- Issued:
- 2009-09-02
- Updated:
- 2009-09-02
RHBA-2009:1354 - Bug Fix Advisory
Synopsis
rhn-client-tools bug fix and enhancement update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated rhn-client-tools packages that fix several bugs and add
enhancements are now available.
Description
Red Hat Network Client Tools provide programs and libraries that allow your
system to receive software updates from the Red Hat Network (RHN).
These updated packages fix the following bugs and add the following
enhancements:
- when selecting certificates, rhn_register created backup copies of the
original cert each time a wrong cert is choose. (BZ#250312)
- when scheduling specific errata from the satellite or hosted Web user
interface (WebUI), said errata did not get installed during rhn_check due
to missing VREA as it took into account only the name. (BZ#464827)
- when rhn_check processed the action names, the sanity check was fragile
for different locales (BZ#467139)
- running rhn_register on a xen guest caused mmap errors. (BZ#476797)
- rhn_check, while processing errata scheduled actions, installed extra
32-bit packages as it was ignoring the package architecture. (BZ#476894)
- rhn-client-tools should now depend on version 2.2.7 or newer of rhnlib.
(BZ#487754)
- the --contactinfo option has been deprecated from the rhnreg_ks utility.
(BZ#204449)
- parsing te_IN locale strings in the registration Graphical User Interface
(GUI) caused a TypeError. (BZ#227638)
- firstboot registration logic was unaware of whether the system is already
registered. (BZ#445881)
- when registration failed in the entitlement page, it should now be able
to handle newer entitlement numbers. (BZ#454005)
- a typo ("receives" should be "receive") in the registration text
user-interface (TUI) was corrected. (BZ#466718)
- the registration TUI should now be able to choose the cert if available
in the default location automatically. If not it should prompt users to
choose the cert. (BZ#471928)
- an option to not include network information while registration probes
for hardware info is now provided. A new config option called sendNetwork
has been added and is turned on by default. (BZ#479706)
- when haldaemon or messagebus are not running, hardware refresh should
warn users that the daemon is not running instead of a generic dmi error.
(BZ#491258)
- registration should not look for cert when using the insecure http
protocol. The certificate should only matter when using the secure, https,
protocol. (BZ#494928)
- rhn_register should now be able to identify kvm guests by sending the
uuid and virt type to the server through smbios data. The kvm guests will
be identified as kvm/qemu upon successfully registration.(BZ#495615)
All Red Hat Network users are advised to install this updated package which
addresses these issues.
Solution
Before applying this update, make sure that all previously-released
errata relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use
the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 5 x86_64
- Red Hat Enterprise Linux Server 5 ia64
- Red Hat Enterprise Linux Server 5 i386
- Red Hat Enterprise Linux Workstation 5 x86_64
- Red Hat Enterprise Linux Workstation 5 i386
- Red Hat Enterprise Linux Desktop 5 x86_64
- Red Hat Enterprise Linux Desktop 5 i386
- Red Hat Enterprise Linux for IBM z Systems 5 s390x
- Red Hat Enterprise Linux for Power, big endian 5 ppc
- Red Hat Enterprise Linux Server from RHUI 5 x86_64
- Red Hat Enterprise Linux Server from RHUI 5 i386
Fixes
- BZ - 250312 - Selecting a different cert while running rhn_register GUI results in generating a new back up copy of the original cert every time a wrong cert is selected.
