- Issued:
- 2011-02-01
- Updated:
- 2011-02-01
RHBA-2011:0189 - Bug Fix Advisory
Synopsis
Red Hat Network Satellite bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated Red Hat Network Satellite packages that fix multiple bugs are now
available for Red Hat Network Satellite Server.
Description
Red Hat Network Satellite is a systems management tool for Linux-based
infrastructures. It allows for provisioning, remote management and monitoring of
multiple Linux deployments with a single, centralized tool.
This update fixes the following bugs:
- This update verifies that configchannel.lookupFileInfo API returns the
file_contents attribute and displays the contents of files correctly. (BZ#
519985)
- Previously, the arrows to step to the next page of the packages list scheduled
for update in Satellite did not work correctly. This update implements the List
Set for this page. Users are now able to list the packages as expected.
(BZ#523926)
- Previously, the query for the number of affected systems duplicated rows when
users removed packages with the System Set Manager which made the number higher
than expected. This update disallows duplicated rows. (BZ#526864)
- Previously, SSM package actions redirected to the new SSM status page for
which the navigation was not set up correctly. This page wrongly appeared to be
on the "overview" tab. With this update the page is correctly displayed.
(BZ#527294)
- Previously, KickstartData neglected the Cobbler profile data when deep
copying. The cloning process of a kickstart profile did not clone the
virtualization information. This update adds deep copying. (BZ#528884)
- Previously, the data list name was specified in the csv tag even though it had
been left to the default. Users could not download the Common Vulnerabilities
and Exposures (CVE) details in CSV format. With this update, the details can now
be downloaded. (BZ#543461)
- Previously, the variables page for kickstart profiles used invalid IDs. Users
could not display the profile name or delete the page. This update uses the
correct IDs. (BZ#545402)
- Previously, removing a kickstart profile did not remove it immediately from
the generated pxe menu. This update regenerates the PXE menu. (BZ#559292)
- Previously, Errata search fields "All" did not work correctly. The search was
case sensitive and did not allow partial matches. This update resolves this
issue. (BZ#576953)
- Previously, the data for kickstart profiles did not have "Variable"
information available during the cloning process. This update uses cobbler to
edit and manage this kickstart profile. (BZ#577224)
- Previously, Configuration Channel rankings for an activation key were not
updated correctly if the activation keys were associated with configuration
channels and if one or more channels were removed. Now, the ranking is updated
correctly. (BZ#628100)
- Previously, the channel cloning process did not correctly clone the activation
key and did not update the default session key. This update clones the session
key correctly when kickstart gets cloned. The kickstart process under these
conditions is now successful. (BZ#635772)
- Previously, keywords were duplicated when users refreshed out-of-date errata
with the Errata sync feature. Users encountered an internal server error. This
update stops keywords from being duplicated while the Errata is synchronized.
Users can now use the Errata sync feature to refresh Errata without any internal
server errors. (BZ#659079)
- Previously, The kickstart.profile.system.getPartitioningScheme api call did
not return %include statements if they existed. Due to this behavior, part of
the parameters were not available via API but visible on the Web User Interface.
This update introduces include statements for this API call.(BZ#659469).
All users of Red Hat Network Satellite are advised to upgrade to these updated
packages, which resolve this issue.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
To update all RPMs for your particular architecture, run:
rpm -Fvh [filenames]
where [filenames] is a list of the RPMs you wish to upgrade. Only those
RPMs which are currently installed will be updated. Those RPMs which are
not installed but included in the list will not be updated. Note that you
can also use wildcards (*.rpm) if your current directory *only* contains the
desired RPMs.
Please note that this update is also available via Red Hat Network. Many
people find this an easier way to apply updates. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Satellite with Embedded Oracle 5.3 x86_64
- Red Hat Satellite with Embedded Oracle 5.3 i386
Fixes
- BZ - 519985 - CRM #1942512 - API configchannel.lookupFileInfo doesn't return the file contents
- BZ - 526864 - Number of affected systems is not calculated right in SSM -> package removal
- BZ - 527294 - SSM package actions redirect to a page with missing nav info
- BZ - 528884 - Satellite 5.3: Cloning a kickstart profile (with virtualization) loses information
- BZ - 543461 - Unable to download errata details for a system profile from Satellite v5.3 as CSV
- BZ - 545402 - RHN Satellite 5.3: WebUI bug in Kickstart profile details
- BZ - 559292 - Removing kickstart profiles does not immediately remove them from PXE menu
- BZ - 576953 - Search is broken: it's case sensitive, deliminator sensitive, and all fields lie.
- BZ - 628100 - RHN Satellite 5.3: activation keys & configuration channels subscribing / ranking issues
- BZ - 635772 - Conflicting base channels - Error Class Info: Conflicting activation tokens
- BZ - 659079 - org.hibernate.NonUniqueObjectException when sync'ing errata
- BZ - 659469 - kickstart.profile.system.getPartitioningScheme - does not return %include statements
CVEs
(none)
References
(none)
Red Hat Satellite with Embedded Oracle 5.3
SRPM | |
---|---|
spacewalk-java-0.5.44-95.el5sat.src.rpm | SHA-256: 88ec744e41839f7759a0f036b2f1022ac8498328b11ad517c3ef2907621dd990 |
spacewalk-search-0.5.10-17.el5sat.src.rpm | SHA-256: 83e1e55980d1a7324e948b9e0eb1f55ff748ee7e343186f3800ed66935929c51 |
x86_64 | |
spacewalk-java-0.5.44-95.el5sat.noarch.rpm | SHA-256: d85d50731ec7a1c1114a36056bcfd34046521845894d3cb0f63893b48710a651 |
spacewalk-java-config-0.5.44-95.el5sat.noarch.rpm | SHA-256: 090dd8bcb22056065b882df8be0505fd492fd24622bc32c8dd1edc2c2220cdc1 |
spacewalk-java-lib-0.5.44-95.el5sat.noarch.rpm | SHA-256: 7a30ed9b35231f889956c250334bf8f546200cb00c11af0403804b63e7e48564 |
spacewalk-search-0.5.10-17.el5sat.noarch.rpm | SHA-256: 6f6128d64b9c4c09f4f6f8f389d43137bd52765051c98bfb960b7488ea92d8ba |
spacewalk-taskomatic-0.5.44-95.el5sat.noarch.rpm | SHA-256: aef4d7415377b56786f3b986944629a53f44bdb512d0b7a2fddfe57119ee7e1f |
i386 | |
spacewalk-java-0.5.44-95.el5sat.noarch.rpm | SHA-256: d85d50731ec7a1c1114a36056bcfd34046521845894d3cb0f63893b48710a651 |
spacewalk-java-config-0.5.44-95.el5sat.noarch.rpm | SHA-256: 090dd8bcb22056065b882df8be0505fd492fd24622bc32c8dd1edc2c2220cdc1 |
spacewalk-java-lib-0.5.44-95.el5sat.noarch.rpm | SHA-256: 7a30ed9b35231f889956c250334bf8f546200cb00c11af0403804b63e7e48564 |
spacewalk-search-0.5.10-17.el5sat.noarch.rpm | SHA-256: 6f6128d64b9c4c09f4f6f8f389d43137bd52765051c98bfb960b7488ea92d8ba |
spacewalk-taskomatic-0.5.44-95.el5sat.noarch.rpm | SHA-256: aef4d7415377b56786f3b986944629a53f44bdb512d0b7a2fddfe57119ee7e1f |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.