- Issued:
- 2006-03-07
- Updated:
- 2006-03-07
RHBA-2006:0098 - Bug Fix Advisory
Synopsis
up2date bug fix update
Type/Severity
Bug Fix Advisory
Red Hat Insights patch analysis
Identify and remediate systems affected by this advisory.
Topic
Updated up2date packages that fix several bugs are now available.
Description
The Red Hat Update Agent that automatically queries the Red Hat Network
servers and determines which packages need to be updated on your machine.
The following bugs have been addressed:
- 'up2date --configure' now saves changes if useNetwork is false on startup
- up2date 'forward' button is no longer disabled if packages are selected
via the spacebar
- closing the 'Network Configuration' window no longer stalls firstboot
- up2date man page now describes the '--undo' option
- 'up2date --configure' no longer fails when failover serverURL is configured
- 'Invalid function call attempted' error no longer appears when
installing an RHN proxy.
- debug output appears for up2date on Itanium systems
- up2date no longer unselects all packages if 'select-all' is checked and
the user then selects 'back.'
- up2date no longer gives an error if 'select-all' is checked then any
package is deselected
- rhnreg_ks now has import name capabilities for circular import
- the Red Hat Enterprise Linux 3 Update 6 versions of Openoffice.org and
up2date no longer cause a dependency error that created a potential
security issue
- up2date is now able to download very large rpms
All users of up2date should upgrade to these updated packages, which
resolve these issues.
Solution
Before applying this update, make sure all previously released errata
relevant to your system have been applied.
This update is available via Red Hat Network. To use Red Hat Network,
launch the Red Hat Update Agent with the following command:
up2date
This will start an interactive process that will result in the appropriate
RPMs being upgraded on your system.
Affected Products
- Red Hat Enterprise Linux Server 4 x86_64
- Red Hat Enterprise Linux Server 4 ia64
- Red Hat Enterprise Linux Server 4 i386
- Red Hat Enterprise Linux Workstation 4 x86_64
- Red Hat Enterprise Linux Workstation 4 ia64
- Red Hat Enterprise Linux Workstation 4 i386
- Red Hat Enterprise Linux Desktop 4 x86_64
- Red Hat Enterprise Linux Desktop 4 i386
- Red Hat Enterprise Linux for IBM z Systems 4 s390x
- Red Hat Enterprise Linux for IBM z Systems 4 s390
- Red Hat Enterprise Linux for Power, big endian 4 ppc
Fixes
- BZ - 157087 - up2date --configure fails when failover serverURL is configured
- BZ - 171132 - up2date "forward" button disabled if packages selected via spacebar
- BZ - 175325 - rhnreg_ks cannot import name capabilities -- circular import
- BZ - 177784 - up2date gives error if select-all is checked then any package is deselected
- BZ - 177785 - up2date gives error if select-all is checked then any package is deselected
- BZ - 177786 - up2date unselects all packages if select-all is checked and user selects "back"
- BZ - 178251 - debug output appears for up2date on ia64
- BZ - 179502 - up2date-nox --configure changes current value of numeric attribute to Yes/No if 1/0 is selected
- BZ - 179504 - up2date window size larger than screen resolution
- BZ - 179505 - up2date fails to update xerces
CVEs
(none)
References
(none)
Red Hat Enterprise Linux Server 4
SRPM | |
---|---|
up2date-4.4.67-4.src.rpm | SHA-256: b37336498d95ef1d652d155269ace6608744e14d459c6964a2b05c222137fa14 |
x86_64 | |
up2date-4.4.67-4.x86_64.rpm | SHA-256: c49a8081f765822c7d455400a2a585126d8fea977cdf5367e778c6331348d342 |
up2date-4.4.67-4.x86_64.rpm | SHA-256: c49a8081f765822c7d455400a2a585126d8fea977cdf5367e778c6331348d342 |