- BZ - 445881 - firstboot is unaware of whether a system is already registered
- BZ - 454005 - If registration fails at first, you need to restart rhn_register
- BZ - 466718 - typo in rhn_register TUI ("receives" -> "receive")
- BZ - 467139 - rhn_check's action name sanity check is fragile for different locales
- BZ - 471928 - Tui should be able to choose cert automatically depending on hosted or satellite
- BZ - 476894 - Errata push on 64-bit system installs unneeded 32-bit packages
- BZ - 487754 - Bump Requires: rhnlib >= 2.1 to 2.2.7 in support of enhance and test redirect support for rhnlib
- BZ - 495615 - Update rhn_register to properly parse the dmi information on for registration on a kvm host
- BZ - 501316 - unable to rhnreg_ks using an activation key with profilename not specified
- BZ - 504292 - getting registration error with sslCACert configured to non default location
- BZ - 504296 - rhnreg_ks gives unexpected output "Network Info::"
- BZ - 508737 - Redhat Software Updater Crash
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 5
SRPM | |
---|---|
rhn-client-tools-0.4.20-9.el5.src.rpm | SHA-256: 28199265c73ad566c85335fe785f149f341c0792299d47a019852eff326a7d8b |
x86_64 | |
rhn-check-0.4.20-9.el5.noarch.rpm | SHA-256: 4fb404c92c8e00ddb773f1419a1a7ac46e394cf8360eae90f5c4b72207dc45ef |
rhn-client-tools-0.4.20-9.el5.noarch.rpm | SHA-256: ca93b0a45170362d356d157e9605e0796db4d83985222297cea65238c0190fc5 |
rhn-setup-0.4.20-9.el5.noarch.rpm | SHA-256: f09c437e6047f12721a397f78c99b55b1aa92436d1d575f5cb3a9f235694522f |
rhn-setup-gnome-0.4.20-9.el5.noarch.rpm | SHA-256: 7bb05517c401a605b811dd27c3dc31072802f53b0cea85b84b73d4226f401511 |
ia64 | |
rhn-check-0.4.20-9.el5.noarch.rpm | SHA-256: 4fb404c92c8e00ddb773f1419a1a7ac46e394cf8360eae90f5c4b72207dc45ef |
rhn-client-tools-0.4.20-9.el5.noarch.rpm | SHA-256: ca93b0a45170362d356d157e9605e0796db4d83985222297cea65238c0190fc5 |
rhn-setup-0.4.20-9.el5.noarch.rpm | SHA-256: f09c437e6047f12721a397f78c99b55b1aa92436d1d575f5cb3a9f235694522f |
rhn-setup-gnome-0.4.20-9.el5.noarch.rpm | SHA-256: 7bb05517c401a605b811dd27c3dc31072802f53b0cea85b84b73d4226f401511 |
i386 | |
rhn-check-0.4.20-9.el5.noarch.rpm | SHA-256: 4fb404c92c8e00ddb773f1419a1a7ac46e394cf8360eae90f5c4b72207dc45ef |
rhn-client-tools-0.4.20-9.el5.noarch.rpm | SHA-256: ca93b0a45170362d356d157e9605e0796db4d83985222297cea65238c0190fc5 |
rhn-setup-0.4.20-9.el5.noarch.rpm | SHA-256: f09c437e6047f12721a397f78c99b55b1aa92436d1d575f5cb3a9f235694522f |
rhn-setup-gnome-0.4.20-9.el5.noarch.rpm | SHA-256: 7bb05517c401a605b811dd27c3dc31072802f53b0cea85b84b73d4226f401511 |
Red Hat Enterprise Linux Workstation 5
SRPM | |
---|---|
rhn-client-tools-0.4.20-9.el5.src.rpm | SHA-256: 28199265c73ad566c85335fe785f149f341c0792299d47a019852eff326a7d8b |
x86_64 | |
rhn-check-0.4.20-9.el5.noarch.rpm | SHA-256: 4fb404c92c8e00ddb773f1419a1a7ac46e394cf8360eae90f5c4b72207dc45ef |
rhn-client-tools-0.4.20-9.el5.noarch.rpm | SHA-256: ca93b0a45170362d356d157e9605e0796db4d83985222297cea65238c0190fc5 |
rhn-setup-0.4.20-9.el5.noarch.rpm | SHA-256: f09c437e6047f12721a397f78c99b55b1aa92436d1d575f5cb3a9f235694522f |
rhn-setup-gnome-0.4.20-9.el5.noarch.rpm | SHA-256: 7bb05517c401a605b811dd27c3dc31072802f53b0cea85b84b73d4226f401511 |
i386 | |
rhn-check-0.4.20-9.el5.noarch.rpm | SHA-256: 4fb404c92c8e00ddb773f1419a1a7ac46e394cf8360eae90f5c4b72207dc45ef |
rhn-client-tools-0.4.20-9.el5.noarch.rpm | SHA-256: ca93b0a45170362d356d157e9605e0796db4d83985222297cea65238c0190fc5 |
rhn-setup-0.4.20-9.el5.noarch.rpm | SHA-256: f09c437e6047f12721a397f78c99b55b1aa92436d1d575f5cb3a9f235694522f |
