Skip to navigation

Enhancement Advisory redhat-release enhancement update for Red Hat Enterprise Linux 6.2

Advisory: RHEA-2011:1743-3
Type: Product Enhancement Advisory
Severity: N/A
Issued on: 2011-12-06
Last updated on: 2011-12-06
Affected Products: Red Hat Enterprise Linux Desktop (v. 6)
Red Hat Enterprise Linux HPC Node (v. 6)
Red Hat Enterprise Linux Server (v. 6)
Red Hat Enterprise Linux Workstation (v. 6)

Details

An enhanced redhat-release package is now available for Red Hat Enterprise Linux
6.2.

The redhat-release package contains licensing information regarding, and
identifies the installed version of, Red Hat Enterprise Linux.

This updated redhat-release package reflects changes made for the release of Red
Hat Enterprise Linux 6.2.

Users of Red Hat Enterprise Linux 6 are advised to upgrade to this updated
redhat-release package, which adds this enhancement.


Solution

Before applying this update, make sure all previously-released errata
relevant to your system have been applied.

This update is available via the Red Hat Network. Details on how to
use the Red Hat Network to apply this update are available at
https://access.redhat.com/kb/docs/DOC-11259

Updated packages

Red Hat Enterprise Linux Desktop (v. 6)

SRPMS:
redhat-release-client-6Client-6.2.0.3.el6.src.rpm
File outdated by:  RHEA-2013:1546
    MD5: 6d5854a74cbaf30891dbcaedca508fa7
SHA-256: ff32628d5571412958326beb3ed090b827f8d540109433685c412a1f9ea2f7f8
 
IA-32:
redhat-release-client-6Client-6.2.0.3.el6.i686.rpm
File outdated by:  RHEA-2013:1546
    MD5: b8790d7ba9d168f6c45ce4d534982183
SHA-256: b73d6e18cba15cf27fa6a40d106b5e0a5647ad473ad7e32b7248f319b90e0375
 
x86_64:
redhat-release-client-6Client-6.2.0.3.el6.x86_64.rpm
File outdated by:  RHEA-2013:1546
    MD5: 924e37be02b11712707296f1e95a8fb6
SHA-256: 8d0684dea7931dcb2784875c44cbc789eabfc2c43b831d1fa5e99b1c301801d4
 
Red Hat Enterprise Linux HPC Node (v. 6)

SRPMS:
redhat-release-computenode-6ComputeNode-6.2.0.3.el6.src.rpm
File outdated by:  RHEA-2013:1546
    MD5: 88057ab0df129c3e022f9a23fd7e81b8
SHA-256: 00748bc452996e6915191e0cd240d050e8a257a7f4aadb1cc8644dbbdd6e02d1
 
x86_64:
redhat-release-computenode-6ComputeNode-6.2.0.3.el6.x86_64.rpm
File outdated by:  RHEA-2013:1546
    MD5: 88260ba5b5aeb19a688c77ada5ede3b2
SHA-256: 56cb3c6d3047f3efd8e0b969a3807719d9e12a2acc225d976352b40b01cb2a48
 
Red Hat Enterprise Linux Server (v. 6)

SRPMS:
redhat-release-server-6Server-6.2.0.3.el6.src.rpm
File outdated by:  RHEA-2013:1546
    MD5: 9dc569cf3e08efa64d7b9ab3c8102d0d
SHA-256: 1a2894428e47c8433bc6ac5f750e60ce8ff0b3a04d44e53ed4f05e4887d3f2d3
 
IA-32:
redhat-release-server-6Server-6.2.0.3.el6.i686.rpm
File outdated by:  RHEA-2013:1546
    MD5: 97e8f3d1e2bfb3d7219c0e6af93c1745
SHA-256: 0651943fe406dedbdeb6489f7f77ab2c59c55dc3c6dbfc64fe2af3e71851021a
 
PPC:
redhat-release-server-6Server-6.2.0.3.el6.ppc64.rpm
File outdated by:  RHEA-2013:1546
    MD5: 3ac87d130aec4179f71791e754bf6407
SHA-256: d90479b22ca593f56eb5576f4d059cd72d2875a2f6418c1aa9e28d042e357093
 
s390x:
redhat-release-server-6Server-6.2.0.3.el6.s390x.rpm
File outdated by:  RHEA-2013:1546
    MD5: 0fca0ae6ca15c62025a0531cf26c3797
SHA-256: eea6b0a678bc165f97527bef4b3601d5eaf80b469c12fe57d2b8319d50c5f250
 
x86_64:
redhat-release-server-6Server-6.2.0.3.el6.x86_64.rpm
File outdated by:  RHEA-2013:1546
    MD5: 55bceed5aeafad4ccf41aa36a3fd1493
SHA-256: 671edbaad34883d3034faa9c39b61834af927b582e1da0e5abac52561c3a7ac5
 
Red Hat Enterprise Linux Workstation (v. 6)

SRPMS:
redhat-release-workstation-6Workstation-6.2.0.3.el6.src.rpm
File outdated by:  RHEA-2013:1546
    MD5: 009aa8cab1dab7859f103e7a3005b6be
SHA-256: 5f7672265233d2a73676648636da82ee8c9d4d22e9242f8da28981df26840972
 
IA-32:
redhat-release-workstation-6Workstation-6.2.0.3.el6.i686.rpm
File outdated by:  RHEA-2013:1546
    MD5: 3f675e948d5b2d54595ae0a6533de521
SHA-256: e89c15b538a7727899b0f1f4ef4f1d92a73cfe327db4355ae9278bf2f2614fb7
 
x86_64:
redhat-release-workstation-6Workstation-6.2.0.3.el6.x86_64.rpm
File outdated by:  RHEA-2013:1546
    MD5: fa33ea888e15359bbcda1c9385c96fb5
SHA-256: 51c061223d006522c4ca88e289a52e0f7b80c12526ed7119d9cccf0b052d7910
 
(The unlinked packages above are only available from the Red Hat Network)

Bugs fixed (see bugzilla for more information)

645130 - Core group contains mandatory firmware packages
677360 - [RFE] Provide tdb-tools in base channel
678089 - RHEL6 install with GNOME, X (but without KDE) runs text setup only
696294 - Add yum-plugin-security to default install
705572 - EC2 missing /etc/sysconfig/kernel
708304 - RFE: Fix confusing option in package selection screen
708569 - Move s390utils-cmsfs-fuse from optional to default channels
714163 - 32-bit SPICE packages missing from Supplementary repo
725454 - Include the new package spice-gtk in composes
725478 - Rename libvirt-qpid to be libvirt-qmf in comps.xml
725532 - add libvirt-snmp package to comps.xml
725815 - add vios-proxy to comps.xml
726550 - add wdaemon to comps.xml for RHEL6.2
727554 - fake-build-provides provides lm_sensors-devel on x86_64
729281 - Update redhat-release-client for RHEL 6.2
729282 - Update redhat-release-server for RHEL 6.2
729284 - Update redhat-release-workstation for RHEL 6.2
729285 - Update redhat-release-computenode for RHEL 6.2
740934 - Weird problem with RHSM CDN updateinfo data for at least qt



These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from:
https://www.redhat.com/security/team/key/#package

The Red Hat security contact is secalert@redhat.com. More contact details at http://www.redhat.com/security/team/contact/