnlib >= 1.8.7 to 2.1.4 in support of enhance and test redirect support for rhnlib
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
up2date-4.8.1-33.el4.src.rpm | SHA-256: 402f498549c8e1f1c781d1733e827e0fd1bb4c81535811e4652ccd13a5fc653b |
x86_64 | |
up2date-4.8.1-33.el4.x86_64.rpm | SHA-256: bbbed6710a1491282bf80565978f99d0eef7c4fe8b87751c646f8052345b2e18 |
up2date-4.8.1-33.el4.x86_64.rpm | SHA-256: bbbed6710a1491282bf80565978f99d0eef7c4fe8b87751c646f8052345b2e18 |
up2date-gnome-4.8.1-33.el4.x86_64.rpm | SHA-256: f9f04c2c8aae1c31e7b8f752ae491b1cb579284b9498ed708221b47961d6f220 |
up2date-gnome-4.8.1-33.el4.x86_64.rpm | SHA-256: f9f04c2c8aae1c31e7b8f752ae491b1cb579284b9498ed708221b47961d6f220 |
ia64 | |
up2date-4.8.1-33.el4.ia64.rpm | SHA-256: 7e7500c82838fceddf16974ad4070b3e18faaad7d39bce1a5631e252f45551f4 |
up2date-4.8.1-33.el4.ia64.rpm | SHA-256: 7e7500c82838fceddf16974ad4070b3e18faaad7d39bce1a5631e252f45551f4 |
up2date-gnome-4.8.1-33.el4.ia64.rpm | SHA-256: d46c1b6b422783370c47ab0aa3785e8a458c14331d9320b68dcd763615f8d066 |
up2date-gnome-4.8.1-33.el4.ia64.rpm | SHA-256: d46c1b6b422783370c47ab0aa3785e8a458c14331d9320b68dcd763615f8d066 |
i386 | |
up2date-4.8.1-33.el4.i386.rpm | SHA-256: ef9d8bc748dd1c13ac3adcf3e74ec72d0bab79d86e25a9aef1ae4142feb472d4 |
up2date-4.8.1-33.el4.i386.rpm | SHA-256: ef9d8bc748dd1c13ac3adcf3e74ec72d0bab79d86e25a9aef1ae4142feb472d4 |
up2date-gnome-4.8.1-33.el4.i386.rpm | SHA-256: 844ae7a6bebe8f08c46d81f9b462b936bb830bf6886b09314068ec178b8932e6 |
up2date-gnome-4.8.1-33.el4.i386.rpm | SHA-256: 844ae7a6bebe8f08c46d81f9b462b936bb830bf6886b09314068ec178b8932e6 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
up2date-4.8.1-33.el4.src.rpm | SHA-256: 402f498549c8e1f1c781d1733e827e0fd1bb4c81535811e4652ccd13a5fc653b |
x86_64 | |
up2date-4.8.1-33.el4.x86_64.rpm | SHA-256: bbbed6710a1491282bf80565978f99d0eef7c4fe8b87751c646f8052345b2e18 |
up2date-gnome-4.8.1-33.el4.x86_64.rpm | SHA-256: f9f04c2c8aae1c31e7b8f752ae491b1cb579284b9498ed708221b47961d6f220 |
ia64 | |
up2date-4.8.1-33.el4.ia64.rpm | SHA-256: 7e7500c82838fceddf16974ad4070b3e18faaad7d39bce1a5631e252f45551f4 |
up2date-gnome-4.8.1-33.el4.ia64.rpm | SHA-256: d46c1b6b422783370c47ab0aa3785e8a458c14331d9320b68dcd763615f8d066 |
i386 | |
up2date-4.8.1-33.el4.i386.rpm | SHA-256: ef9d8bc748dd1c13ac3adcf3e74ec72d0bab79d86e25a9aef1ae4142feb472d4 |
up2date-gnome-4.8.1-33.el4.i386.rpm | SHA-256: 844ae7a6bebe8f08c46d81f9b462b936bb830bf6886b09314068ec178b8932e6 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
up2date-4.8.1-33.el4.src.rpm | SHA-256: 402f498549c8e1f1c781d1733e827e0fd1bb4c81535811e4652ccd13a5fc653b |
x86_64 | |
up2date-4.8.1-33.el4.x86_64.rpm | SHA-256: bbbed6710a1491282bf80565978f99d0eef7c4fe8b87751c646f8052345b2e18 |
up2date-gnome-4.8.1-33.el4.x86_64.rpm | SHA-256: f9f04c2c8aae1c31e7b8f752ae491b1cb579284b9498ed708221b47961d6f220 |
i386 | |
up2date-4.8.1-33.el4.i386.rpm | SHA-256: ef9d8bc748dd1c13ac3adcf3e74ec72d0bab79d86e25a9aef1ae4142feb472d4 |
up2date-gnome-4.8.1-33.el4.i386.rpm | SHA-256: 844ae7a6bebe8f08c46d81f9b462b936bb830bf6886b09314068ec178b8932e6 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
up2date-4.8.1-33.el4.src.rpm | SHA-256: 402f498549c8e1f1c781d1733e827e0fd1bb4c81535811e4652ccd13a5fc653b |
s390x | |
up2date-4.8.1-33.el4.s390x.rpm | SHA-256: 02e2c1490c3cf0bb6d52312270b8963a9aee520dae22a1615a138f935c60d1d7 |
up2date-gnome-4.8.1-33.el4.s390x.rpm | SHA-256: 168aa6a8d93966f030932721d43ae3e620050b66e2afd3d082211462e89a7f96 |
s390 | |
up2date-4.8.1-33.el4.s390.rpm | SHA-256: 898f0d2a4d55f7662ea3cf255f26a395b160ee54d90801c8ee4a20b6f3709458 |
up2date-gnome-4.8.1-33.el4.s390.rpm | SHA-256: 409313a8905ba956662656a73c8cf58092a6a1194d9929277f661f7b534acfd2 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
up2date-4.8.1-33.el4.src.rpm | SHA-256: 402f498549c8e1f1c781d1733e827e0fd1bb4c81535811e4652ccd13a5fc653b |
ppc | |
up2date-4.8.1-33.el4.ppc.rpm | SHA-256: 95402ab6ebc56896a65c5c111f5ba8b749774cdcc306f422072a1a06b7d78fbe |
up2date-gnome-4.8.1-33.el4.ppc.rpm | SHA-256: 702c3b397590cfa0c72a0c862098a401646e171756e1da858164fcd284b1dea1 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.