- Issued:
- 2011-02-16
- Updated:
- 2011-02-16
RHBA-2011:0240 - Bug Fix Advisory
Synopsis
up2date bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated up2date packages that fix several bugs are now available for Red Hat
Enterprise Linux 4.
Description
Up2date is the Red Hat Update Agent that automatically queries the Red Hat
Network servers and determines which packages need to be updated on your
machine.
This update fixes the following bugs:
- A comment in the /etc/sysconfig/rhn/sources configuration now states that the
Red Hat Network (RHN) registration is only recommended, not required as it
incorrectly stated before. (BZ#145756)
- The System Set Manager no longer fails to install selected packages when one
of these packages is already installed and has the Epoch tag specified.
(BZ#481721)
- In the /etc/sysconfig/rhn/up2date file, leaving the "serverURL" option empty
no longer causes the rhn_register and rhnreg_ks utilities to fail with a
traceback written to standard error. (BZ#493654)
- Various errors in the up2date translation have been corrected. (BZ#494256)
- The rhn_register utility has been updated to display an appropriate error
message when the "serverURL" option is supplied with an invalid protocol.
(BZ#497172)
- Package synchronization no longer fails after a kickstart installation.
(BZ#503090)
- This update ensures that up2date does not resolve dependencies for the
packages that are being uninstalled when the transaction does not involve a
package removal only. (BZ#504856)
- The rhn_register utility no longer fails to register a system when the locale
is set to "zh_TW.Big5". (BZ#505029)
- An attempt to install a package from a channel with less than 4 packages no
longer causes up2date to terminate unexpectedly with the "indexError" exception.
(BZ#519015)
- When more than one "serverURL" option is supplied, the "up2date --config"
command no longer fails with an error, and both /etc/sysconfig/rhn/up2date and
/etc/sysconfig/rhn/rhn-applet files are now saved as expected. (BZ#527648)
- On Red Hat Enterprise Linux that is running in a KVM-based fully-virtualized
environment, the rhn_register utility no longer fails to register the system
with the "Insufficient Software Channel Entitlements" error. (BZ#528761)
- During the synchronization of package profiles across various systems, a list
of all available packages is generated and then checked for incompatible
architectures. However, when the source profile included packages that are
available for multiple architectures, the synchronization process could fail
with the following error:
Failed: Some of the packages requested are not available.
This update fixes the handling of multi-architecture packages, and the package
synchronization now works as expected. (BZ#541508)
- The up2date manual page has been updated to include the description of the
"--exclude" command line option. (BZ#541872)
- When updating the system, either the latest, or no errata were installed by
up2date, even though the earlier errata had been scheduled for the installation
manually. This error has been fixed, and the manual selection now works as
expected. (BZ#578816)
- The presence of less commonly used characters from the Latin-1 character set
in the hardware name no longer renders the system unable to register to both Red
Hat Network (RHN) and RHN Satellite Server. (BZ#579830)
- The rhnreg_ks utility no longer fails with an internal server error when the
"device" entry in the /etc/sysconfig/hwconf file is longer than 16 characters.
(BZ#615302)
- The handling of package dependencies has been corrected, and up2date no longer
fails to install certain packages. (BZ#618328)
- An algorithm that derives a UUID from a serial number has been corrected, and
Red Hat Enterprise Linux 4 clients running in Red Hat Enterprise Virtualization
can now be registered as expected. (BZ#634988)
All users are advised to upgrade to these updated packages, which resolve these
issues.
Solution
Before applying this update, make sure that all previously-released errata
relevant to your system have been applied.
This update is available via Red Hat Network. Details on how to use the Red
Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 493654 - rhn_register and rhnreg_ks end with exception when "serverURL=" in /etc/sysconfig/rhn/up2date
- BZ - 497172 - rhn_register doesn't show any error when wrong protocol specified in --serverUrl option
- BZ - 503090 - package sync fails after kickstart
- BZ - 504856 - up2date package, unable to rollback packages due to bad skip list execption
- BZ - 519015 - up2date indexError on yum channels with fewer than 5 packages