rhn-setup-gnome-0.4.20-9.el5.noarch.rpm | SHA-256: 7bb05517c401a605b811dd27c3dc31072802f53b0cea85b84b73d4226f401511 |
Red Hat Enterprise Linux Desktop 5
SRPM | |
---|---|
rhn-client-tools-0.4.20-9.el5.src.rpm | SHA-256: 28199265c73ad566c85335fe785f149f341c0792299d47a019852eff326a7d8b |
x86_64 | |
rhn-check-0.4.20-9.el5.noarch.rpm | SHA-256: 4fb404c92c8e00ddb773f1419a1a7ac46e394cf8360eae90f5c4b72207dc45ef |
rhn-client-tools-0.4.20-9.el5.noarch.rpm | SHA-256: ca93b0a45170362d356d157e9605e0796db4d83985222297cea65238c0190fc5 |
rhn-setup-0.4.20-9.el5.noarch.rpm | SHA-256: f09c437e6047f12721a397f78c99b55b1aa92436d1d575f5cb3a9f235694522f |
rhn-setup-gnome-0.4.20-9.el5.noarch.rpm | SHA-256: 7bb05517c401a605b811dd27c3dc31072802f53b0cea85b84b73d4226f401511 |
i386 | |
rhn-check-0.4.20-9.el5.noarch.rpm | SHA-256: 4fb404c92c8e00ddb773f1419a1a7ac46e394cf8360eae90f5c4b72207dc45ef |
rhn-client-tools-0.4.20-9.el5.noarch.rpm | SHA-256: ca93b0a45170362d356d157e9605e0796db4d83985222297cea65238c0190fc5 |
rhn-setup-0.4.20-9.el5.noarch.rpm | SHA-256: f09c437e6047f12721a397f78c99b55b1aa92436d1d575f5cb3a9f235694522f |
rhn-setup-gnome-0.4.20-9.el5.noarch.rpm | SHA-256: 7bb05517c401a605b811dd27c3dc31072802f53b0cea85b84b73d4226f401511 |
Red Hat Enterprise Linux for IBM z Systems 5
SRPM | |
---|---|
rhn-client-tools-0.4.20-9.el5.src.rpm | SHA-256: 28199265c73ad566c85335fe785f149f341c0792299d47a019852eff326a7d8b |
s390x | |
rhn-check-0.4.20-9.el5.noarch.rpm | SHA-256: 4fb404c92c8e00ddb773f1419a1a7ac46e394cf8360eae90f5c4b72207dc45ef |
rhn-client-tools-0.4.20-9.el5.noarch.rpm | SHA-256: ca93b0a45170362d356d157e9605e0796db4d83985222297cea65238c0190fc5 |
rhn-setup-0.4.20-9.el5.noarch.rpm | SHA-256: f09c437e6047f12721a397f78c99b55b1aa92436d1d575f5cb3a9f235694522f |
rhn-setup-gnome-0.4.20-9.el5.noarch.rpm | SHA-256: 7bb05517c401a605b811dd27c3dc31072802f53b0cea85b84b73d4226f401511 |
Red Hat Enterprise Linux for Power, big endian 5
SRPM | |
---|---|
rhn-client-tools-0.4.20-9.el5.src.rpm | SHA-256: 28199265c73ad566c85335fe785f149f341c0792299d47a019852eff326a7d8b |
ppc | |
rhn-check-0.4.20-9.el5.noarch.rpm | SHA-256: 4fb404c92c8e00ddb773f1419a1a7ac46e394cf8360eae90f5c4b72207dc45ef |
rhn-client-tools-0.4.20-9.el5.noarch.rpm | SHA-256: ca93b0a45170362d356d157e9605e0796db4d83985222297cea65238c0190fc5 |
rhn-setup-0.4.20-9.el5.noarch.rpm | SHA-256: f09c437e6047f12721a397f78c99b55b1aa92436d1d575f5cb3a9f235694522f |
rhn-setup-gnome-0.4.20-9.el5.noarch.rpm | SHA-256: 7bb05517c401a605b811dd27c3dc31072802f53b0cea85b84b73d4226f401511 |
Red Hat Enterprise Linux Server from RHUI 5
SRPM | |
---|---|
rhn-client-tools-0.4.20-9.el5.src.rpm | SHA-256: 28199265c73ad566c85335fe785f149f341c0792299d47a019852eff326a7d8b |
x86_64 | |
rhn-check-0.4.20-9.el5.noarch.rpm | SHA-256: 4fb404c92c8e00ddb773f1419a1a7ac46e394cf8360eae90f5c4b72207dc45ef |
rhn-client-tools-0.4.20-9.el5.noarch.rpm | SHA-256: ca93b0a45170362d356d157e9605e0796db4d83985222297cea65238c0190fc5 |
rhn-setup-0.4.20-9.el5.noarch.rpm | SHA-256: f09c437e6047f12721a397f78c99b55b1aa92436d1d575f5cb3a9f235694522f |
rhn-setup-gnome-0.4.20-9.el5.noarch.rpm | SHA-256: 7bb05517c401a605b811dd27c3dc31072802f53b0cea85b84b73d4226f401511 |
i386 | |
rhn-check-0.4.20-9.el5.noarch.rpm | SHA-256: 4fb404c92c8e00ddb773f1419a1a7ac46e394cf8360eae90f5c4b72207dc45ef |
rhn-client-tools-0.4.20-9.el5.noarch.rpm | SHA-256: ca93b0a45170362d356d157e9605e0796db4d83985222297cea65238c0190fc5 |
rhn-setup-0.4.20-9.el5.noarch.rpm | SHA-256: f09c437e6047f12721a397f78c99b55b1aa92436d1d575f5cb3a9f235694522f |
rhn-setup-gnome-0.4.20-9.el5.noarch.rpm | SHA-256: 7bb05517c401a605b811dd27c3dc31072802f53b0cea85b84b73d4226f401511 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.