Skip to navigation

Bug Fix Advisory yum bug fix update

Advisory: RHBA-2010:0254-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2010-03-30
Last updated on: 2010-03-30
Affected Products: Red Hat Enterprise Linux (v. 5 server)
Red Hat Enterprise Linux Desktop (v. 5 client)

Details

An updated yum package that fixes various bugs is now available.

Yum is a utility that can check for and automatically download and install
updated RPM packages. Dependencies are obtained and downloaded
automatically, prompting the user for permission as necessary.

Bugs fixed in these updated packages include:

* fix bugtracker URL. (BZ#528738)

* fix return code error during 'yum reinstall'. (BZ#528746)

* remove slow edge case from compare_providers. (BZ#529233)

* add base package name check to compare_providers(). (BZ#529719)

* fix instant downloads crash. (BZ#517286)

* fix exit regression when updating packages that do not exist. (BZ#521008)

* show obsoletes in check-update, if obsoletes flag is on. (BZ#526064)

All yum users should upgrade to this updated package, which resolves these
issues.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
http://kbase.redhat.com/faq/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux (v. 5 server)

SRPMS:
yum-3.2.22-26.el5.src.rpm
File outdated by:  RHBA-2012:1117
    MD5: 37eb897fd312718d090972742b7f64cb
SHA-256: 35140840ccb9a559bde6727b6ec3b3207307cca265462387772329e2da0ea8d5
 
IA-32:
yum-3.2.22-26.el5.noarch.rpm
File outdated by:  RHBA-2012:1117
    MD5: 247922dd03a8e9e978bc27fa074949ad
SHA-256: ca0e802110732fc0efcff29a47cec3cf8832bf68363cf2dde471bfd1b8eaec8b
 
IA-64:
yum-3.2.22-26.el5.noarch.rpm
File outdated by:  RHBA-2012:1117
    MD5: 247922dd03a8e9e978bc27fa074949ad
SHA-256: ca0e802110732fc0efcff29a47cec3cf8832bf68363cf2dde471bfd1b8eaec8b
 
PPC:
yum-3.2.22-26.el5.noarch.rpm
File outdated by:  RHBA-2012:1117
    MD5: 247922dd03a8e9e978bc27fa074949ad
SHA-256: ca0e802110732fc0efcff29a47cec3cf8832bf68363cf2dde471bfd1b8eaec8b
 
s390x:
yum-3.2.22-26.el5.noarch.rpm
File outdated by:  RHBA-2012:1117
    MD5: 247922dd03a8e9e978bc27fa074949ad
SHA-256: ca0e802110732fc0efcff29a47cec3cf8832bf68363cf2dde471bfd1b8eaec8b
 
x86_64:
yum-3.2.22-26.el5.noarch.rpm
File outdated by:  RHBA-2012:1117
    MD5: 247922dd03a8e9e978bc27fa074949ad
SHA-256: ca0e802110732fc0efcff29a47cec3cf8832bf68363cf2dde471bfd1b8eaec8b
 
Red Hat Enterprise Linux Desktop (v. 5 client)

SRPMS:
yum-3.2.22-26.el5.src.rpm
File outdated by:  RHBA-2012:1117
    MD5: 37eb897fd312718d090972742b7f64cb
SHA-256: 35140840ccb9a559bde6727b6ec3b3207307cca265462387772329e2da0ea8d5
 
IA-32:
yum-3.2.22-26.el5.noarch.rpm
File outdated by:  RHBA-2012:1117
    MD5: 247922dd03a8e9e978bc27fa074949ad
SHA-256: ca0e802110732fc0efcff29a47cec3cf8832bf68363cf2dde471bfd1b8eaec8b
 
x86_64:
yum-3.2.22-26.el5.noarch.rpm
File outdated by:  RHBA-2012:1117
    MD5: 247922dd03a8e9e978bc27fa074949ad
SHA-256: ca0e802110732fc0efcff29a47cec3cf8832bf68363cf2dde471bfd1b8eaec8b
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

517286 - Yum crashes if download of a package is too quick
521008 - [5.4] yum returns the error when updating the package which doesn't exist.
523135 - circular obsoletes in mstflint, perftest, and tvflash (again!)
526064 - yum check-update ignores --obsoletes parameter
528738 - Change the default bugtracker_url
528746 - Fix the return code for "yum reinstall"
529233 - YumBase.bestPackagesFromList() very slow in yum versions 3.2.22 and 3.2.23
529719 - RFE: Backport changes that enhance Yum's compare_providers
548582 - Doing lots of weird stuff with source repos. and excludes can crash yum
559164 - Bad patch backport, uses yumdb which isn't in RHEL-5 == crash on reinstall of unavailable packages



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/