- BZ - 527648 - up2date --config error Unable to save config for rhn_applet, exception caught: list objects are unhashable when using multiple serverURL's
- BZ - 528761 - Add RHEL-4 KVM Guest and Flex Guest Support
- BZ - 541508 - [CRM #1970840] Package sync fails on multilib packages
- BZ - 541872 - --exclude option not described in the up2date man-page
- BZ - 579830 - error sending hardware profile when non-xmlrpc-compliant chars are returned by dmidecode
- BZ - 618328 - installing new package attempts install of all versions of dependencies with up2date-4.8.1-33.el4_8.8
- BZ - 634988 - up2date assumes UUID in System Serial Number - internal error and traceback when registering a RHEL4 RHEV client
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
up2date-4.9.1-29.el4.src.rpm | SHA-256: 3e1589799e368f1135a3eaef301b99457ad6c8d386d09e128f2291fb242ccf65 |
x86_64 | |
up2date-4.9.1-29.el4.x86_64.rpm | SHA-256: d5ccaa5fc1aa9a027da5a5d5f5e20266f7f482a77f9c58dfc4163c0f140bcfdb |
up2date-4.9.1-29.el4.x86_64.rpm | SHA-256: d5ccaa5fc1aa9a027da5a5d5f5e20266f7f482a77f9c58dfc4163c0f140bcfdb |
up2date-gnome-4.9.1-29.el4.x86_64.rpm | SHA-256: f5773f6e713c3a031b7aa9eec63ddd3b6d1dcffc20c71b7020763ecff6b54c9a |
up2date-gnome-4.9.1-29.el4.x86_64.rpm | SHA-256: f5773f6e713c3a031b7aa9eec63ddd3b6d1dcffc20c71b7020763ecff6b54c9a |
ia64 | |
up2date-4.9.1-29.el4.ia64.rpm | SHA-256: 8fdae497d488628d0b5dd1ee4103374ca7971e904a7bb8606eeec9f479a4a789 |
up2date-4.9.1-29.el4.ia64.rpm | SHA-256: 8fdae497d488628d0b5dd1ee4103374ca7971e904a7bb8606eeec9f479a4a789 |
up2date-gnome-4.9.1-29.el4.ia64.rpm | SHA-256: fe692ba8f9fe92d45d7032f71441746532d811acde8769ff0c4e1c40c6ab317e |
up2date-gnome-4.9.1-29.el4.ia64.rpm | SHA-256: fe692ba8f9fe92d45d7032f71441746532d811acde8769ff0c4e1c40c6ab317e |
i386 | |
up2date-4.9.1-29.el4.i386.rpm | SHA-256: 3c018149b089c231c580e6d41c7529723277fd3599320e8327ebc4276f2032bc |
up2date-4.9.1-29.el4.i386.rpm | SHA-256: 3c018149b089c231c580e6d41c7529723277fd3599320e8327ebc4276f2032bc |
up2date-gnome-4.9.1-29.el4.i386.rpm | SHA-256: 46fe270e6e6eaa7c436ec58f63d3494e675143ad61577b4e4540751bd1a8d3f2 |
up2date-gnome-4.9.1-29.el4.i386.rpm | SHA-256: 46fe270e6e6eaa7c436ec58f63d3494e675143ad61577b4e4540751bd1a8d3f2 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
up2date-4.9.1-29.el4.src.rpm | SHA-256: 3e1589799e368f1135a3eaef301b99457ad6c8d386d09e128f2291fb242ccf65 |
x86_64 | |
up2date-4.9.1-29.el4.x86_64.rpm | SHA-256: d5ccaa5fc1aa9a027da5a5d5f5e20266f7f482a77f9c58dfc4163c0f140bcfdb |
up2date-gnome-4.9.1-29.el4.x86_64.rpm | SHA-256: f5773f6e713c3a031b7aa9eec63ddd3b6d1dcffc20c71b7020763ecff6b54c9a |
ia64 | |
up2date-4.9.1-29.el4.ia64.rpm | SHA-256: 8fdae497d488628d0b5dd1ee4103374ca7971e904a7bb8606eeec9f479a4a789 |
up2date-gnome-4.9.1-29.el4.ia64.rpm | SHA-256: fe692ba8f9fe92d45d7032f71441746532d811acde8769ff0c4e1c40c6ab317e |
i386 | |
up2date-4.9.1-29.el4.i386.rpm | SHA-256: 3c018149b089c231c580e6d41c7529723277fd3599320e8327ebc4276f2032bc |
up2date-gnome-4.9.1-29.el4.i386.rpm | SHA-256: 46fe270e6e6eaa7c436ec58f63d3494e675143ad61577b4e4540751bd1a8d3f2 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
up2date-4.9.1-29.el4.src.rpm | SHA-256: 3e1589799e368f1135a3eaef301b99457ad6c8d386d09e128f2291fb242ccf65 |
x86_64 | |
up2date-4.9.1-29.el4.x86_64.rpm | SHA-256: d5ccaa5fc1aa9a027da5a5d5f5e20266f7f482a77f9c58dfc4163c0f140bcfdb |
up2date-gnome-4.9.1-29.el4.x86_64.rpm | SHA-256: f5773f6e713c3a031b7aa9eec63ddd3b6d1dcffc20c71b7020763ecff6b54c9a |
i386 | |
up2date-4.9.1-29.el4.i386.rpm | SHA-256: 3c018149b089c231c580e6d41c7529723277fd3599320e8327ebc4276f2032bc |
up2date-gnome-4.9.1-29.el4.i386.rpm | SHA-256: 46fe270e6e6eaa7c436ec58f63d3494e675143ad61577b4e4540751bd1a8d3f2 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
up2date-4.9.1-29.el4.src.rpm | SHA-256: 3e1589799e368f1135a3eaef301b99457ad6c8d386d09e128f2291fb242ccf65 |
s390x | |
up2date-4.9.1-29.el4.s390x.rpm | SHA-256: 3ace828faa4bae74c7a93de095f50483513effaeb85fe777acf772e4c8630033 |
up2date-gnome-4.9.1-29.el4.s390x.rpm | SHA-256: fc3fc34ed4180fb5f507eac5b2ca0e953751c41796ed7dabe265a6e6de95742c |
s390 | |
up2date-4.9.1-29.el4.s390.rpm | SHA-256: 8384ad80928b0f97d02d718041c3628fb484f9e4060a5e64257b4e7bebaec361 |
up2date-gnome-4.9.1-29.el4.s390.rpm | SHA-256: 74181db520f0a79581ce91d6e5d70ef1e24d2703b5267f984e3ea88d3351267f |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
up2date-4.9.1-29.el4.src.rpm | SHA-256: 3e1589799e368f1135a3eaef301b99457ad6c8d386d09e128f2291fb242ccf65 |
ppc | |
up2date-4.9.1-29.el4.ppc.rpm | SHA-256: 31a961092f6f30c06e6fa30990b27753810a4774a07e34dfb45ea2801f7946bf |
up2date-gnome-4.9.1-29.el4.ppc.rpm | SHA-256: 16a39292cd9905d117f7e10b01a332450d0ba29769d9c31ae21f973ed648aa28 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.