Bug Fix Advisory Red Hat JBoss Operations Network Agent RPM 3.3 (update 08) EAP 6

Advisory: RHBA-2017:0283-1
Type: Bug Fix Advisory
Severity: N/A
Issued on: 2017-02-16
Last updated on: 2017-02-16
Affected Products: JBoss Enterprise Application Platform 6 EL6
JBoss Enterprise Application Platform 6.3 EL6
JBoss Enterprise Application Platform 6.3 EL7

Details

Updated jboss-on-agent packages that fix several bugs and add various
enhancements are now available.

Red Hat JBoss Operations Network (JON) is a middleware management solution that
provides a single point of control to deploy, manage, and monitor Red Hat JBoss
Enterprise middleware, applications, and services.

This Red Hat JBoss Operations Network 3.3.8 release serves as a replacement for
Red Hat JBoss Operations Network 3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4, 3.3.5, 3.3.6
and 3.3.7, and includes several bug fixes and various enhancements.

The updated jboss-on-agent packages update the JON 3.3 agent to communicate with
JON 3.3 Update 08 servers.

All users of Red Hat JBoss Operations Network 3.3.0, 3.3.1, 3.3.2, 3.3.3, 3.3.4,
3.3.5, 3.3.6 and 3.3.7, as provided from the Red Hat Customer Portal, are
advised to upgrade to Red Hat JBoss Operations Network 3.3.8.


Solution

Before applying this update, make sure all previously released errata
relevant to your system have been applied.

For details on how to apply this update, refer to:

https://access.redhat.com/articles/11258

Updated packages

JBoss Enterprise Application Platform 6 EL6

SRPMS:
jboss-on-3.3.0.GA-119.ep6.el6.src.rpm     MD5: 542311718388d82e59d5f30f2fe9aeae
SHA-256: bbb445aa67cbdeec16d70876caba1ee08360a2a93328f1f7edc3c2f308fb9942
 
IA-32:
jboss-on-agent-3.3-3.3.0.GA-119.ep6.el6.noarch.rpm     MD5: 5f44cc69af2f22d05dad150037bd8061
SHA-256: 8691c8647c39f6916b46d2013ba7369abe160026733fe059d1c8167162be15ef
jboss-on-agent-init-ec2-3.3-3.3.0.GA-119.ep6.el6.noarch.rpm     MD5: 9f6733f90be020883a142b445226d1b5
SHA-256: ef9ccaa1ef97d72b380f59aa738ab2e5fa454c696966a69e317f75c8c0325f11
 
x86_64:
jboss-on-agent-3.3-3.3.0.GA-119.ep6.el6.noarch.rpm     MD5: 5f44cc69af2f22d05dad150037bd8061
SHA-256: 8691c8647c39f6916b46d2013ba7369abe160026733fe059d1c8167162be15ef
jboss-on-agent-init-ec2-3.3-3.3.0.GA-119.ep6.el6.noarch.rpm     MD5: 9f6733f90be020883a142b445226d1b5
SHA-256: ef9ccaa1ef97d72b380f59aa738ab2e5fa454c696966a69e317f75c8c0325f11
 
JBoss Enterprise Application Platform 6.3 EL6

SRPMS:
jboss-on-3.3.0.GA-119.ep6.el6.src.rpm     MD5: 542311718388d82e59d5f30f2fe9aeae
SHA-256: bbb445aa67cbdeec16d70876caba1ee08360a2a93328f1f7edc3c2f308fb9942
 
IA-32:
jboss-on-agent-3.3-3.3.0.GA-119.ep6.el6.noarch.rpm     MD5: 5f44cc69af2f22d05dad150037bd8061
SHA-256: 8691c8647c39f6916b46d2013ba7369abe160026733fe059d1c8167162be15ef
jboss-on-agent-init-ec2-3.3-3.3.0.GA-119.ep6.el6.noarch.rpm     MD5: 9f6733f90be020883a142b445226d1b5
SHA-256: ef9ccaa1ef97d72b380f59aa738ab2e5fa454c696966a69e317f75c8c0325f11
 
x86_64:
jboss-on-agent-3.3-3.3.0.GA-119.ep6.el6.noarch.rpm     MD5: 5f44cc69af2f22d05dad150037bd8061
SHA-256: 8691c8647c39f6916b46d2013ba7369abe160026733fe059d1c8167162be15ef
jboss-on-agent-init-ec2-3.3-3.3.0.GA-119.ep6.el6.noarch.rpm     MD5: 9f6733f90be020883a142b445226d1b5
SHA-256: ef9ccaa1ef97d72b380f59aa738ab2e5fa454c696966a69e317f75c8c0325f11
 
JBoss Enterprise Application Platform 6.3 EL7

SRPMS:
jboss-on-3.3.0.GA-119.ep6.el7.src.rpm     MD5: 8f7ab91aff2cd624838ba05045e69497
SHA-256: 52d80c5b3f7e4086912c164abbceb5ec148382bc89f1d8cd026f4ce8a221a0b6
 
x86_64:
jboss-on-agent-3.3-3.3.0.GA-119.ep6.el7.noarch.rpm     MD5: fe265998270cc214e2e1d63e33cbd78a
SHA-256: 5e92c557c70c8486fb99b41da44e817e4ee6b4e0dfe8b78d53fcd063cfc33a1f
jboss-on-agent-init-ec2-3.3-3.3.0.GA-119.ep6.el7.noarch.rpm     MD5: b141446ee01b3c73f71b2d875c25c2a9
SHA-256: 959d9981a5fbcff998242f57a71d660be7eb72905ab75ed0b7e5f085ee5f220a
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

1417279 - Errata for JON 3.3 Update 08 Agent RPMs for EAP 6



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/