up2date-gnome-4.4.67-4.x86_64.rpm | SHA-256: 958d8dd890e59fb4d09f39f0208e8bc92cfd8b4df0664988561d4ddd30ba1d49 |
up2date-gnome-4.4.67-4.x86_64.rpm | SHA-256: 958d8dd890e59fb4d09f39f0208e8bc92cfd8b4df0664988561d4ddd30ba1d49 |
ia64 | |
up2date-4.4.67-4.ia64.rpm | SHA-256: 197380d723cafd8bd7a5855c36ee82c55a9406079f481a6d722c5dd231cc769e |
up2date-4.4.67-4.ia64.rpm | SHA-256: 197380d723cafd8bd7a5855c36ee82c55a9406079f481a6d722c5dd231cc769e |
up2date-gnome-4.4.67-4.ia64.rpm | SHA-256: f0056a7d0951cd6d90d25f7b2e8520b5820b78349b458c01d612ffee7073922c |
up2date-gnome-4.4.67-4.ia64.rpm | SHA-256: f0056a7d0951cd6d90d25f7b2e8520b5820b78349b458c01d612ffee7073922c |
i386 | |
up2date-4.4.67-4.i386.rpm | SHA-256: 984c9a2073d63a45c14f7efd80d444706268bb5212f39d37c43949f7cbe7407f |
up2date-4.4.67-4.i386.rpm | SHA-256: 984c9a2073d63a45c14f7efd80d444706268bb5212f39d37c43949f7cbe7407f |
up2date-gnome-4.4.67-4.i386.rpm | SHA-256: a86468af8621e268488a7a0b01b7aec1d6258450ce87f002a78bdd74a0be8e85 |
up2date-gnome-4.4.67-4.i386.rpm | SHA-256: a86468af8621e268488a7a0b01b7aec1d6258450ce87f002a78bdd74a0be8e85 |
Red Hat Enterprise Linux Workstation 4
SRPM | |
---|---|
up2date-4.4.67-4.src.rpm | SHA-256: b37336498d95ef1d652d155269ace6608744e14d459c6964a2b05c222137fa14 |
x86_64 | |
up2date-4.4.67-4.x86_64.rpm | SHA-256: c49a8081f765822c7d455400a2a585126d8fea977cdf5367e778c6331348d342 |
up2date-gnome-4.4.67-4.x86_64.rpm | SHA-256: 958d8dd890e59fb4d09f39f0208e8bc92cfd8b4df0664988561d4ddd30ba1d49 |
ia64 | |
up2date-4.4.67-4.ia64.rpm | SHA-256: 197380d723cafd8bd7a5855c36ee82c55a9406079f481a6d722c5dd231cc769e |
up2date-gnome-4.4.67-4.ia64.rpm | SHA-256: f0056a7d0951cd6d90d25f7b2e8520b5820b78349b458c01d612ffee7073922c |
i386 | |
up2date-4.4.67-4.i386.rpm | SHA-256: 984c9a2073d63a45c14f7efd80d444706268bb5212f39d37c43949f7cbe7407f |
up2date-gnome-4.4.67-4.i386.rpm | SHA-256: a86468af8621e268488a7a0b01b7aec1d6258450ce87f002a78bdd74a0be8e85 |
Red Hat Enterprise Linux Desktop 4
SRPM | |
---|---|
up2date-4.4.67-4.src.rpm | SHA-256: b37336498d95ef1d652d155269ace6608744e14d459c6964a2b05c222137fa14 |
x86_64 | |
up2date-4.4.67-4.x86_64.rpm | SHA-256: c49a8081f765822c7d455400a2a585126d8fea977cdf5367e778c6331348d342 |
up2date-gnome-4.4.67-4.x86_64.rpm | SHA-256: 958d8dd890e59fb4d09f39f0208e8bc92cfd8b4df0664988561d4ddd30ba1d49 |
i386 | |
up2date-4.4.67-4.i386.rpm | SHA-256: 984c9a2073d63a45c14f7efd80d444706268bb5212f39d37c43949f7cbe7407f |
up2date-gnome-4.4.67-4.i386.rpm | SHA-256: a86468af8621e268488a7a0b01b7aec1d6258450ce87f002a78bdd74a0be8e85 |
Red Hat Enterprise Linux for IBM z Systems 4
SRPM | |
---|---|
up2date-4.4.67-4.src.rpm | SHA-256: b37336498d95ef1d652d155269ace6608744e14d459c6964a2b05c222137fa14 |
s390x | |
up2date-4.4.67-4.s390x.rpm | SHA-256: 60811d74f77c1af12dd180d1afcec249863f05a73282201a94f70c951a9bc5cc |
up2date-gnome-4.4.67-4.s390x.rpm | SHA-256: 6e3b7fec0575575ad1bd1b5deea9eebacaa6e504dce1bd956f4233d784f26ffd |
s390 | |
up2date-4.4.67-4.s390.rpm | SHA-256: 611db3874a2b9af657c23328508023bee33e89a8a0508ba52987df5d10a447b0 |
up2date-gnome-4.4.67-4.s390.rpm | SHA-256: 27648711903812fd9e04bacdbdf9bb5897cef057e18a970b973d889d86a8b136 |
Red Hat Enterprise Linux for Power, big endian 4
SRPM | |
---|---|
up2date-4.4.67-4.src.rpm | SHA-256: b37336498d95ef1d652d155269ace6608744e14d459c6964a2b05c222137fa14 |
ppc | |
up2date-4.4.67-4.ppc.rpm | SHA-256: c5b3211763d7c67996055fb7c176e5c113f64ebbe61848c7d2b4c7c0156b326e |
up2date-gnome-4.4.67-4.ppc.rpm | SHA-256: 4834de48a9e2eb5b561e103c8433bafa2cdba8f9a187e64a3ca5b73169df00b7 |
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/.