- Issued:
- 2014-04-23
- Updated:
- 2014-04-23
RHBA-2014:0427 - Bug Fix Advisory
Synopsis
rhns bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated rhns packages and schema upgrade instructions that fix one bug are now
available for Red Hat Network Satellite 5.2.
Description
Red Hat Network Satellite is a systems management tool for Linux-based
infrastructures. It allows for provisioning, remote management and monitoring of
multiple Linux deployments with a single, centralized tool.
This update fixes the following bug:
- Previously, Satellite was able to handle only CVE identifiers that were
exactly 13 characters long (for example, CVE-2013-1234). However, the format of
CVE identifiers has been recently modified and the last part of a CVE identifier
can now consist of more than 4 digits (for example, CVE-2014-12345 is a valid
identifier). As a consequence, Satellite failed to sync errata containing CVEs
in the new format. This update extends a possible length of a CVE identifier up
to 20 characters, ensuring that Satellite syncs errata with CVEs as expected.
(BZ#1081189)
All users of Red Hat Network Satellite are advised to upgrade to these updated
packages, which fix this bug. For this update to take effect, Red Hat Network
Satellite schema must be upgraded. Refer to the Solution section for details.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/site/articles/11258
Application of this errata involves updating the database schema. In Red Hat
Network Satellite 5.2 updating schema has to be performed manually. Consult the
following document for further details:
https://access.redhat.com/site/articles/784943
Affected Products
- Red Hat Satellite with Embedded Oracle 5.2 x86_64
- Red Hat Satellite with Embedded Oracle 5.2 i386
Fixes
- BZ - 1081189 - Satellite 5.2: CVE name changing syntax in 2014
CVEs
(none)
Red Hat Satellite with Embedded Oracle 5.2
SRPM | |
---|---|
rhns-5.2.1-6.el5.src.rpm | SHA-256: 7ff54cc611dbef302682a0d7f2649dfd6d998383015ac99de0c77d4834eac528 |
x86_64 | |
rhns-5.2.1-6.el5.noarch.rpm | SHA-256: a21ad47c0409f74004d4bcd48c23d82874053fb7ced92ec0694fdeefc9dfe04f |
rhns-app-5.2.1-6.el5.noarch.rpm | SHA-256: 99b3841490f9e1268ef9045cb4654676137c45a4d8d31827d5263177a9023725 |
rhns-applet-5.2.1-6.el5.noarch.rpm | SHA-256: bb277d88c0aa6ff112189a01fe07c64e15f519749fcd48794dca2b61963bacbf |
rhns-config-files-5.2.1-6.el5.noarch.rpm | SHA-256: c75bfceb6aab2e842b9447c8a72d9404c55b7f7eb851585b65ca88a6a4121873 |
rhns-config-files-common-5.2.1-6.el5.noarch.rpm | SHA-256: 07d42ee29b0892929c9c827dda977c6d6eff2466178bdb5719c97c5bb85c9e6b |
rhns-config-files-tool-5.2.1-6.el5.noarch.rpm | SHA-256: 6609eb7a9d12f94e1bfd4f4aa5868e6b7f2b1d62664cc8df22b0e1a6e7de021e |
rhns-package-push-server-5.2.1-6.el5.noarch.rpm | SHA-256: fdef768179a064b8ed67e3ba1009b9d1d56ff7cd1657d586ff1ec573090f141f |
rhns-sat-5.2.1-6.el5.noarch.rpm | SHA-256: ebab6171067e80fe8c2703cf1d5f05e427688c7b60622b021c16eec1c704f2cf |
rhns-satellite-tools-5.2.1-6.el5.noarch.rpm | SHA-256: d487803ed9dbf236c705d94e41730c1bd6b1ccc8c3a6e17c09edc5c48be8ac56 |
rhns-server-5.2.1-6.el5.noarch.rpm | SHA-256: c46144d7698c23a1ab2910f6b1320d1fb2f0193f47f52fc5f4843c277537e946 |
rhns-sql-5.2.1-6.el5.noarch.rpm | SHA-256: 0031808eb921a9603b4717fc0f1128583b5a015c1d32b4c80f9b53206c087ee8 |
rhns-xml-export-libs-5.2.1-6.el5.noarch.rpm | SHA-256: a7732a5ea6df532b73fb8f9dd1885d8915301676d88543051d161d4d51ccee79 |
rhns-xmlrpc-5.2.1-6.el5.noarch.rpm | SHA-256: dfda61394917f1790f7c407fb08d0b3c1d4f5670adb7b248f45391755d8e4b72 |
rhns-xp-5.2.1-6.el5.noarch.rpm | SHA-256: 20378c41648306ea75b15298c14badad97ba422ba44f74e24ca78e904fff2a92 |
i386 | |
rhns-5.2.1-6.el5.noarch.rpm | SHA-256: a21ad47c0409f74004d4bcd48c23d82874053fb7ced92ec0694fdeefc9dfe04f |
rhns-app-5.2.1-6.el5.noarch.rpm | SHA-256: 99b3841490f9e1268ef9045cb4654676137c45a4d8d31827d5263177a9023725 |
rhns-applet-5.2.1-6.el5.noarch.rpm | SHA-256: bb277d88c0aa6ff112189a01fe07c64e15f519749fcd48794dca2b61963bacbf |
rhns-config-files-5.2.1-6.el5.noarch.rpm | SHA-256: c75bfceb6aab2e842b9447c8a72d9404c55b7f7eb851585b65ca88a6a4121873 |
rhns-config-files-common-5.2.1-6.el5.noarch.rpm | SHA-256: 07d42ee29b0892929c9c827dda977c6d6eff2466178bdb5719c97c5bb85c9e6b |
rhns-config-files-tool-5.2.1-6.el5.noarch.rpm | SHA-256: 6609eb7a9d12f94e1bfd4f4aa5868e6b7f2b1d62664cc8df22b0e1a6e7de021e |
rhns-package-push-server-5.2.1-6.el5.noarch.rpm | SHA-256: fdef768179a064b8ed67e3ba1009b9d1d56ff7cd1657d586ff1ec573090f141f |
rhns-sat-5.2.1-6.el5.noarch.rpm | SHA-256: ebab6171067e80fe8c2703cf1d5f05e427688c7b60622b021c16eec1c704f2cf |
rhns-satellite-tools-5.2.1-6.el5.noarch.rpm | SHA-256: d487803ed9dbf236c705d94e41730c1bd6b1ccc8c3a6e17c09edc5c48be8ac56 |
rhns-server-5.2.1-6.el5.noarch.rpm | SHA-256: c46144d7698c23a1ab2910f6b1320d1fb2f0193f47f52fc5f4843c277537e946 |
rhns-sql-5.2.1-6.el5.noarch.rpm | SHA-256: 0031808eb921a9603b4717fc0f1128583b5a015c1d32b4c80f9b53206c087ee8 |
rhns-xml-export-libs-5.2.1-6.el5.noarch.rpm | SHA-256: a7732a5ea6df532b73fb8f9dd1885d8915301676d88543051d161d4d51ccee79 |
rhns-xmlrpc-5.2.1-6.el5.noarch.rpm | SHA-256: dfda61394917f1790f7c407fb08d0b3c1d4f5670adb7b248f45391755d8e4b72 |
rhns-xp-5.2.1-6.el5.noarch.rpm | SHA-256: 20378c41648306ea75b15298c14badad97ba422ba44f74e24ca78e904fff2a92 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.